Follow
David Raymond
Title
Cited by
Year
The current state of cryptocurrency forensics
S Dudani, I Baggili, D Raymond, R Marchany
Forensic Science International: Digital Investigation 46, 301576, 2023
72023
The State of the Public Cloud: Security Concerns with Cloud Computing
C Cain, D Raymond, JS Ransbottom
2020 SoutheastCon, 1-5, 2020
12020
Automatic IoT Device Classification using Traffic Behavioral Characteristics
A Hsu, J Tront, D Raymond, G Wang, A Butt
2019 SoutheastCon, 1-7, 2019
122019
Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks
P Kobezak, R Marchany, D Raymond, J Tront
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
102018
Privacy Preserving Network Security Data Analytics: Architectures and System Design
ME DeYoung, P Kobezak, D Raymond, R Marchany, J Tront
51st Hawaii International Conference on System Sciences, 2018, 2018
32018
West Point's Defense and Strategic Studies' War Council'Series (Part II)
A Betson, D Raymond, M Cavanaugh
Small Wars Journal, 2018
2018
Spark on the ARC: Big data analytics frameworks on HPC clusters
ME DeYoung, M Salman, H Bedi, D Raymond, JG Tront
Proceedings of the Practice and Experience in Advanced Research Computing …, 2017
32017
MARCS: mobile augmented reality for cybersecurity
B Mattina, F Yeung, A Hsu, D Savoy, J Tront, D Raymond
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
42017
Designing PhelkStat: Big Data Analytics for System Event Logs
M Salman, B Welch, D Raymond, R Marchany, J Tront
HICSS Symposium on Cybersecurity Big Data Analytics, 2017
32017
Spark on the ARC
ME DeYoung, M Salman, H Bedi, D Raymond, JG Tront
2017
On Cyber: Towards an operational art for cyber conflict
G Conti, D Raymond
Kopidion Press, 2017
382017
Paradoxes of (Cyber) Counterinsurgency
D Raymond
Cyber Defense Review, 2015
22015
Shaping the Army’s Cyber Operations Force: the Human Dimension
G Conti, R Harrison, T Arnold, D Raymond
The Cyber Defense Review, 2015
12015
Pen Testing a City
G Conti, T Cross, D Raymond
Black Hat USA, 2015
62015
Key terrain in cyberspace: Seeking the high ground
D Raymond, T Cross, G Conti, M Nowatkowski
2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014
522014
Towards a Cyber Leader Course Modeled on Army Ranger School
TA G. Conti, M. Weigand, D. Raymond, T. Cook
Small Wars Journal, 2014
3*2014
Towards a cyber common operating picture
G Conti, J Nelson, D Raymond
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013
422013
A control measure framework to limit collateral damage and propagation of cyber weapons
D Raymond, G Conti, T Cross, R Fanelli
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-16, 2013
272013
Professionalizing the Army's Cyber Officer Force
T Arnold, R Harrison, G Conti, D Raymond
52013
When good Ninjas turn bad: Preventing your students from becoming the threat
T Cook, G Conti, D Raymond
Proceedings of the 16th Colloquium for Information System Security Education …, 2012
262012
The system can't perform the operation now. Try again later.
Articles 1–20