default search action
9. CISR 2014: Oak Ridge, TN, USA
- Robert K. Abercrombie, Jeffrey Todd McDonald:
Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014. ACM 2014, ISBN 978-1-4503-2812-8
Tailored trustworthy spaces
- Sun-il Kim, William Edmonds, Nnamdi Nwanze:
On GPU accelerated tuning for a payload anomaly-based network intrusion detection scheme. 1-4 - Steven Noel, Sushil Jajodia:
Metrics suite for network attack graph analytics. 5-8 - Jin Dong, Seddik M. Djouadi, James J. Nutaro, Phani Teja Kuruganti:
Secure control systems with application to cyber-physical systems. 9-12 - Nathan Wallace, Stanislav Ponomarev, Travis Atkison:
A dimensional transformation scheme for power grid cyber event detection. 13-16 - Lakshmi Manohar Rao Velicheti, Dennis C. Feiock, Manjula Peiris, Rajeev R. Raje, James H. Hill:
Towards modeling the behavior of static code analysis tools. 17-20 - Stanislav Ponomarev, Nathan Wallace, Travis Atkison:
Detection of SSH host spoofing in control systems through network telemetry analysis. 21-24
Moving target & designed-in-security
- Lindsey N. Whitehurst, Todd R. Andel, Jeffrey Todd McDonald:
Exploring security in ZigBee networks. 25-28 - Shaun-Inn Wu, Hieu Trong Ho:
Image enhanced CAPTCHA for web security. 29-32 - Xiaohong Yuan, Emmanuel Borkor Nuakoh, Jodria S. Beal, Huiming Yu:
Retrieving relevant CAPEC attack patterns for secure software development. 33-36 - Matthew Sherburne, Randy C. Marchany, Joseph G. Tront:
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. 37-40 - Minzhe Guo, Prabir Bhattacharya:
Diverse virtual replicas for improving intrusion tolerance in cloud. 41-44 - Christopher Robinson-Mallett:
Coordinating security and safety engineering processes in automotive electronics development. 45-48 - Bogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall:
Integration of external data sources with cyber security data warehouse. 49-52 - Mohamed Fazeen, Garima Bajwa, Ram Dantu:
Context-aware multimedia encryption in mobile platforms. 53-56 - Bader Alwasel, Stephen D. Wolthusen:
Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets. 57-60 - Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje:
Towards trust-based recommender systems for online software services. 61-64 - Abhijit Kumar Nag, Dipankar Dasgupta:
An adaptive approach for continuous multi-factor authentication in an identity eco-system. 65-68 - Brian Lucas, Errin W. Fulp, David J. John, Daniel A. Cañas:
An initial framework for evolving computer configurations as a moving target defense. 69-72 - Rui Zhuang, Scott A. DeLoach, Xinming Ou:
A model for analyzing the effect of moving target defenses on enterprise networks. 73-76
Cyber economic incentives & science of security
- Ed Goff, Cliff Glantz, Rebecca Massello:
Cybersecurity procurement language for energy delivery systems. 77-79 - Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili, Frederick T. Sheldon:
Quantifying availability in SCADA environments using the cyber security metric MFC. 81-84 - Alaa Darabseh, Akbar Siami Namin:
The accuracy of user authentication through keystroke features using the most frequent words. 85-88 - Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak:
Modeling and simulation of electric power substation employing an IEC 61850 network. 89-92 - George Chin Jr., Sutanay Choudhury, John Feo, Lawrence B. Holder:
Predicting and detecting emerging cyberattack patterns using StreamWorks. 93-96 - Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder:
NICE: endpoint-based topology discovery. 97-100 - George Louthan, Michael Haney, Phoebe Hardwicke, Peter J. Hawrylak, John Hale:
Hybrid extensions for stateful attack graphs. 101-104 - Qian Chen, Sherif Abdelwahed:
Towards realizing self-protecting SCADA systems. 105-108 - Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin:
Cyber-security analysis of smart grid SCADA systems with game models. 109-112 - Liang Kong, Gavin Bauer, John Hale:
Location-based device grouping for function restriction. 113-116
Tailored trustworthy spaces - cyber economic incentives & science of security
- Jacob Torrey:
MoRE: measurement of running executables. 117-120 - Michael Haney, Mauricio Papa:
A framework for the design and deployment of a SCADA honeynet. 121-124
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.