Stop the war!
Остановите войну!
for scientists:
default search action
HotSoS 2016: Pittsburgh, PA, USA
- William L. Scherlis, David Brumley:
Proceedings of the Symposium and Bootcamp on the Science of Security, Pittsburgh, PA, USA, April 19-21, 2016. ACM 2016, ISBN 978-1-4503-4277-3 - Marwan Abi-Antoun, Ebrahim Khalaj, Radu Vanciu, Ahmad Moghimi:
Abstract runtime structure for reasoning about security: poster. 1-3 - Clark W. Barrett, Cesare Tinelli, Morgan Deters, Tianyi Liang, Andrew Reynolds, Nestan Tsiskaridze:
Efficient solving of string constraints for security analysis. 4-6 - Atul Bohara, Uttam Thakore, William H. Sanders:
Intrusion detection in enterprise systems by combining and clustering diverse monitor data. 7-16 - Antonio Roque, Kevin B. Bush, Christopher Degni:
Security is about control: insights from cybernetics. 17-24 - Susan G. Campbell, Lelyn D. Saner, Michael F. Bunting:
Characterizing cybersecurity jobs: applying the cyber aptitude and talent assessment framework. 25-27 - Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
A framework for generation, replay, and analysis of real-world attack variants. 28-37 - Jeffrey C. Carver, Morgan Burcham, Sedef Akinli Koçak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, Laurie A. Williams:
Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings. 38-51 - Hanan Hibshi:
Systematic analysis of qualitative data in security. 52 - Zhenqi Huang, Yu Wang, Sayan Mitra, Geir E. Dullerud:
Controller synthesis for linear dynamical systems with adversaries. 53-62 - Jiaming Jiang, Nirav Ajmeri, Rada Chirkova, Jon Doyle, Munindar P. Singh:
Expressing and reasoning about conflicting norms in cybersecurity: poster. 63-64 - Özgür Kafali, Munindar P. Singh, Laurie A. Williams:
Toward a normative approach for forensicability. 65-67 - Darya Kurilova, Alex Potanin, Jonathan Aldrich:
Modules in wyvern: advanced control over security and privacy. 68 - Hemank Lamba, Thomas J. Glazier, Bradley R. Schmerl, Javier Cámara, David Garlan, Jürgen Pfeffer:
A model-based approach to anomaly detection in software architectures. 69-71 - Aron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Optimal thresholds for intrusion detection systems. 72-81 - Hui Lin, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Safety-critical cyber-physical attacks: analysis, detection, and mitigation. 82-89 - Jian Lou, Yevgeniy Vorobeychik:
Decentralization and security in dynamic traffic light control. 90-92 - Momin M. Malik, Jürgen Pfeffer, Gabriel Ferreira, Christian Kästner:
Visualizing the variational callgraph of the Linux kernel: an approach for reasoning about dependencies [poster]. 93-94 - Carl J. Pearson, Allaire K. Welk, William A. Boettcher, Roger C. Mayer, Sean Streck, Joseph M. Simons-Rudolph, Christopher B. Mayhorn:
Differences in trust between human and automated decision aids. 95-98 - Bradley Potteiger, Gonçalo Martins, Xenofon D. Koutsoukos:
Software and attack centric integrated threat modeling for quantitative risk assessment. 99-108 - Akond Ashfaque Ur Rahman, Laurie A. Williams:
Security practices in DevOps. 109-111 - Wenyu Ren, Klara Nahrstedt, Tim Yardley:
Operation-level traffic analyzer framework for smart grid. 112-114 - Bradley R. Schmerl, Jeffrey Gennari, Javier Cámara, David Garlan:
Raindroid: a system for run-time mitigation of Android intent vulnerabilities [poster]. 115-117 - Daniel Smullen, Travis D. Breaux:
Modeling, analyzing, and consistency checking privacy requirements using eddy. 118-120 - Christopher Theisen, Laurie A. Williams:
Risk-based attack surface approximation: poster. 121-123 - Tao Xie, William Enck:
Text analytics for security: tutorial. 124-125 - Olga A. Zielinska, Allaire K. Welk, Christopher B. Mayhorn, Emerson R. Murphy-Hill:
The persuasive phish: examining the social psychological principles hidden in phishing emails. 126
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.