Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bob G Schlicher is active.

Publication


Featured researches published by Bob G Schlicher.


Scientometrics | 2012

A study of scientometric methods to identify emerging technologies via modeling of milestones

Robert K. Abercrombie; Akaninyene W. Udoeyop; Bob G Schlicher

This work examines a scientometric model that tracks the emergence of an identified technology from initial discovery (via original scientific and conference literature), through critical discoveries (via original scientific, conference literature and patents), transitioning through Technology Readiness Levels (TRLs) and ultimately on to commercial application. During the period of innovation and technology transfer, the impact of scholarly works, patents and on-line web news sources are identified. As trends develop, currency of citations, collaboration indicators, and on-line news patterns are identified. The combinations of four distinct and separate searchable on-line networked sources (i.e., scholarly publications and citation, patents, news archives, and on-line mapping networks) are assembled to become one collective network (a dataset for analysis of relations). This established network becomes the basis from which to quickly analyze the temporal flow of activity (searchable events) for the example subject domain we investigated.


hawaii international conference on system sciences | 2014

Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation

Robert K. Abercrombie; Bob G Schlicher; Frederick T. Sheldon

Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From these five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.


Engineering Applications of Artificial Intelligence | 2015

An interactive ontology-driven information system for simulating background radiation and generating scenarios for testing special nuclear materials detection algorithms

Alexandre Sorokine; Bob G Schlicher; Richard C. Ward; Michael C Wright; Kara L. Kruse; Budhendra L. Bhaduri; Alexander Slepoy

This paper describes an original approach to generate scenarios for the purpose of testing the algorithms used to detect special nuclear materials (SNM) that incorporates the use of ontologies. Separating the signal of SNM from the background requires sophisticated algorithms. To assist in developing such algorithms, there is a need for scenarios that capture a very wide range of variables affecting the detection process, depending on the type of detector being used. To provide such a capability, we developed an ontology-driven information system (ODIS) for generating scenarios that can be used for testing of algorithms for SNM detection. The Ontology-Driven Scenario Generator (ODSG) is an ODIS based on information supplied by subject matter experts and other documentation. The details of the creation of the ontology, the development of the ontology-driven information system, and the design of the web user interface (UI) are presented along with specific examples of scenarios generated using the ODSG. We demonstrate that the paradigm behind the ODSG is capable of addressing the problem of semantic complexity at both the user and developer levels. Compared to traditional approaches, an ODIS provides benefits such as faithful representation of the users? domain conceptualization, simplified management of very large and semantically diverse datasets, and the ability to handle frequent changes to the application and the UI. The approach makes possible the generation of a much larger number of specific scenarios based on limited user-supplied information.


hawaii international conference on system sciences | 2016

Towards Reducing the Data Exfiltration Surface for the Insider Threat

Bob G Schlicher; Lawrence Paul MacIntyre; Robert K. Abercrombie

Unauthorized data exfiltrations from both insiders and outsiders are costly and damaging. Network communication resources can be used for transporting data illicitly out of the enterprise or cloud. Combined with built-in malware copying utilities, we define this set of tools as comprising the Data Exfiltration Surface (DXS). For securing valuable data, it is desirable to reduce the DXS and maintain controls on the egress points. Our approach is to host the data in a protected enclave that includes novel Software Data Diode (SDD) installed on a secured, border gateway. The SDD allows copying data into the enclave systems but denies data from being copied out. Simultaneously, it permits remote access with remote desktop and console applications. Our tests demonstrate that we are able to effectively reduce the DXS and we are able to protect data from being exfiltrated through the use of the SDD.


cyber security and information intelligence research workshop | 2011

Secure VM for monitoring industrial process controllers

Dipankar Dasgupta; Mohammad Hassan Ali; Robert K. Abercrombie; Bob G Schlicher; Frederick T. Sheldon; Marco Carvalho

In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicated host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.


Proceedings of the 10th Annual Cyber and Information Security Research Conference on | 2015

Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems

Robert K. Abercrombie; Frederick T. Sheldon; Bob G Schlicher

In cybersecurity, there are many influencing economic factors to weigh. This paper considers the defender-practitioner stakeholder points-of-view that involve cost combined with development and deployment considerations. Some examples include the cost of countermeasures, training and maintenance as well as the lost opportunity cost and actual damages associated with a compromise. The return on investment (ROI) from countermeasures comes from saved impact costs (i.e., losses from violating availability, integrity, confidentiality or privacy requirements). A measured approach that informs cybersecurity practice is pursued toward maximizing ROI. To this end for example, ranking threats based on their potential impact focuses security mitigation and control investments on the highest value assets, which represent the greatest potential losses. The traditional approach uses risk exposure (calculated by multiplying risk probability by impact). To address this issue in terms of security economics, we introduce the notion of Cybernomics. Cybernomics considers the cost/benefits to the attacker/defender to estimate risk exposure. As the first step, we discuss the likelihood that a threat will emerge and whether it can be thwarted and if not what will be the cost (losses both tangible and intangible). This impact assessment can provide key information for ranking cybersecurity threats and managing risk.


Archive | 2006

Method and system for determining a volume of an object from two-dimensional images

Robert K. Abercrombie; Bob G Schlicher


Archive | 2013

Scientometric Methods for Identifying Emerging Technologies

Robert K. Abercrombie; Bob G Schlicher; Frederick T. Sheldon


ISSI | 2015

A Computing Environment to Support Repeatable Scientific Big Data Experimentation of World-Wide Scientific Literature.

Bob G Schlicher; James J. Kulesz; Robert K. Abercrombie; Kara L. Kruse


Archive | 2013

Analysis of Search Results for the Clarification and Identification of Technology Emergence (AR-CITE)

Robert K. Abercrombie; Bob G Schlicher; Frederick T. Sheldon

Collaboration


Dive into the Bob G Schlicher's collaboration.

Top Co-Authors

Avatar

Robert K. Abercrombie

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lee M. Hively

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Kara L. Kruse

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Alexandre Sorokine

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Michael C Wright

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Richard C. Ward

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Stacy J. Prowell

Oak Ridge National Laboratory

View shared research outputs
Top Co-Authors

Avatar

Alexander Slepoy

Lawrence Berkeley National Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge