Follow
Dr. Tyson Brooks
Title
Cited by
Cited by
Year
Security vulnerability analysis in virtualized computing environments
TT Brooks, C Caicedo, JS Park
International Journal of Intelligent Computing Research 3 (1/2), 277-291, 2012
382012
Cyber-Assurance for the Internet of Things
T Brooks
Wiley-IEEE Press 1, 1-520, 2016
252016
Conceptualizing a secure wireless cloud
T Brooks, J Robinson, L McKnight
International Journal of Cloud Computing and Services Science 1 (3), 89, 2012
142012
Security challenges and countermeasures for trusted virtualized computing environments
T Brooks, C Caicedo, J Park
World Congress on Internet Security (WorldCIS-2012), 117-122, 2012
112012
Which comes first, strategy or architecture?
T Parker, T Brooks
Journal of Enterprise Architecture 4 (4), 46-57, 2008
92008
Principles for implementing a service-oriented enterprise architecture
T Brooks
SOA Magazine, 0509-2, 2009
82009
Secure the edge? Understanding the risk towards wireless grids Edgeware technology
T Brooks, M Kaarst-Brown, C Caicedo, J Park, LW McKnight
International Journal of Internet Technology and Secured Transactions 8 5 (3 …, 2014
62014
The Professionalization of the Hacker Industry
T Brooks
International Journal of Computer Science & Information Technology (IJCSIT …, 2022
52022
A failure to communicate: security vulnerabilities in the gridstreamx edgeware application
T Brooks, M Kaarst-Brown, C Caicedo, J Park, L McKnight
8th International Conference for Internet Technology and Secured …, 2013
42013
Securing wireless grids: architecture designs for secure wiglet-to-wiglet interfaces
T Brooks, L McKnight
International Journal of Information and Network Security (IJINS) 2 (1), 1-16, 2013
42013
Service-oriented enterprise architecture (SOEA) conceptual design through data architecture
T Brooks
Journal of Enterprise Architecture 5 (4), 16-26, 2009
42009
Edgeware Security Risk Management: A Three Essay Thesis on Cloud, Virtualization and Wireless Grid Vulnerabilities.
TT Brooks
ProQuest LLC, 2013
32013
Authentication Devices in Fog-Mobile Edge Computing Environments Through a Wireless Grid Resource Sharing Protocol
T Brooks
International Journal of Ubiquitous Computing (IJU) 13 (1/2), 1-17, 2022
22022
Introduction to the Minitrack on Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems
T Brooks, SK Chin
22021
An internet control device embedded sensor agent
T Brooks
International Journal of Internet of Things and Cyber-Assurance 1 (3-4), 267-290, 2020
22020
IEEE access special section editorial: Recent advances in computational intelligence paradigms for security and privacy for fog and mobile edge computing
BB Gupta, Y Rahulamathavan, S Yamaguchi, T Brooks, Z Yan
IEEE Access 7, 134063-134070, 2019
22019
Cyber-Physical Intelligence
T Brooks
Information System Security Association (ISSA) 16 (4), 36-41, 2018
22018
A Steady-State Framework for Assessing Security Mechanisms in a Cloud-of-Things Architecture
T Brooks, L McKnight
Cyber-Assurance for the Internet of Things 1, 227-248, 2016
22016
Wearable IoT Computing: Interface, Emotions, Wearer's Culture and Security/Privacy Concerns
R McCloud, M Lerski, J Park, T Brooks
Cyber-Assurance for the Internet of Things 1, 177-186, 2016
22016
Cyber-Assurance Through Embedded Security for The Internet of Things
T Brooks, J Park
Cyber-Assurance for the Internet of Things 1, 101-128, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20