Security vulnerability analysis in virtualized computing environments TT Brooks, C Caicedo, JS Park International Journal of Intelligent Computing Research 3 (1/2), 277-291, 2012 | 38 | 2012 |
Cyber-Assurance for the Internet of Things T Brooks Wiley-IEEE Press 1, 1-520, 2016 | 25 | 2016 |
Conceptualizing a secure wireless cloud T Brooks, J Robinson, L McKnight International Journal of Cloud Computing and Services Science 1 (3), 89, 2012 | 14 | 2012 |
Security challenges and countermeasures for trusted virtualized computing environments T Brooks, C Caicedo, J Park World Congress on Internet Security (WorldCIS-2012), 117-122, 2012 | 11 | 2012 |
Which comes first, strategy or architecture? T Parker, T Brooks Journal of Enterprise Architecture 4 (4), 46-57, 2008 | 9 | 2008 |
Principles for implementing a service-oriented enterprise architecture T Brooks SOA Magazine, 0509-2, 2009 | 8 | 2009 |
Secure the edge? Understanding the risk towards wireless grids Edgeware technology T Brooks, M Kaarst-Brown, C Caicedo, J Park, LW McKnight International Journal of Internet Technology and Secured Transactions 8 5 (3 …, 2014 | 6 | 2014 |
The Professionalization of the Hacker Industry T Brooks International Journal of Computer Science & Information Technology (IJCSIT …, 2022 | 5 | 2022 |
A failure to communicate: security vulnerabilities in the gridstreamx edgeware application T Brooks, M Kaarst-Brown, C Caicedo, J Park, L McKnight 8th International Conference for Internet Technology and Secured …, 2013 | 4 | 2013 |
Securing wireless grids: architecture designs for secure wiglet-to-wiglet interfaces T Brooks, L McKnight International Journal of Information and Network Security (IJINS) 2 (1), 1-16, 2013 | 4 | 2013 |
Service-oriented enterprise architecture (SOEA) conceptual design through data architecture T Brooks Journal of Enterprise Architecture 5 (4), 16-26, 2009 | 4 | 2009 |
Edgeware Security Risk Management: A Three Essay Thesis on Cloud, Virtualization and Wireless Grid Vulnerabilities. TT Brooks ProQuest LLC, 2013 | 3 | 2013 |
Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol T Brooks International Journal of Ubiquitous Computing (IJU) 13 (1/2), 1-17, 2022 | 2 | 2022 |
Introduction to the Minitrack on Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems T Brooks, SK Chin | 2 | 2021 |
An internet control device embedded sensor agent T Brooks International Journal of Internet of Things and Cyber-Assurance 1 (3-4), 267-290, 2020 | 2 | 2020 |
IEEE access special section editorial: Recent advances in computational intelligence paradigms for security and privacy for fog and mobile edge computing BB Gupta, Y Rahulamathavan, S Yamaguchi, T Brooks, Z Yan IEEE Access 7, 134063-134070, 2019 | 2 | 2019 |
Cyber-Physical Intelligence T Brooks Information System Security Association (ISSA) 16 (4), 36-41, 2018 | 2 | 2018 |
A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture T Brooks, L McKnight Cyber-Assurance for the Internet of Things 1, 227-248, 2016 | 2 | 2016 |
Wearable IoT Computing: Interface, Emotions, Wearer's Culture and Security/Privacy Concerns R McCloud, M Lerski, J Park, T Brooks Cyber-Assurance for the Internet of Things 1, 177-186, 2016 | 2 | 2016 |
Cyber-Assurance Through Embedded Security for The Internet of Things T Brooks, J Park Cyber-Assurance for the Internet of Things 1, 101-128, 2016 | 2 | 2016 |