


default search action
11. CISRC 2016: Oak Ridge, TN, USA
- Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Robert A. Bridges:

Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016. ACM 2016, ISBN 978-1-4503-3752-6 - Bertrand Cambou, Marius Orlowski:

PUF designed with Resistive RAM and Ternary States. 1:1-1:8 - Mustafa Atici:

Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure. 2:1-2:7 - Scot Tucker:

Trusted Information Exchange Using Trusted Network Processors. 3:1-3:8 - Kyle J. Temkin, Douglas H. Summerville:

An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans. 4:1-4:8 - Michael Atighetchi, Borislava I. Simidchieva

, Marco M. Carvalho
, David C. Last:
Experimentation Support for Cyber Security Evaluations. 5:1-5:7 - Jeyasingam Nivethan, Mauricio Papa

:
A SCADA Intrusion Detection Framework that Incorporates Process Semantics. 6:1-6:5 - Vahid Heydari

, Sun-il Kim, Seong-Moo Yoo:
Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense. 7:1-7:8 - Erik M. Ferragut, Andrew C. Brady, Ethan J. Brady, Jacob M. Ferragut, Nathan M. Ferragut, Max C. Wildgruber:

HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts. 8:1-8:8 - William H. Hawkins

, Jason D. Hiser, Jack W. Davidson:
Dynamic Canary Randomization for Improved Software Security. 9:1-9:7 - Jeny Teheran, Dave Dykstra, Mine Altunay:

Bringing Federated Identity to Grid Computing. 10:1-10:8 - Chris Strasburg, Samik Basu, Johnny S. Wong:

A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness. 11:1-11:8 - Rayford B. Vaughn Jr., Tommy H. Morris:

Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. 12:1-12:4 - David Last:

Forecasting Zero-Day Vulnerabilities. 13:1-13:4 - Joni Uitto, Sampsa Rauti, Ville Leppänen

:
Practical implications and requirements of diversifying interpreted languages. 14:1-14:4 - Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall:

GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. 15:1-15:4 - Anna L. Buczak, Paul A. Hanke, George J. Cancro, Michael K. Toma, Lanier A. Watkins, Jeffrey S. Chavis:

Detection of Tunnels in PCAP Data by Random Forests. 16:1-16:4 - Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest

:
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery. 17:1-17:4 - Reece Johnston, Sun-il Kim, David Coe

, Letha H. Etzkorn, Jeffrey H. Kulick, Aleksandar Milenkovic
:
Xen Network Flow Analysis for Intrusion Detection. 18:1-18:4 - Leonora Gerlock, Abhishek Parakh:

Linear Cryptanalysis of Quasigroup Block Cipher. 19:1-19:4 - John Dombrowski, Todd R. Andel, Jeffrey Todd McDonald:

The Application of Moving Target Defense to Field Programmable Gate Arrays. 20:1-20:4 - Kyle Cook, Thomas Shaw, Peter J. Hawrylak

, John Hale
:
Scalable Attack Graph Generation. 21:1-21:4 - Bailey Smith, Whitney Caruthers, Dalton Stewart, Peter J. Hawrylak

, John Hale
:
Network Modeling for Security Analytics. 22:1-22:4 - Lahiru S. Gallege, Rajeev R. Raje:

Towards Selecting and Recommending Online Software Services by Evaluating External Attributes. 23:1-23:4 - S. Dinesh Kumar, Himanshu Thapliyal

:
QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable Function. 24:1-24:4 - Ameya Sanzgiri, Dipankar Dasgupta:

Classification of Insider Threat Detection Techniques. 25:1-25:4 - Jeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis:

Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks. 26:1-26:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














