9 Publications
2022
Analytical and Empirical Evaluation of Freight Priority System in Connected Vehicle Environment
Tedla, Elsa GHainen, Alexander M and Atkison, Travis
Journal of Transportation Engineering. Part A, Systems, vol. 148, (no. 6), Jun 2022. | Journal Article
2021
Trajectory-Based Signal Control in Mixed Connected Vehicle Environments
Lidbe, Abhay DLidbe, Abhay DTedla, Elsa GTedla, Elsa GHainen, Alexander MHainen, Alexander MAtkison, Travis and Atkison, Travis
Journal of Transportation Engineering. Part A, Systems, vol. 147, (no. 5), May 2021. | Journal Article
 
Wineinformatics: Using the Full Power of the Computational Wine Wheel to Understand 21st Century Bordeaux Wines from the Reviews
Dong, ZeqingAtkison, Travis and Chen, Bernard
Beverages, vol. 7, (no. 1), 2021. | Journal Article
2018
A Forensic Enabled Data Provenance Model for Public Cloud
Haque, Shariful and Atkison, Travis
The Journal of Digital Forensics, Security and Law : JDFSL, vol. 13, (no. 3), pp. 46-64, 2018. | Journal Article
 
Wineinformatics: A Quantitative Analysis of Wine Reviewers
Chen, BernardChen, BernardVelchev, ValentinPalmer, James and Atkison, Travis
Fermentation, vol. 4, (no. 4), 2018. | Journal Article
2017
An Evolutionary Approach of Attack Graph to Attack Tree Conversion
Haque, Md S and Atkison, Travis
International Journal of Computer Network and Information Security, vol. 9, (no. 11), Nov 2017. | Journal Article
 
A POWER GRID INCIDENT IDENTIFICATION BASED ON PHYSICALLY DERIVED CYBER-EVENT DETECTION
Atkison, TravisWallace, Nathan and Cybirical
The Journal of Digital Forensics, Security and Law : JDFSL, vol. 12, (no. 2), pp. 5-17, 2017. | Journal Article
 
On the detection of cyber-events in the grid using PCA
Wallace, Nathan and Atkison, Travis
International Journal of Critical Infrastructures, vol. 13, (no. 2-3), pp. 96-112, 2017. | Journal Article
2011
Using Executable Slicing to Improve Rogue Software Detection Algorithms
Durand, JanFlores, JuanAtkison, TravisKraft, Nicholas A and Smith, Randy
International Journal of Secure Software Engineering, vol. 2, (no. 2), pp. 53-64, 2011. | Journal Article