Institutional Knowledge Map (KMap)
Map
Services
How To Use
About
Toggle theme
Loading...
Menu
Mark Patton
Senior Lecturer, Management Information Systems
Management Information Systems
Map Page
Research Area
cybersecurity,
vulnerability assessment,
internet of things,
network security,
scholarship,
anonymity,
scada,
scada systems,
benchmarking,
vulnerabilities
Grants
(5)
Sign in to view all grants
Publications
(22)
Recent
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
cybersecurity,
graph embedding,
vulnerability assessment,
unsupervised learning,
scientific infrastructure
True News Versus Fake News: How Information Spreads Online
2020
media,
online communication,
information spread,
trustworthiness,
social media
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach
2020
cybersecurity,
graph embedding,
github repositories,
unsupervised learning,
scientific cyberinfrastructure
Dark Net Ecosystem Cyber Threat Intelligence Tool
2019
dark net,
cyber threat,
ecosystem,
intelligence tool,
cybersecurity
Performance Modeling of Hyperledger Sawtooth Blockchain
2019
blockchain,
performance,
modeling,
hyperledger,
sawtooth
How Does Information Spread? An Exploratory Study of True and Fake News
2019
information propagation,
fake news,
social media,
information diffusion,
network analysis
Benchmarking Vulnerability Assessment Tools for Enhanced Cyber-Physical System CPS) Resiliency
2018
cyber-physical systems,
vulnerability assessment,
resiliency,
benchmarking,
enhanced security
Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions
2018
cybersecurity,
higher education,
automated reporting,
vulnerability assessment,
remediation
Incremental Hacker Forum Exploit Collection and Classification for Proactive Cyber Threat Intelligence: An Exploratory Study
2018
cybersecurity,
threat intelligence,
hacker forums,
exploit collection,
data classification
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach
2018
scada systems,
internet of things,
vulnerabilities,
text mining,
identification
Collaborations
(14)
Salim Hariri
Mutual work: 2 Grants﹒12 Proposals
Collaboration Details
Peter Troch
Mutual work: 3 Proposals﹒1 Grant
Collaboration Details
Hsinchun Chen
Mutual work: 5 Grants﹒25 Publications﹒32 Proposals
Collaboration Details
Beichuan Zhang
Mutual work: 2 Grants﹒6 Proposals
Collaboration Details
Jay Nunamaker
Mutual work: 1 Publication
Collaboration Details
Page 1 of 3
Previous page
Next page
News
(3)
UArizona Researchers Go on Offense, Defense in Battle Against Hackers
2019
Cybersecurity Students Benefit From Scholarship Program
2019
$5.4M in Cybersecurity Grants Awarded to UA Regents' Professor Hsinchun Chen
2013
Courses
(8)
Strategic Management of Information Systems
Information Security, Risk Mgmt, Disaster Recovery
Using and Managing Information Systems
Business Intensive I
Information Security Risk Management
Page 1 of 2
Previous page
Next page
10+ Collaborators
$939.7K / $12.7M Funding
4+ Grants
20+ Publications
7+ Courses