default search action
11. CISRC 2016: Oak Ridge, TN, USA
- Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Robert A. Bridges:
Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016. ACM 2016, ISBN 978-1-4503-3752-6 - Bertrand Cambou, Marius Orlowski:
PUF designed with Resistive RAM and Ternary States. 1:1-1:8 - Mustafa Atici:
Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure. 2:1-2:7 - Scot Tucker:
Trusted Information Exchange Using Trusted Network Processors. 3:1-3:8 - Kyle J. Temkin, Douglas H. Summerville:
An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans. 4:1-4:8 - Michael Atighetchi, Borislava I. Simidchieva, Marco M. Carvalho, David Last:
Experimentation Support for Cyber Security Evaluations. 5:1-5:7 - Jeyasingam Nivethan, Mauricio Papa:
A SCADA Intrusion Detection Framework that Incorporates Process Semantics. 6:1-6:5 - Vahid Heydari, Sun-il Kim, Seong-Moo Yoo:
Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense. 7:1-7:8 - Erik M. Ferragut, Andrew C. Brady, Ethan J. Brady, Jacob M. Ferragut, Nathan M. Ferragut, Max C. Wildgruber:
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts. 8:1-8:8 - William H. Hawkins, Jason D. Hiser, Jack W. Davidson:
Dynamic Canary Randomization for Improved Software Security. 9:1-9:7 - Jeny Teheran, Dave Dykstra, Mine Altunay:
Bringing Federated Identity to Grid Computing. 10:1-10:8 - Chris Strasburg, Samik Basu, Johnny S. Wong:
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness. 11:1-11:8 - Rayford B. Vaughn Jr., Tommy H. Morris:
Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. 12:1-12:4 - David Last:
Forecasting Zero-Day Vulnerabilities. 13:1-13:4 - Joni Uitto, Sampsa Rauti, Ville Leppänen:
Practical implications and requirements of diversifying interpreted languages. 14:1-14:4 - Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall:
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. 15:1-15:4 - Anna L. Buczak, Paul A. Hanke, George J. Cancro, Michael K. Toma, Lanier A. Watkins, Jeffrey S. Chavis:
Detection of Tunnels in PCAP Data by Random Forests. 16:1-16:4 - Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest:
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery. 17:1-17:4 - Reece Johnston, Sun-il Kim, David Coe, Letha H. Etzkorn, Jeffrey H. Kulick, Aleksandar Milenkovic:
Xen Network Flow Analysis for Intrusion Detection. 18:1-18:4 - Leonora Gerlock, Abhishek Parakh:
Linear Cryptanalysis of Quasigroup Block Cipher. 19:1-19:4 - John Dombrowski, Todd R. Andel, Jeffrey Todd McDonald:
The Application of Moving Target Defense to Field Programmable Gate Arrays. 20:1-20:4 - Kyle Cook, Thomas Shaw, Peter J. Hawrylak, John Hale:
Scalable Attack Graph Generation. 21:1-21:4 - Bailey Smith, Whitney Caruthers, Dalton Stewart, Peter J. Hawrylak, John Hale:
Network Modeling for Security Analytics. 22:1-22:4 - Lahiru S. Gallege, Rajeev R. Raje:
Towards Selecting and Recommending Online Software Services by Evaluating External Attributes. 23:1-23:4 - S. Dinesh Kumar, Himanshu Thapliyal:
QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable Function. 24:1-24:4 - Ameya Sanzgiri, Dipankar Dasgupta:
Classification of Insider Threat Detection Techniques. 25:1-25:4 - Jeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis:
Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks. 26:1-26:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.