<?xml version="1.0"?>
<dblpperson name="Chad A. Bollmann" pid="259/8705" n="21">
<person key="homepages/259/8705" mdate="2023-02-16">
<author pid="259/8705">Chad A. Bollmann</author>
<url>https://orcid.org/0000-0001-8812-9391</url>
</person>
<r><inproceedings key="conf/hicss/MartinMB25" mdate="2025-10-02">
<author pid="213/5746">Bryan Martin</author>
<author pid="416/7458">William McCurdy</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Analyzing Changes in the Self-similarity of Industrial Control System Network Traffic Caused by Bursty Sources.</title>
<pages>1-10</pages>
<year>2025</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://doi.org/10.24251/HICSS.2025.835</ee>
<crossref>conf/hicss/2025</crossref>
<url>db/conf/hicss/hicss2025.html#MartinMB25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/TsamisBHS25" mdate="2025-10-02">
<author pid="364/0914">Nick Tsamis</author>
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="167/7329">Britta Hale</author>
<author pid="78/5701">James Scrofani</author>
<title>Introduction to the Minitrack on Applied Security Through Cyber Innovation and Implementation.</title>
<pages>1-2</pages>
<year>2025</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://doi.org/10.24251/HICSS.2025.834</ee>
<crossref>conf/hicss/2025</crossref>
<url>db/conf/hicss/hicss2025.html#TsamisBHS25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/HaleTSB24" mdate="2024-01-04">
<author pid="167/7329">Britta Hale</author>
<author pid="364/0914">Nick Tsamis</author>
<author pid="78/5701">James Scrofani</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Introduction to the Minitrack on Critical Infrastructure and Cyber Systems.</title>
<pages>7353-7354</pages>
<year>2024</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://hdl.handle.net/10125/107268</ee>
<crossref>conf/hicss/2024</crossref>
<url>db/conf/hicss/hicss2024.html#HaleTSB24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cns/MartinB23" mdate="2023-11-13">
<author pid="213/5746">Bryan Martin</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Self-similarity based network anomaly detection for industrial control systems.</title>
<pages>1-6</pages>
<year>2023</year>
<booktitle>CNS</booktitle>
<ee>https://doi.org/10.1109/CNS59707.2023.10288656</ee>
<crossref>conf/cns/2023</crossref>
<url>db/conf/cns/cns2023.html#MartinB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/HaleSB23" mdate="2023-02-16">
<author pid="167/7329">Britta Hale</author>
<author pid="78/5701">James Scrofani</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security.</title>
<pages>6704-6705</pages>
<year>2023</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://hdl.handle.net/10125/103444</ee>
<crossref>conf/hicss/2023</crossref>
<url>db/conf/hicss/hicss2023.html#HaleSB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icufn/MartinSB23" mdate="2023-08-17">
<author pid="213/5746">Bryan Martin</author>
<author pid="352/9894">Jacob Snyder</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Self-Similarity of Traffic Within a 5G Standalone Network.</title>
<pages>533-538</pages>
<year>2023</year>
<booktitle>ICUFN</booktitle>
<ee>https://doi.org/10.1109/ICUFN57995.2023.10201198</ee>
<crossref>conf/icufn/2023</crossref>
<url>db/conf/icufn/icufn2023.html#MartinSB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/MartinB23" mdate="2024-04-16">
<author pid="213/5746">Bryan Martin</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Characterizing Changes in Self-Similarity Between Edge and Core Network Traffic.</title>
<pages>1-4</pages>
<year>2023</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN58197.2023.10223334</ee>
<crossref>conf/lcn/2023</crossref>
<url>db/conf/lcn/lcn2023.html#MartinB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/BollmannSRH22" mdate="2022-05-11">
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="78/5701">James Scrofani</author>
<author pid="142/7932">John D. Roth</author>
<author pid="167/7329">Britta Hale</author>
<title>Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security.</title>
<pages>1-2</pages>
<year>2022</year>
<booktitle>HICSS</booktitle>
<ee type="oa">http://hdl.handle.net/10125/80255</ee>
<crossref>conf/hicss/2022</crossref>
<url>db/conf/hicss/hicss2022.html#BollmannSRH22</url>
</inproceedings>
</r>
<r><article key="journals/compsec/BollmannTM21" mdate="2023-08-28">
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="45/2664">Murali Tummala</author>
<author pid="83/2088">John C. McEachen</author>
<title>Resilient real-time network anomaly detection using novel non-parametric statistical tests.</title>
<pages>102146</pages>
<year>2021</year>
<volume>102</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2020.102146</ee>
<ee>https://www.wikidata.org/entity/Q115050982</ee>
<url>db/journals/compsec/compsec102.html#BollmannTM21</url>
</article>
</r>
<r><article key="journals/computer/LanoueBMRW21" mdate="2023-08-28">
<author pid="290/5574">Matthew Lanoue</author>
<author pid="259/8705">Chad A. Bollmann</author>
<author orcid="0000-0003-3777-9858" pid="32/4904">James Bret Michael</author>
<author orcid="0000-0001-6043-9478" pid="142/7932">John D. Roth</author>
<author orcid="0000-0002-7122-3055" pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<title>An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities.</title>
<pages>76-84</pages>
<year>2021</year>
<volume>54</volume>
<journal>Computer</journal>
<number>4</number>
<ee>https://doi.org/10.1109/MC.2021.3057059</ee>
<ee>https://www.wikidata.org/entity/Q114255964</ee>
<url>db/journals/computer/computer54.html#LanoueBMRW21</url>
</article>
</r>
<r><inproceedings key="conf/hicss/ScrofaniBRH21" mdate="2022-05-04">
<author pid="78/5701">James Scrofani</author>
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="142/7932">John D. Roth</author>
<author pid="167/7329">Britta Hale</author>
<title>Introduction to the Minitrack on Cyber Systems: Their Science, Engineering, and Security.</title>
<pages>1-2</pages>
<year>2021</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://hdl.handle.net/10125/71465</ee>
<crossref>conf/hicss/2021</crossref>
<url>db/conf/hicss/hicss2021.html#ScrofaniBRH21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/milcom/KanthBTM21" mdate="2022-01-12">
<author pid="263/3319">Vikram Kanth</author>
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="45/2664">Murali Tummala</author>
<author pid="83/2088">John C. McEachen</author>
<title>A Novel Adaptable Framework for Covert Communications in Anonymized Protocols.</title>
<pages>451-457</pages>
<year>2021</year>
<booktitle>MILCOM</booktitle>
<ee>https://doi.org/10.1109/MILCOM52596.2021.9652912</ee>
<crossref>conf/milcom/2021</crossref>
<url>db/conf/milcom/milcom2021.html#KanthBTM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spects/LanoueMB21" mdate="2022-01-03">
<author pid="290/5574">Matthew Lanoue</author>
<author pid="32/4904">James Bret Michael</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks.</title>
<pages>1-8</pages>
<year>2021</year>
<booktitle>SPECTS</booktitle>
<ee>https://doi.org/10.23919/SPECTS52716.2021.9639276</ee>
<crossref>conf/spects/2021</crossref>
<url>db/conf/spects/spects2021.html#LanoueMB21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/RothSB20" mdate="2022-05-04">
<author pid="142/7932">John D. Roth</author>
<author pid="78/5701">James Scrofani</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Introduction to the Minitrack on The Science and Engineering of Cyber Systems.</title>
<pages>1-2</pages>
<year>2020</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://hdl.handle.net/10125/64561</ee>
<crossref>conf/hicss/2020</crossref>
<url>db/conf/hicss/hicss2020.html#RothSB20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icspcs/SafarBTM20" mdate="2021-01-15">
<author pid="259/8448">Jamie L. Safar</author>
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="45/2664">Murali Tummala</author>
<author pid="83/2088">John C. McEachen</author>
<title>A Novel L&#233;vy-Impulse Mixture Based Connection Model for Computer Network Traffic.</title>
<pages>1-6</pages>
<year>2020</year>
<booktitle>ICSPCS</booktitle>
<ee>https://doi.org/10.1109/ICSPCS50536.2020.9310015</ee>
<crossref>conf/icspcs/2020</crossref>
<url>db/conf/icspcs/icspcs2020.html#SafarBTM20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/ScrofaniRB19" mdate="2022-05-04">
<author pid="78/5701">James Scrofani</author>
<author pid="142/7932">John D. Roth</author>
<author pid="259/8705">Chad A. Bollmann</author>
<title>Introduction to the Minitrack on Cyber Systems and Analytics.</title>
<pages>1-2</pages>
<year>2019</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://hdl.handle.net/10125/60372</ee>
<crossref>conf/hicss/2019</crossref>
<url>db/conf/hicss/hicss2019.html#ScrofaniRB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icspcs/GonzalezGB19" mdate="2020-10-25">
<author pid="57/3154">Jorge Gonzalez</author>
<author pid="260/8046">Joshua Clymer</author>
<author orcid="0000-0001-8812-9391" pid="259/8705">Chad A. Bollmann</author>
<title>Aggregated Impulses: Towards Explanatory Models for Self-Similar Alpha Stable Network Traffic.</title>
<pages>1-10</pages>
<year>2019</year>
<booktitle>ICSPCS</booktitle>
<ee>https://doi.org/10.1109/ICSPCS47537.2019.9008701</ee>
<crossref>conf/icspcs/2019</crossref>
<url>db/conf/icspcs/icspcs2019.html#GonzalezGB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icspcs/SafarTMB19" mdate="2020-11-20">
<author pid="259/8448">Jamie L. Safar</author>
<author pid="45/2664">Murali Tummala</author>
<author pid="83/2088">John C. McEachen</author>
<author orcid="0000-0001-8812-9391" pid="259/8705">Chad A. Bollmann</author>
<title>Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model.</title>
<pages>1-6</pages>
<year>2019</year>
<booktitle>ICSPCS</booktitle>
<ee>https://doi.org/10.1109/ICSPCS47537.2019.9008687</ee>
<crossref>conf/icspcs/2019</crossref>
<url>db/conf/icspcs/icspcs2019.html#SafarTMB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sarnoff/GonzalezCB19" mdate="2020-10-25">
<author pid="57/3154">Jorge Gonzalez</author>
<author pid="260/8046">Joshua Clymer</author>
<author orcid="0000-0001-8812-9391" pid="259/8705">Chad A. Bollmann</author>
<title>Towards An Explanatory Model for Network Traffic.</title>
<pages>1-3</pages>
<year>2019</year>
<booktitle>Sarnoff Symposium</booktitle>
<ee>https://doi.org/10.1109/Sarnoff47838.2019.9067816</ee>
<crossref>conf/sarnoff/2019</crossref>
<url>db/conf/sarnoff/sarnoff2019.html#GonzalezCB19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/BollmannTMSK18" mdate="2022-05-04">
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="45/2664">Murali Tummala</author>
<author pid="83/2088">John C. McEachen</author>
<author pid="78/5701">Jim Scrofani</author>
<author pid="220/4901">Mark Kragh</author>
<title>Techniques to Improve Stable Distribution Modeling of Network Traffic.</title>
<year>2018</year>
<booktitle>HICSS</booktitle>
<ee type="oa">https://hdl.handle.net/10125/50578</ee>
<ee>http://aisel.aisnet.org/hicss-51/st/cyber_threat_intelligence/2</ee>
<crossref>conf/hicss/2018</crossref>
<url>db/conf/hicss/hicss2018.html#BollmannTMSK18</url>
<pages>1-8</pages>
</inproceedings>
</r>
<r><inproceedings key="conf/acssc/BollmannTM17" mdate="2020-11-20">
<author pid="259/8705">Chad A. Bollmann</author>
<author pid="45/2664">Murali Tummala</author>
<author pid="83/2088">John C. McEachen</author>
<title>Representation of positive alpha-stable network traffic through levy mixtures.</title>
<pages>1460-1464</pages>
<year>2017</year>
<booktitle>ACSSC</booktitle>
<ee>https://doi.org/10.1109/ACSSC.2017.8335597</ee>
<crossref>conf/acssc/2017</crossref>
<url>db/conf/acssc/acssc2017.html#BollmannTM17</url>
</inproceedings>
</r>
<coauthors n="17" nc="2">
<co c="1"><na f="c/Clymer:Joshua" pid="260/8046">Joshua Clymer</na></co>
<co c="1"><na f="g/Gonzalez:Jorge" pid="57/3154">Jorge Gonzalez</na></co>
<co c="0"><na f="h/Hale:Britta" pid="167/7329">Britta Hale</na></co>
<co c="0"><na f="k/Kanth:Vikram" pid="263/3319">Vikram Kanth</na></co>
<co c="0"><na f="k/Kragh:Mark" pid="220/4901">Mark Kragh</na></co>
<co c="0"><na f="l/Lanoue:Matthew" pid="290/5574">Matthew Lanoue</na></co>
<co c="0"><na f="m/Martin:Bryan" pid="213/5746">Bryan Martin</na></co>
<co c="0"><na f="m/McCurdy:William" pid="416/7458">William McCurdy</na></co>
<co c="0"><na f="m/McEachen:John_C=" pid="83/2088">John C. McEachen</na></co>
<co c="0"><na f="m/Michael:James_Bret" pid="32/4904">James Bret Michael</na></co>
<co c="0"><na f="r/Roth:John_D=" pid="142/7932">John D. Roth</na></co>
<co c="0"><na f="s/Safar:Jamie_L=" pid="259/8448">Jamie L. Safar</na></co>
<co c="0" n="3"><na f="s/Scrofani:James_W=" pid="78/5701">James W. Scrofani</na><na>James Scrofani</na><na>Jim Scrofani</na></co>
<co c="0"><na f="s/Snyder:Jacob" pid="352/9894">Jacob Snyder</na></co>
<co c="0"><na f="t/Tsamis:Nick" pid="364/0914">Nick Tsamis</na></co>
<co c="0"><na f="t/Tummala:Murali" pid="45/2664">Murali Tummala</na></co>
<co c="0"><na f="w/Wijesekera:Duminda" pid="w/DumindaWijesekera">Duminda Wijesekera</na></co>
</coauthors>
</dblpperson>

