default search action
8. CSIIRW 2013: Oak Ridge, TN, USA
- Frederick T. Sheldon, Annarita Giani, Axel W. Krings, Robert K. Abercrombie:
Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013. ACM 2013, ISBN 978-1-4503-1687-3
Designed in security - DIS
- Michael Duren, John Walsh, Hal Aldridge, Meng-Day (Mandel) Yu:
Resilient device authentication system (RDAS) through SIOMETRICS. 1 - Richard R. Brooks, Benafsh Husain, SeokBae Yun, Juan Deng:
Security and performance evaluation of security protocols. 2 - Erik M. Ferragut, Jason A. Laska, Bogdan D. Czejdo, Alexander Melin:
Addressing the challenges of anomaly detection for cyber physical energy grid systems. 3 - Rui Xie, Rose F. Gamble:
An architecture for cross-cloud auditing. 4 - Hui Lin, Adam J. Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. 5 - Ravi Akella, Bruce M. McMillin:
Modeling and verification of security properties for critical infrastructure protection. 6 - Emilie Hogan, John R. Johnson, Mahantesh Halappanavar:
Graph coarsening for path finding in cybersecurity graphs. 7 - Avinash R. Desai, Michael S. Hsiao, Chao Wang, Leyla Nazhandali, T. Simin Hall:
Interlocking obfuscation for anti-tamper hardware. 8 - Cindy Finke, Jonathan Butts, Robert F. Mills:
ADS-B encryption: confidentiality in the friendly skies. 9 - Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki:
Threat modeling for security assessment in cyberphysical systems. 10 - Ganesh Ram Santhanam, Zachary J. Oster, Samik Basu:
Identifying a preferred countermeasure strategy for attack graphs. 11 - Hasan Cam, Pierre Mouallem:
Mission-aware time-dependent cyber asset criticality and resilience. 12
Tailored trustworthy spaces - TTS
- Joshua Howes, James Solderitsch, Ignatius Chen, Jonté Craighead:
Enabling trustworthy spaces via orchestrated analytical security. 13 - Chen Lu, Richard R. Brooks:
Timing analysis in P2P botnet traffic using probabilistic context-free grammars. 14 - Katherine C. Cameron, Richard R. Brooks, Juan Deng:
Cost-effective quality assurance of wireless network security. 15 - Lahiru S. Gallege, Dimuthu Gamage, James H. Hill, Rajeev R. Raje:
Trust contract of a service and its role in service selection for distributed software systems. 16 - Lianyu Zhao, Richard R. Brooks:
Tailoring trusted semantic information. 17
Cyber economic incentives - CEI
- Rayford B. Vaughn, Thomas H. Morris, Elena Sitnikova:
Development & expansion of an industrial control system security laboratory and an international research collaboration. 18 - Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili:
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). 19 - Ike Patterson, James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, David Fugate:
Optimizing investments in cyber-security for critical infrastructure. 20 - Yevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd, Ron Olsberg, Lyndon Pierson, Owen Redwood:
Fireaxe: the DHS secure design competition pilot. 21
Emerging threats - ET
- Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes:
Relationships between information security metrics: an empirical study. 22 - Justin M. Beaver, Christopher T. Symons, Robert E. Gillen:
A learning system for discriminating variants of malicious network traffic. 23 - Jason M. Carter:
Locating executable fragments with Concordia, a scalable, semantics-based architecture. 24 - Charles N. Payne Jr., Jason Sonnek, Steven A. Harp:
XEBHRA: a virtualized platform for cross domain information sharing. 25 - Zach Harbort, Conor Fellin:
Gesture-oriented data sharing. 26 - Adam Hahn, Manimaran Govindarasu:
Model-based intrustion detection for the smart grid (MINDS). 27 - Jarilyn M. Hernández, Line Pouchard, Jeffrey Todd McDonald, Stacy J. Prowell:
Developing a power measurement framework for cyber defense. 28 - Rattikorn Hewett, Phongphun Kijsanayothin:
Securing system controllers in critical infrastructures. 29 - Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher:
Visualizing graph features for fast port scan detection. 30 - Victor Balogun, Axel W. Krings:
On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks. 31 - Neal Dawes, Bryan Prosser, Errin W. Fulp, A. David McKinnon:
Using mobile agents and overlay networks to secure electrical networks. 32
Moving target defenses - MTD
- Jason J. Haas, J. D. Doak, Jason R. Hamlet:
Machine-oriented biometrics and cocooning for dynamic network defense. 33 - Ahmed Serageldin, Axel W. Krings, Ahmed Abdel-Rahim:
A survivable critical infrastructure control application. 34 - Travis L. Bauer, Richard Colbaugh, Kristin Glass, David Schnizlein:
Use of transfer entropy to infer relationships from behavior. 35 - Sean Crosby, Marco M. Carvalho, Dan Kidwell:
A layered approach to understanding network dependencies on moving target defense mechanisms. 36 - Christopher S. Oehmen, Elena S. Peterson, Jeremy Teuton:
Evolutionary drift models for moving target defense. 37 - Marco M. Carvalho, Thomas C. Eskridge, Larry Bunch, Jeffrey M. Bradshaw, Adam Dalton, Paul J. Feltovich, James Lott, Dan Kidwell:
A human-agent teamwork command and control framework for moving target defense (MTC2). 38
Other CSIIRW topic
- Ryan Goodfellow, Robert Braden, Terry Benzel, David E. Bakken:
First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems. 39 - Shengyi Pan, Thomas H. Morris, Uttam Adhikari, Vahid Madani:
Causal event graphs cyber-physical system intrusion detection system. 40 - Read Sprabery, Thomas H. Morris, Shengyi Pan, Uttam Adhikari, Vahid Madani:
Protocol mutation intrusion detection for synchrophasor communications. 41 - David Schwab, Li Yang:
Entity authentication in a mobile-cloud environment. 42 - Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum:
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. 43 - Annarita Giani, Russell Bent:
Addressing smart grid cyber security. 44 - James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, Darren Highfill:
Using simulation to engineer cybersecurity requirements. 45
Posters
- Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak:
Estimating link availability and timing delays in ethernet-based networks. 46 - Dimitrios Mermigas, Constantinos Patsakis, Sotirios Pirounias:
Quantification of information systems security with stochastic calculus. 47 - Michael Duren, Hal Aldridge, Robert K. Abercrombie, Frederick T. Sheldon:
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. 48 - Lu Yu, Richard R. Brooks:
Applying POMDP to moving target optimization. 49 - Richard R. Brooks, Oluwakemi Hambolu, Paul Marusich, Yu Fu, Saiprasad Balachandran:
Creating a tailored trustworthy space for democracy advocates using hostile host. 50 - Michael J. Lewis:
Characterizing risk. 51 - Jeffrey Segall, Michael J. Mayhew, Michael Atighetchi, Rachel Greenstadt:
Assessing trustworthiness in collaborative environments. 52 - Reese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
Using transport layer multihoming to enhance network layer moving target defenses. 53 - Matthew Butler, Steven Reed, Peter J. Hawrylak, John Hale:
Implementing graceful RFID privilege reduction. 54 - Ilker Özçelik, Richard R. Brooks:
Operational system testing for designed in security. 55 - Qian Chen, Sherif Abdelwahed, Weston Monceaux:
Towards automatic security management: a model-based approach. 56 - Justin Yackoski, Jason H. Li, Scott A. DeLoach, Xinming Ou:
Mission-oriented moving target defense based on cryptographically strong network dynamics. 57 - Lee M. Hively, Jeffrey Todd McDonald:
Theorem-based, data-driven, cyber event detection. 58 - Maggie X. Cheng, Mariesa L. Crow, Robert F. Erbacher:
Vulnerability analysis of a smart grid with monitoring and control system. 59 - Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Mohd. Hasan Ali, Paul Mixon:
A prediction model for anomalies in smart grid with sensor network. 60 - Dennis K. Holstein:
On the use of the Clark-Wilson security model to protect industrial automation control systems. 61 - Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo:
Moving target defense (MTD) in an adaptive execution environment. 62 - Frederick T. Sheldon, Daniel Fetzer, David O. Manz, Jingshan Huang, Stuart Goose, Thomas H. Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei:
Intrinsically resilient energy control systems. 63
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.