Abstract is missing.
- Integrity assurance in resource-bounded systems through stochastic message authenticationAron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos. 1 [doi]
- Active cyber defense dynamics exhibiting rich phenomenaRen Zheng, Wenlian Lu, Shouhuai Xu. 2 [doi]
- Towards a science of trustDusko Pavlovic. 3 [doi]
- Challenges with applying vulnerability prediction modelsPatrick Morrison, Kim Herzig, Brendan Murphy, Laurie Williams. 4 [doi]
- Preemptive intrusion detection: theoretical framework and real-world measurementsPhuong Cao, Eric Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell. 5 [doi]
- Enabling forensics by proposing heuristics to identify mandatory log eventsJason King, Rahul Pandita, Laurie A. Williams. 6 [doi]
- Modelling user availability in workflow resiliency analysisJohn C. Mace, Charles Morisset, Aad P. A. van Moorsel. 7 [doi]
- An empirical study of global malware encountersGhita Mezzour, Kathleen M. Carley, L. Richard Carley. 8 [doi]
- An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processesChen Zhong, John Yen, Peng Liu 0005, Rob Erbacher, Renee Etoty, Christopher Garneau. 9 [doi]
- All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst taskAllaire K. Welk, Christopher B. Mayhorn. 10 [doi]
- Detecting abnormal user behavior through pattern-mining input device analyticsIgnacio X. Domínguez, Alok Goel, David L. Roberts, Robert St. Amant. 11 [doi]
- Understanding sanction under variable observability in a secure, collaborative environmentHongying Du, Bennett Narron, Nirav Ajmeri, Emily Berglund, Jon Doyle, Munindar P. Singh. 12 [doi]
- Measuring the security impacts of password policies using cognitive behavioral agent-based modelingVijay Kothari, Jim Blythe, Sean W. Smith, Ross Koppel. 13 [doi]
- Effectiveness of a phishing warning in field settingsWeining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li. 14 [doi]
- An architecture style for Android security analysis: posterBradley R. Schmerl, Jeffrey Gennari, David Garlan. 15 [doi]
- PREDICT: an important resource for the science of securityCharlotte Scheper, Susanna Cantor. 16 [doi]
- Characterizing complexity of highly-configurable systems with variational call graphs: analyzing configuration options interactions complexity in function callsGabriel Ferreira, Christian Kästner, Jürgen Pfeffer, Sven Apel. 17 [doi]
- Towards quantification of firewall policy complexityHaiNing Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert Proctor. 18 [doi]
- Packer classifier based on PE header informationQiao Jin, Jiayi Duan, Shobha Vasudevan, Michael Bailey. 19 [doi]
- Detecting insider threats in software systems using graph models of behavioral pathsHemank Lamba, Thomas J. Glazier, Bradley R. Schmerl, Jürgen Pfeffer, David Garlan. 20 [doi]
- Quantitative security metrics with human in the loopMohammad Noureddine, Ken Keefe, William H. Sanders, Masooda Bashir. 21 [doi]
- Exploring expert and novice mental models of phishingOlga Zielinska, Allaire Welk, Christopher B. Mayhorn, Emerson R. Murphy-Hill. 22 [doi]
- Building a security practices evaluation frameworkPatrick Morrison. 23 [doi]
- Towards an unified security testbed and security analytics frameworkPhuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell. 24 [doi]
- Mismorphism: a semiotic model of computer security circumvention (poster abstract)S. W. Smith, Ross Koppel, Jim Blythe, V. Kothari. 25 [doi]
- Gamifying software security education and training via secure coding duels in code huntTao Xie, Judith Bishop, Nikolai Tillmann, Jonathan de Halleux. 26 [doi]
- Systematization of metrics in intrusion detection systemsYufan Huang, Xiaofan He, Huaiyu Dai. 27 [doi]
- Optimisation of data collection strategies for model-based evaluation and decision-making: posterRobert G. Cain, Aad P. A. van Moorsel. 28 [doi]