default search action
Peter J. Hawrylak
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Noah L. Schrick, Peter J. Hawrylak:
State Space Explosion Mitigation for Large-Scale Attack and Compliance Graphs Using Synchronous Exploit Firing. IEEE Open J. Comput. Soc. 4: 147-157 (2023) - 2020
- [c21]Ming Li, Peter J. Hawrylak, John Hale:
Implementing an Attack Graph Generator in CUDA. IPDPS Workshops 2020: 730-738
2010 – 2019
- 2019
- [c20]Zachary Hill, John Hale, Mauricio Papa, Peter J. Hawrylak:
Using Bro with a Simulation Model to Detect Cyber-Physical Attacks in a Nuclear Reactor. ICDIS 2019: 22-27 - [c19]Zachary Hill, John Hale, Mauricio Papa, Peter J. Hawrylak:
Platform-Agnostic Language to Map Control Primitives to SCADA Communication Protocols. ICDIS 2019: 82-88 - [c18]Ming Li, Peter J. Hawrylak, John Hale:
Concurrency Strategies for Attack Graph Generation. ICDIS 2019: 174-179 - [c17]Jonathan West, John Hale, Mauricio Papa, Peter J. Hawrylak:
Automatic Identification of Critical Digital Assets. ICDIS 2019: 219-224 - [c16]Ming Li, Peter J. Hawrylak, John Hale:
Combining OpenCL and MPI to Support Heterogeneous Computing on a Cluster. PEARC 2019: 5:1-5:6 - [c15]Peter J. Hawrylak, George Louthan, John Hale, Mauricio Papa:
Practical Cyber-Security Solutions for the Science DMZ. PEARC 2019: 50:1-50:6 - 2018
- [c14]Rujit Raval, Alison Maskus, Benjamin Saltmiras, Morgan Dunn, Peter J. Hawrylak, John Hale:
Competitive Learning Environment for Cyber-Physical System Security Experimentation. ICDIS 2018: 211-218 - [c13]Will Nichols, Zachary Hill, Peter J. Hawrylak, John Hale, Mauricio Papa:
Automatic Generation of Attack Scripts from Attack Graphs. ICDIS 2018: 267-274 - 2017
- [c12]Zachary Hill, Samuel Chen, Donald Wall, Mauricio Papa, John Hale, Peter J. Hawrylak:
Simulation and analysis framework for cyber-physical systems. CISRC 2017: 7:1-7:4 - [c11]Will Nichols, Peter J. Hawrylak, John Hale, Mauricio Papa:
Introducing priority into hybrid attack graphs. CISRC 2017: 12:1-12:4 - [c10]Peter J. Hawrylak, John Hale, Mauricio Papa:
Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce. PEARC 2017: 53:1-53:4 - 2016
- [c9]Kyle Cook, Thomas Shaw, Peter J. Hawrylak, John Hale:
Scalable Attack Graph Generation. CISRC 2016: 21:1-21:4 - [c8]Bailey Smith, Whitney Caruthers, Dalton Stewart, Peter J. Hawrylak, John Hale:
Network Modeling for Security Analytics. CISRC 2016: 22:1-22:4 - 2015
- [c7]Peter J. Hawrylak, Will Nichols, Xiang Li, Ty Johannes, Ryan DeCook, Kameron Mongold, Claire Cornell, LeRoy Albert Flint, Anshuman Singh:
HydroSense: A self-powered wireless device for monitoring water usage in hotel showers. GHTC 2015: 314-320 - [p2]Peter J. Hawrylak, John Hale:
Data Privacy Issues with RFID in Healthcare. Medical Data Privacy Handbook 2015: 549-567 - 2014
- [c6]Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak:
Modeling and simulation of electric power substation employing an IEC 61850 network. CISR 2014: 89-92 - [c5]George Louthan, Michael Haney, Phoebe Hardwicke, Peter J. Hawrylak, John Hale:
Hybrid extensions for stateful attack graphs. CISR 2014: 101-104 - 2013
- [j10]Ajay Ogirala, Peter J. Hawrylak, Marlin H. Mickle:
Interoperability Verification in ISO 18000-7 Active RFID Systems: Experimental Setup and Results. Wirel. Pers. Commun. 68(3): 619-635 (2013) - [c4]Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak:
Estimating link availability and timing delays in ethernet-based networks. CSIIRW 2013: 46 - [c3]Matthew Butler, Steven Reed, Peter J. Hawrylak, John Hale:
Implementing graceful RFID privilege reduction. CSIIRW 2013: 54 - 2012
- [j9]Chris Hart, Peter J. Hawrylak:
Using Radio Frequency Identification (RFID) Tags to Store Medical Information Needed by First Responders: Data Format, Privacy, and Security. Int. J. Comput. Model. Algorithms Medicine 3(3): 10-26 (2012) - [j8]Peter J. Hawrylak, Nakeisha Schimke, John Hale, Mauricio Papa:
Security Risks Associated with Radio Frequency Identification in Medical Environments. J. Medical Syst. 36(6): 3491-3505 (2012) - [j7]Ajay Ogirala, Peter J. Hawrylak, Marlin H. Mickle:
Interoperability Test Methodology for ISO 18000-7 Active RFID. Wirel. Pers. Commun. 65(2): 253-271 (2012) - 2011
- [j6]Yuan Sun, Peter J. Hawrylak, Zhi-Hong Mao, Marlin H. Mickle:
A novel software-radio-defined passive RFID reading system with real-time collision resolution. Int. J. Ad Hoc Ubiquitous Comput. 8(4): 261-270 (2011) - [j5]Sree Kalyan Ravilla, Ajay Ogirala, Archana Murari, Peter J. Hawrylak, Marlin H. Mickle:
Anti-collision policy for RFID systems: fast predict tags in field algorithm. Int. J. Radio Freq. Identif. Technol. Appl. 3(3): 215-228 (2011) - [j4]Benjamin S. Mericli, Ajay Ogirala, Peter J. Hawrylak, Marlin H. Mickle:
A Passive Radio Frequency Amplifier for Radio Frequency Identification Tags. J. Low Power Electron. 7(3): 453-458 (2011) - [c2]Matthew Butler, Peter J. Hawrylak, John Hale:
Graceful privilege reduction in RFID security. CSIIRW 2011: 47 - [c1]George Louthan, Phoebe Hardwicke, Peter J. Hawrylak, John Hale:
Toward hybrid attack dependency graphs. CSIIRW 2011: 62
2000 – 2009
- 2009
- [p1]Peter J. Hawrylak, James T. Cain, Marlin H. Mickle:
Analysis Methods for Sensor Networks. Guide to Wireless Sensor Networks 2009: 635-658 - 2008
- [j3]Alex K. Jones, Swapna R. Dontharaju, Shen Chih Tung, Leonid Mats, Peter J. Hawrylak, Raymond R. Hoare, James T. Cain, Marlin H. Mickle:
Radio frequency identification prototyping. ACM Trans. Design Autom. Electr. Syst. 13(2): 29:1-29:22 (2008) - 2007
- [j2]Peter J. Hawrylak, James T. Cain, Marlin H. Mickle:
Analytic modelling methodology for analysis of energy consumption for ISO 18000-7 RFID networks. Int. J. Radio Freq. Identif. Technol. Appl. 1(4): 371-400 (2007) - 2006
- [j1]Alex K. Jones, Swapna R. Dontharaju, Shen Chih Tung, Peter J. Hawrylak, Leonid Mats, Raymond R. Hoare, James T. Cain, Marlin H. Mickle:
Passive active radio frequency identification tags. Int. J. Radio Freq. Identif. Technol. Appl. 1(1): 52-73 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint