Abstract is missing.
- In-nimbo sandboxingMichael Maass, William L. Scherlis, Jonathan Aldrich. 1 [doi]
- Architecture-based self-protection: composing and reasoning about denial-of-service mitigationsBradley R. Schmerl, Javier Cámara, Jeffrey Gennari, David Garlan, Paulo Casanova, Gabriel A. Moreno, Thomas J. Glazier, Jeffrey M. Barnes. 2 [doi]
- A rewriting-based forwards semantics for Maude-NPASantiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago. 3 [doi]
- Open vs. closed systems for accountabilityJoan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright. 4 [doi]
- Log your CRUD: design principles for software logging mechanismsJason Tyler King, Laurie A. Williams. 5 [doi]
- A new approach to modeling and analyzing security of networked systemsGaofeng Da, Maochao Xu, Shouhuai Xu. 6 [doi]
- Less is more?: investigating the role of examples in security studies using analogical transferAshwini Rao, Hanan Hibshi, Travis D. Breaux, Jean-Michel Lehker, Jianwei Niu. 7 [doi]
- Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samplesRucha Tembe, Olga Zielinska, Yuqi Liu, Kyung Wha Hong, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Xi Ge. 8 [doi]
- Human factors in webserver log file analysis: a controlled experiment on investigating malicious activityLucas Layman, Sylvain David Diffo, Nico Zazworka. 9 [doi]
- Characterizing the power of moving target defense via cyber epidemic dynamicsYujuan Han, Wenlian Lu, Shouhuai Xu. 10 [doi]
- Analyzing an adaptive reputation metric for anonymity systemsAnupam Das, Nikita Borisov, Matthew Caesar. 11 [doi]
- Proving abstractions of dynamical systems through numerical simulationsSayan Mitra. 12 [doi]
- Emergent behavior in cybersecurityShouhuai Xu. 13 [doi]
- Cybersecurity dynamicsShouhuai Xu. 14 [doi]
- InViz: instant visualization of security attacksLucas Layman, Nico Zazworka. 15 [doi]
- An analysis method for medical device securityArnab Ray, Rance Cleaveland. 16 [doi]
- Evidence-based trust reasoningJingwei Huang, David M. Nicol. 17 [doi]
- Type-specific languages to fight injection attacksDarya Kurilova, Cyrus Omar, Ligia Nistor, Benjamin Chung, Alex Potanin, Jonathan Aldrich. 18 [doi]
- Examining reliability of wireless multihop network routing with linear systemsTrisha Biswas, Kendra Lesser, Rudra Dutta, Meeko M. K. Oishi. 19 [doi]
- Trustworthy context-dependent servicesNaseem Ibrahim. 20 [doi]
- Preemptive intrusion detectionPhuong Cao, Key-whan Chung, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell. 21 [doi]
- Personalized password guessing: a new security threatPhuong Cao, Hongyang Li, Klara Nahrstedt, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell. 22 [doi]
- Limiting recertification in highly configurable systems: analyzing interactions and isolation among configuration optionsChristian Kästner, Jürgen Pfeffer. 23 [doi]
- Building the security behavior observatory: an infrastructure for long-term monitoring of client machinesAlain Forget, Saranga Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Rahul Telang. 24 [doi]
- Channel correlation modeling for link signature security assessmentXiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning. 25 [doi]
- Securing Hadoop in cloudXianqing Yu, Peng Ning, Mladen A. Vouk. 26 [doi]
- Secure-by-construction composable componentry for network processingLisa J. K. Durbeck, Peter M. Athanas, Nicholas J. Macias. 27 [doi]
- Access control policy evolution: an empirical studyJeeHyun Hwang, Laurie Williams, Mladen A. Vouk. 28 [doi]
- Diversity-based detection of security anomaliesRoopak Venkatakrishnan, Mladen A. Vouk. 29 [doi]
- Is there value in reasoning about security at the architectural level: a comparative evaluationEbrahim Khalaj, Radu Vanciu, Marwan Abi-Antoun. 30 [doi]
- Insecure behaviors on mobile devices under stressAgnes Davis, Ashwin Shashidharan, Qian Liu, William Enck, Anne McLaughlin, Benjamin Watson. 31 [doi]
- Improving mobile application security via bridging user expectations and application behaviorsWei Yang, Xusheng Xiao, Rahul Pandita, William Enck, Tao Xie. 32 [doi]
- Modeling and sensing risky user behavior on mobile devicesQian Liu, Juhee Bae, Benjamin Watson, Anne McLaughhlin, William Enck. 33 [doi]
- Exploring key-level analytics for computational modeling of typing behaviorArpan Chakraborty, Brent E. Harrison, Pu Yang, David L. Roberts, Robert St. Amant. 34 [doi]
- An analysis of Fedora security profileShweta Subramani, Mladen A. Vouk, Laurie A. Williams. 35 [doi]