Justin M. Beaver
Justin M. Beaver
Distinguished Research Fellow, Lirio LLC
Verified email at
Cited by
Cited by
Machine learning for power system disturbance and cyber-attack discrimination
RCB Hink, JM Beaver, MA Buckner, T Morris, U Adhikari, S Pan
2014 7th International symposium on resilient control systems (ISRCS), 1-8, 2014
An evaluation of machine learning methods to detect malicious SCADA communications
JM Beaver, RC Borges-Hink, MA Buckner
2013 12th international conference on machine learning and applications 2, 54-59, 2013
The effects of development team skill on software product quality
JM Beaver, GA Schiavone
ACM SIGSOFT Software Engineering Notes 31 (3), 1-5, 2006
Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training
CT Symons, JM Beaver
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
In-situ trainable intrusion detection system
CT Symons, JM Beaver, R Gillen, TE Potok
US Patent 9,497,204, 2016
A learning system for discriminating variants of malicious network traffic
JM Beaver, CT Symons, RE Gillen
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
An information fusion framework for threat assessment
JM Beaver, RA Kerekes, JN Treadwell
2009 12th International Conference on Information Fusion, 1903-1910, 2009
A stigmergy approach for open source software developer community simulation
X Cui, J Beaver, J Treadwell, T Potok, L Pullum
2009 International Conference on Computational Science and Engineering 4 …, 2009
Predicting software suitability using a bayesian belief network
JM Beaver, GA Schiavone, JS Berrios
Fourth International Conference on Machine Learning and Applications (ICMLA …, 2005
Matisse: A visual analytics system for exploring emotion trends in social media text streams
CA Steed, M Drouhard, J Beaver, J Pyle, PL Bogen
2015 IEEE International Conference on Big Data (Big Data), 807-814, 2015
Hierarchical clustering and visualization of aggregate cyber data
RM Patton, JM Beaver, CA Steed, TE Potok, JN Treadwell
2011 7th International Wireless Communications and Mobile Computing …, 2011
Modeling success in FLOSS project groups
JM Beaver, X Cui, JL St Charles, TE Potok
Proceedings of the 5th international Conference on Predictor Models in …, 2009
How do information security workers use host data? a summary of interviews with security analysts
RA Bridges, MD Iannacone, JR Goodall, JM Beaver
arXiv preprint arXiv:1812.02867, 2018
Dimensionality reduction particle swarm algorithm for high dimensional clustering
X Cui, JM Beaver, JS Charles, TE Potok
2008 IEEE Swarm Intelligence Symposium, 1-6, 2008
Visualization techniques for computer network defense
JM Beaver, CA Steed, RM Patton, X Cui, M Schultz
Sensors, and Command, Control, Communications, and Intelligence (C3I …, 2011
Host-based data exfiltration detection via system call sequences
B Jewell, J Beaver
ICIW2011-Proceedings of the 6th International Conference on Information …, 2011
Text stream trend analysis using multiscale visual analytics with applications to social media systems
CA Steed, J Beaver, PL Bogen II, M Drouhard, J Pyle
ACM IUI workshop on visual text analytics, 2015
Beyond the hype: A real-world evaluation of the impact and cost of machine learning-based malware detection
RA Bridges, S Oesch, ME Verma, MD Iannacone, KMT Huffer, B Jewell, ...
arXiv preprint arXiv:2012.09214, 2020
An assessment of the usability of machine learning based tools for the security operations center
S Oesch, R Bridges, J Smith, J Beaver, J Goodall, K Huffer, C Miles, ...
2020 International Conferences on Internet of Things (iThings) and IEEE …, 2020
An approach to the automated determination of host information value
JM Beaver, RM Patton, TE Potok
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20