Robert A Bridges Cybersecurity Research Mathematician & Cybersecurity Research Group Leader Contact bridgesra@ornl.gov | 865.241.0319 All Publications A comprehensive guide to CAN IDS data and introduction of the ROAD dataset AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors... A Privacy-Aware Federated Learning Framework for Distributed Energy Resource Analytics in Constrained Environments Testing SOAR Tools in Use Beyond the Hype: An Evaluation of Commercially Available Machine-Learning-Based Malware Detectors Detecting CAN Masquerade Attacks with Signal Clustering Similarity... CAN-D: A Modular Four-Step Pipeline for Comprehensively Decoding Controller Area Network Data... D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation... What Clinical Trials Can Teach Us About the Development of More Resilient AI for Cybersecurity... Multi‐hypothesis comparison of Farquhar and Collatz photosynthesis models reveals the unexpected influence of empirical ass... Assembling a Cyber Range to Evaluate Artificial Intelligence / Machine Learning (AI/ML) Security Tools... Time-Based CAN Intrusion Detection Benchmark... An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center ACTT: Automotive CAN Tokenization and Translation... A Survey of Intrusion Detection Systems Leveraging Host Data... Vehicle Ad-Hoc Networks: Services, Security, and Privacy Mathematical Approaches to Secure In-Vehicle Networks... Towards a CAN IDS Based on a Neural Network Data Field Predictor... Defining a Metric Space of Host Logs and Operational Use Cases... Situ: Identifying and Explaining Suspicious Behavior in Networks... Towards Malware Detection via CPU Power Consumption: Data Collection Design and Analytics... Exploiting the Shape of CAN Data for In-Vehicle Intrusion Detection... Forming IDEAS: Interactive Data Exploration & Analysis System EGBTER: Capturing Degree Distribution, Clustering Coefficients, and Community Structure in a Single Random Graph Model... Cybersecurity Automated Information Extraction Techniques: Drawbacks of Current Methods, and Enhanced Extractors... Pagination Current page 1 Page 2 Next page ›› Last page Last » Key Links ORCID Bobby's Homepage Organizations National Security Sciences Directorate Cyber Resilience and Intelligence Division Advanced Intelligent Systems Section Emerging Cyber Technologies Research