


default search action
9. CISR 2014: Oak Ridge, TN, USA
- Robert K. Abercrombie, Jeffrey Todd McDonald:

Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014. ACM 2014, ISBN 978-1-4503-2812-8
Tailored trustworthy spaces
- Sun-il Kim, William Edmonds, Nnamdi Nwanze:

On GPU accelerated tuning for a payload anomaly-based network intrusion detection scheme. 1-4 - Steven Noel, Sushil Jajodia

:
Metrics suite for network attack graph analytics. 5-8 - Jin Dong

, Seddik M. Djouadi, James J. Nutaro
, Phani Teja Kuruganti:
Secure control systems with application to cyber-physical systems. 9-12 - Nathan Wallace, Stanislav Ponomarev, Travis Atkison:

A dimensional transformation scheme for power grid cyber event detection. 13-16 - Lakshmi Manohar Rao Velicheti, Dennis C. Feiock, Manjula Peiris, Rajeev R. Raje, James H. Hill:

Towards modeling the behavior of static code analysis tools. 17-20 - Stanislav Ponomarev, Nathan Wallace, Travis Atkison:

Detection of SSH host spoofing in control systems through network telemetry analysis. 21-24
Moving target & designed-in-security
- Lindsey N. Whitehurst, Todd R. Andel, Jeffrey Todd McDonald:

Exploring security in ZigBee networks. 25-28 - Shaun-Inn Wu, Hieu Trong Ho:

Image enhanced CAPTCHA for web security. 29-32 - Xiaohong Yuan, Emmanuel Borkor Nuakoh, Jodria S. Beal, Huiming Yu:

Retrieving relevant CAPEC attack patterns for secure software development. 33-36 - Matthew Sherburne, Randy C. Marchany, Joseph G. Tront:

Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. 37-40 - Minzhe Guo, Prabir Bhattacharya:

Diverse virtual replicas for improving intrusion tolerance in cloud. 41-44 - Christopher Robinson-Mallett:

Coordinating security and safety engineering processes in automotive electronics development. 45-48 - Bogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall:

Integration of external data sources with cyber security data warehouse. 49-52 - Mohamed Fazeen, Garima Bajwa

, Ram Dantu:
Context-aware multimedia encryption in mobile platforms. 53-56 - Bader Alwasel, Stephen D. Wolthusen:

Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets. 57-60 - Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje:

Towards trust-based recommender systems for online software services. 61-64 - Abhijit Kumar Nag, Dipankar Dasgupta:

An adaptive approach for continuous multi-factor authentication in an identity eco-system. 65-68 - Brian Lucas, Errin W. Fulp, David J. John, Daniel A. Cañas:

An initial framework for evolving computer configurations as a moving target defense. 69-72 - Rui Zhuang, Scott A. DeLoach, Xinming Ou:

A model for analyzing the effect of moving target defenses on enterprise networks. 73-76
Cyber economic incentives & science of security
- Ed Goff, Cliff Glantz, Rebecca Massello:

Cybersecurity procurement language for energy delivery systems. 77-79 - Anis Ben Aissa, Latifa Ben Arfa Rabai

, Robert K. Abercrombie
, Ali Mili, Frederick T. Sheldon
:
Quantifying availability in SCADA environments using the cyber security metric MFC. 81-84 - Alaa Darabseh, Akbar Siami Namin:

The accuracy of user authentication through keystroke features using the most frequent words. 85-88 - Jeyasingam Nivethan, Mauricio Papa

, Peter J. Hawrylak
:
Modeling and simulation of electric power substation employing an IEC 61850 network. 89-92 - George Chin Jr., Sutanay Choudhury, John Feo, Lawrence B. Holder:

Predicting and detecting emerging cyberattack patterns using StreamWorks. 93-96 - Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder:

NICE: endpoint-based topology discovery. 97-100 - George Louthan, Michael Haney, Phoebe Hardwicke, Peter J. Hawrylak

, John Hale
:
Hybrid extensions for stateful attack graphs. 101-104 - Qian Chen, Sherif Abdelwahed

:
Towards realizing self-protecting SCADA systems. 105-108 - Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin:

Cyber-security analysis of smart grid SCADA systems with game models. 109-112 - Liang Kong, Gavin Bauer, John Hale

:
Location-based device grouping for function restriction. 113-116
Tailored trustworthy spaces - cyber economic incentives & science of security
- Jacob Torrey:

MoRE: measurement of running executables. 117-120 - Michael Haney, Mauricio Papa

:
A framework for the design and deployment of a SCADA honeynet. 121-124

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














