default search action
Frederica Free-Nelson
Person information
- affiliation: US Army Research Laboratory, Computational and Information Sciences Directorate, Network Security Branch, Adelphi, MD, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Nhung H. Nguyen, Mengmeng Ge, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim:
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation. Comput. Secur. 150: 104229 (2025) - 2024
- [j12]Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica Free-Nelson, Sachin S. Shetty, Charles A. Kamhoua:
CycleGAN-Gradient Penalty for Enhancing Android Adversarial Malware Detection in Gray Box Setting. IEEE Access 12: 162685-162696 (2024) - [j11]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Nelson, Sachin Shetty, Charles A. Kamhoua:
Enhancing Cyber Resilience Through Traffic Generation Patterns in Complex Networks: A Study on Cascading Failures. IEEE Access 12: 164151-164163 (2024) - [j10]Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica F. Nelson, Sachin S. Shetty, Charles A. Kamhoua:
A Defensive Strategy Against Android Adversarial Malware Attacks. IEEE Access 12: 169432-169441 (2024) - [j9]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Free-Nelson, Sachin Shetty, Charles A. Kamhoua:
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization. IEEE Trans. Inf. Forensics Secur. 19: 10189-10205 (2024) - [c17]Nhung H. Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim:
AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous Vehicles. DSN-S 2024: 1-5 - 2023
- [c16]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Dan Dongseong Kim, Hyuk Lim, Frederica Nelson:
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning. ACNS (1) 2023: 555-582 - [c15]Ines Carole Kombou Sihomnou, Abderrahim Benslimane, Ahmed H. Anwar, Gabriel Deugoue, Frederica Free-Nelson, Charles A. Kamhoua:
Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game. ICC 2023: 6016-6021 - [c14]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Frederica Free-Nelson, Sachin Shetty, Wilson Ejuh Geh, Charles A. Kamhoua:
Cyber Resilience Measurement Through Logical Attack Graph Analysis. ICC 2023: 6034-6039 - [c13]Alexander Velazquez, Joseph T. Mathews, Roberto Rigolin Ferreira Lopes, Tracy Braun, Frederica Free-Nelson:
Toward Autonomous Cyber Defense for Protected Core Networking. ICMCIS 2023: 1-7 - 2022
- [j8]Sunghwan Kim, Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, Hyuk Lim:
DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework. IEEE Trans. Netw. Serv. Manag. 19(4): 4834-4846 (2022) - [c12]Hyejin Kim, Dan Dongseong Kim, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim:
Continual Learning with Network Intrusion Dataset. IEEE Big Data 2022: 6702-6704 - [c11]Tina Moghaddam, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim:
A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. DSN Workshops 2022: 103-110 - [c10]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim:
Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. PRDC 2022: 119-129 - [c9]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Ryan K. L. Ko, Dan Dongseong Kim:
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. QRS 2022: 276-286 - 2021
- [j7]Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, Hyuk Lim:
DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework. IEEE Access 9: 70700-70714 (2021) - [j6]Edwin Dauber, Robert F. Erbacher, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Supervised Authorship Segmentation of Open Source Code Projects. Proc. Priv. Enhancing Technol. 2021(4): 464-479 (2021) - [c8]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Frederica Free-Nelson:
DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks. CNS 2021: 137-145 - [c7]Jaime C. Acosta, Luisana Clarke, Stephanie Medina, Monika Akbar, Mahmud Shahriar Hossain, Frederica Free-Nelson:
Repeatable Experimentation for Cybersecurity Moving Target Defense. SecureComm (1) 2021: 82-99 - 2020
- [j5]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Commun. Surv. Tutorials 22(1): 709-745 (2020) - [j4]Dilli P. Sharma, Simon Yusuf Enoch, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim:
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense. J. Netw. Comput. Appl. 170: 102805 (2020) - [j3]Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Free-Nelson, Hyuk Lim:
Attack Graph-Based Moving Target Defense in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 17(3): 1653-1668 (2020) - [c6]Dong Seong Kim, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson:
Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense. DSN (Supplements) 2020: 43-44 - [c5]Júlio Mendonça, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Armin Zimmermann, Dong Seong Kim:
Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. SAC 2020: 1180-1189
2010 – 2019
- 2019
- [j2]Edwin Dauber, Aylin Caliskan, Richard E. Harang, Gregory Shearer, Michael J. Weisman, Frederica Free-Nelson, Rachel Greenstadt:
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. Proc. Priv. Enhancing Technol. 2019(3): 389-408 (2019) - [c4]Jargalsaikhan Narantuya, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Nelson:
SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers. DSN (Supplements) 2019: 15-16 - [c3]Dilli P. Sharma, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim:
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. ICC 2019: 1-6 - [c2]Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, Frederica Nelson, Hyuk Lim:
Poster: Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks. MobiCom 2019: 103:1-103:3 - [c1]Cole Dishington, Dilli P. Sharma, Dong Seong Kim, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson:
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks. TrustCom/BigDataSE 2019: 288-295 - [i1]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. CoRR abs/1909.08092 (2019) - 2018
- [j1]Marcello Cinque, Stefano Russo, Christian Esposito, Kim-Kwang Raymond Choo, Frederica Free-Nelson, Charles A. Kamhoua:
Cloud Reliability: Possible Sources of Security and Legal Issues? IEEE Cloud Comput. 5(3): 31-38 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-10 18:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint