researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2014
2015
2016
2017
2018
2019
2020
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Adam J. Slagell
Akond Rahman
Bradley Potteiger
Bradley R. Schmerl
Christopher B. Mayhorn
David Garlan
Ehab Al-Shaer
Jonathan Aldrich
Jürgen Pfeffer
Laurie A. Williams
Laurie Williams
Mladen A. Vouk
Munindar P. Singh
Phuong Cao
Ravishankar K. Iyer
Shouhuai Xu
Suzanne J. Matthews
William Enck
Xenofon D. Koutsoukos
Zbigniew T. Kalbarczyk
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
analyzing
approach
attacks
control
cyber
data
detection
framework
modeling
network
poster
privacy
proceedings
science
secure
security
software
systems
using
HotSoS (hotsos)
Editions
Publications
Viewing Publication 1 - 100 from 192
2020
Exploring hackers assets: topics of interest as indicators of compromise
Mohammad A. Al-Ramahi
,
Izzat Alsmadi
,
Joshua Davenport
.
hotsos 2020
:
[doi]
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2020, Lawrence, Kansas, USA, September 22-24, 2020
Perry Alexander
,
Drew Davidson
,
Baek-Young Choi
, editors,
ACM,
2020.
[doi]
A raspberry Pi sensor network for wildlife conservation
Andrew Arnold
,
Paul Corapi
,
Michael Nasta
,
Kevin Wolgast
,
Thomas A. Babbitt
.
hotsos 2020
:
[doi]
Accelerating block propagation in PoW blockchain networks with pipelining and chunking
Kaushik Ayinala
,
Baek-Young Choi
,
Sejun Song
.
hotsos 2020
:
[doi]
Exploiting DRAM bank mapping and HugePages for effective denial-of-service attacks on shared cache in multicore
Michael Garrett Bechtel
,
Heechul Yun
.
hotsos 2020
:
[doi]
Can we use software bug reports to identify vulnerability discovery strategies?
Farzana Ahamed Bhuiyan
,
Raunak Shakya
,
Akond Rahman
.
hotsos 2020
:
[doi]
How to swap instructions midstream: an embedding algorithm for program steganography
Ryan Gabrys
,
Luis Martinez
,
Sunny Fugate
.
hotsos 2020
:
[doi]
Decentralized backup and recovery of TOTP secrets
Conor Gilsenan
,
Noura Alomar
,
Andrew Huang
,
Serge Egelman
.
hotsos 2020
:
[doi]
The more the merrier: adding hidden measurements to secure industrial control systems
Jairo Giraldo
,
David I. Urbina
,
Chee Yee Tang
,
Alvaro A. Cárdenas
.
hotsos 2020
:
[doi]
Improving architectures for automating network security using specification-based protocols
Khir Henderson
,
Kevin Kornegay
.
hotsos 2020
:
[doi]
Ghostbusting: mitigating spectre with intraprocess memory isolation
Ira Ray Jenkins
,
Prashant Anantharaman
,
Rebecca Shapiro
,
J. Peter Brady
,
Sergey Bratus
,
Sean W. Smith
.
hotsos 2020
:
[doi]
An seL4-based architecture for layered attestation
Grant Jurgensen
,
Michael Neises
,
Perry Alexander
.
hotsos 2020
:
[doi]
WOLF: automated machine learning workflow management framework for malware detection and other applications
Sohaib Kiani
,
Sana Awan
,
Jun Huan
,
FengJun Li
,
Bo Luo
.
hotsos 2020
:
[doi]
Resilient multi-robot target pursuit
Jiani Li
,
Waseem Abbas
,
Mudassir Shabbir
,
Xenofon D. Koutsoukos
.
hotsos 2020
:
[doi]
A formal security analysis of ZigBee (1.0 and 3.0)
Li Li
,
Proyash Podder
,
Md. Endadul Hoque
.
hotsos 2020
:
[doi]
Application of the armament cyber assessment framework: a security assessment methodology for military systems
Aidan McCarthy
,
Liam Furey
,
Keagan Smith
,
Daniel Hawthorne
,
Raymond Blaine
.
hotsos 2020
:
[doi]
Tokens of interaction: psycho-physiological signals, a potential source of evidence of digital incidents
Nancy Mogire
.
hotsos 2020
:
[doi]
A curated dataset of security defects in scientific software projects
Justin Murphy
,
Elias T. Brady
,
Md. Shazibul Islam Shamim
,
Akond Rahman
.
hotsos 2020
:
[doi]
Simulation testbed for railway infrastructure security and resilience evaluation
Himanshu Neema
,
Xenofon D. Koutsoukos
,
Bradley Potteiger
,
Chee Yee Tang
,
Keith Stouffer
.
hotsos 2020
:
[doi]
An uncertain graph-based approach for cyber-security risk assessment
Hoang Hai Nguyen
.
hotsos 2020
:
[doi]
@PAD: adversarial training of power systems against denial-of-service attacks
Ali Irmak Ozdagli
,
Carlos A. Barreto
,
Xenofon D. Koutsoukos
.
hotsos 2020
:
[doi]
An infrastructure for faithful execution of remote attestation protocols
Adam Petz
.
hotsos 2020
:
[doi]
RUCKUS: a cybersecurity engine for performing autonomous cyber-physical system vulnerability discovery at scale
Bradley Potteiger
,
Jacob Mills
,
Daniel Cohen
,
Paul Velez
.
hotsos 2020
:
[doi]
Approaches to ethical hacking: expanding conceptual frameworks for research
Lauren Elizabeth Provost
,
Rebecca Labitt
,
Danielle Alexandre
,
Asher Rodriguez
.
hotsos 2020
:
[doi]
Do configuration management tools make systems more secure?: an empirical research plan
Md. Rayhanur Rahman
,
William Enck
,
Laurie A. Williams
.
hotsos 2020
:
[doi]
Automated influence and the challenge of cognitive security
Sarah Rajtmajer
,
Daniel Susser
.
hotsos 2020
:
[doi]
A preliminary taxonomy of techniques used in software fuzzing
Raunak Shakya
,
Akond Rahman
.
hotsos 2020
:
[doi]
Neutralizing manipulation of critical data by enforcing data-instruction dependency
Chandra Sharma
,
Nathan Miller
,
George T. Amariucai
.
hotsos 2020
:
[doi]
Time series anomaly detection in medical break-the-glass
Qais Tasali
,
Nikesh Gyawali
,
Eugene Y. Vasserman
.
hotsos 2020
:
[doi]
Toward just-in-time patching for containerized applications
Olufogorehan Tunde-Onadele
,
Yuhang Lin
,
Jingzhu He
,
Xiaohui Gu
.
hotsos 2020
:
[doi]
Cyber threat modeling and validation: port scanning and detection
Eric D. Vugrin
,
Jerry Cruz
,
Christian Reedy
,
Thomas Tarman
,
Ali Pinar
.
hotsos 2020
:
[doi]
2019
ThreatZoom: neural network for automated vulnerability mitigation
Ehsan Aghaei
,
Ehab Al-Shaer
.
hotsos 2019
:
[doi]
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense
Mohiuddin Ahmed
,
Ehab Al-Shaer
.
hotsos 2019
:
[doi]
Exploring RNNs for analyzing Zeek HTTP data
Daniel Andrews
,
Jennifer Behn
,
Danielle Jaksha
,
Jinwon Seo
,
Madeleine Schneider
,
James Yoon
,
Suzanne J. Matthews
,
Rajeev Agrawal
,
Alexander S. Mentis
.
hotsos 2019
:
[doi]
Situated information flow theory
Sebastian Benthall
.
hotsos 2019
:
[doi]
Design for an educational cyber range
Ryan Brunner
,
Sang-Keun Oh
,
Jesse Ramirez
,
Paul Houck
,
Nathaniel Stickney
,
Raymond Blaine
.
hotsos 2019
:
[doi]
TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation
Key-whan Chung
,
Phuong Cao
,
Yuming Wu
,
Zbigniew T. Kalbarczyk
,
Ravishankar K. Iyer
,
Alexander Withers
.
hotsos 2019
:
[doi]
Designing a Raspberry Pi sensor network for remote observation of wildlife
Brian H. Curtin
,
Rachelle H. David
,
Emmet D. Dunham
,
Cullen D. Johnson
,
Nikhil Shyamkumar
,
Thomas A. Babbitt
,
Suzanne J. Matthews
.
hotsos 2019
:
[doi]
Limitations on observability of effects in cyber-physical systems
Suresh K. Damodaran
,
Paul D. Rowe
.
hotsos 2019
:
[doi]
Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation
Ashutosh Dutta
,
Ehab Al-Shaer
.
hotsos 2019
:
[doi]
Game theory for adaptive defensive cyber deception
Kimberly Ferguson-Walter
,
Sunny Fugate
,
Justin Mauger
,
Maxine Major
.
hotsos 2019
:
[doi]
Browser fingerprinting using combinatorial sequence testing
Bernhard Garn
,
Dimitris E. Simos
,
Stefan Zauner
,
Rick Kuhn
,
Raghu Kacker
.
hotsos 2019
:
[doi]
A new metric to compare anomaly detection algorithms in cyber-physical systems
Jairo Giraldo
,
Alvaro A. Cárdenas
.
hotsos 2019
:
[doi]
Toward a reliability measurement framework automated using deep learning
John Heaps
,
Xueling Zhang
,
Xiaoyin Wang
,
Travis D. Breaux
,
Jianwei Niu 0001
.
hotsos 2019
:
[doi]
BEEER: distributed record and replay for medical devices in hospital operating rooms
Avesta Hojjati
,
Yunhui Long
,
Soteris Demetriou
,
Carl A. Gunter
.
hotsos 2019
:
[doi]
Learning APT chains from cyber threat intelligence
Ghaith Husari
,
Ehab Al-Shaer
,
Bill Chu
,
Ruhani Faiheem Rahman
.
hotsos 2019
:
[doi]
A synopsis of static analysis alerts on open source software
Nasif Imtiaz
,
Laurie Williams
.
hotsos 2019
:
[doi]
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration
Md. Mazharul Islam
,
Ehab Al-Shaer
,
Ashutosh Dutta
,
Mohammed Noraden Alsaleh
.
hotsos 2019
:
[doi]
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019
Xenofon D. Koutsoukos
,
Alvaro A. Cárdenas
,
Ehab Al-Shaer
, editors,
ACM,
2019.
[doi]
Design and simulation platform for evaluation of grid distribution system and transactive energy
Himanshu Neema
,
Harsh Vardhan
,
Carlos Barreto
,
Xenofon D. Koutsoukos
.
hotsos 2019
:
[doi]
A copland attestation manager
Adam Petz
,
Perry Alexander
.
hotsos 2019
:
[doi]
Towards an understanding of resilience with complex networks
Francisco Pipa
,
John Symons
.
hotsos 2019
:
[doi]
Simulation based evaluation of security and resilience in railway infrastructure
Bradley Potteiger
,
Hamzah Abdel-Aziz
,
Himanshu Neema
,
Xenofon D. Koutsoukos
.
hotsos 2019
:
[doi]
Integrated data space randomization and control reconfiguration for securing cyber-physical systems
Bradley Potteiger
,
Zhenkai Zhang
,
Xenofon D. Koutsoukos
.
hotsos 2019
:
[doi]
A formal verification of mutation-based moving target defense
Muhammad Abdul Basit Ur Rahim
,
Qi Duan
,
Ehab Al-Shaer
.
hotsos 2019
:
[doi]
A bird's eye view of knowledge needs related to penetration testing
Akond Rahman
,
Laurie Williams
.
hotsos 2019
:
[doi]
Taming web views in the detection of Android privacy leaks
Xue-qin
,
Robert Neuhaus
,
Diego Gonzales
,
Xiaoyin Wang
,
Travis D. Breaux
,
Jianwei Niu 0001
.
hotsos 2019
:
[doi]
Load forecasting with adversarial attacks in power systems using DeepForge
Xingyu Zhou
,
Yi Li
,
Carlos A. Barreto
,
Péter Völgyesi
,
Xenofon D. Koutsoukos
.
hotsos 2019
:
[doi]
Game theory for cyber deception: a tutorial
Quanyan Zhu
.
hotsos 2019
:
[doi]
2018
Cryptography in a post-quantum world: poster
Katharine Ahrens
.
hotsos 2018
:
[doi]
Ethics, values, and personal agents: poster
Nirav Ajmeri
,
Hui Guo
,
Pradeep K. Murukannaiah
,
Munindar P. Singh
.
hotsos 2018
:
[doi]
Exploring the raspberry Pi for data summarization in wireless sensor networks: poster
Andrés Alejos
,
Matthew Ball
,
Connor Eckert
,
Michael Ma
,
Hayden Ward
,
Peter Hanlon
,
Suzanne J. Matthews
.
hotsos 2018
:
[doi]
Quantifying the security effectiveness of firewalls and DMZs
Huashan Chen
,
Jin-Hee Cho
,
Shouhuai Xu
.
hotsos 2018
:
[doi]
Quantifying the security effectiveness of network diversity: poster
Huashan Chen
,
Jin-Hee Cho
,
Shouhuai Xu
.
hotsos 2018
:
[doi]
Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster
Key-whan Chung
,
Zbigniew T. Kalbarczyk
,
Ravishankar K. Iyer
.
hotsos 2018
:
[doi]
Challenges and approaches of performing canonical action research in software security: research paper
Daniela S. Cruzes
,
Martin Gilje Jaatun
,
Tosin Daniel Oyetoyan
.
hotsos 2018
:
[doi]
Understanding privacy concerns of whatsapp users in India: poster
Jayati Dev
,
Sanchari Das
,
L. Jean Camp
.
hotsos 2018
:
[doi]
SecureMR: secure mapreduce computation using homomorphic encryption and program partitioning
Yao Dong
,
Ana Milanova
,
Julian Dolby
.
hotsos 2018
:
[doi]
Integrating historical and real-time anomaly detection to create a more resilient smart grid architecture: poster
Spencer Drakontaidis
,
Michael Stanchi
,
Gabriel Glazer
,
Antoine Davis
,
Madison Stark
,
Caleb Clay
,
Jason Hussey
,
Nicholas Barry
,
Aaron St. Leger
,
Suzanne J. Matthews
.
hotsos 2018
:
[doi]
A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER
Sarah Elder
,
Anna Mattapallil
,
Laurie Williams
.
hotsos 2018
:
[doi]
Formal verification of the W3C web authentication protocol
Iness Ben Guirat
,
Harry Halpin
.
hotsos 2018
:
[doi]
Toward extraction of security requirements from text: poster
Hui Guo
,
Özgür Kafali
,
Anne-Liz Jeukeng
,
Laurie Williams
,
Munindar P. Singh
.
hotsos 2018
:
[doi]
Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs
Ira Ray Jenkins
,
Sergey Bratus
,
Sean W. Smith
,
Maxwell Koo
.
hotsos 2018
:
[doi]
What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster
Rick Kuhn
,
Mohammad S. Raunak
,
Raghu Kacker
.
hotsos 2018
:
[doi]
HACSAW: a trusted framework for cyber situational awareness
Leslie Leonard
,
William Glodek
.
hotsos 2018
:
[doi]
Robustness of deep autoencoder in intrusion detection under adversarial contamination
Pooria Madani
,
Natalija Vlajic
.
hotsos 2018
:
[doi]
An expert-based bibliometric for a science of security: poster
Lindsey McGowen
,
Angela Stoica
.
hotsos 2018
:
[doi]
Application of capability-based cyber risk assessment methodology to a space system
Martha McNeil
,
Thomas Llansó
,
Dallas Pearson
.
hotsos 2018
:
[doi]
Using object capabilities and effects to build an authority-safe module system: poster
Darya Melicher
,
Yangqingwei Shi
,
Valerie Zhao
,
Alex Potanin
,
Jonathan Aldrich
.
hotsos 2018
:
[doi]
Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems
Bradley Potteiger
,
Zhenkai Zhang
,
Xenofon D. Koutsoukos
.
hotsos 2018
:
[doi]
Investigating tensorflow for airport facial identification: poster
Nikolay Shopov
,
Mingu Jeong
,
Evin Rude
,
Brennan Neseralla
,
Scott Hutchison
,
Alexander Mentis
,
Suzanne J. Matthews
.
hotsos 2018
:
[doi]
Combinatorial security testing course
Dimitris E. Simos
,
Rick Kuhn
,
Yu Lei
,
Raghu Kacker
.
hotsos 2018
:
[doi]
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018
Munindar P. Singh
,
Laurie Williams
,
Rick Kuhn
,
Tao Xie 0001
, editors,
ACM,
2018.
[doi]
Hourglass-shaped architecture for model-based development of safe and secure cyber-physical systems: poster
Muhammad Umer Tariq
,
Marilyn Wolf
.
hotsos 2018
:
[doi]
Detecting monitor compromise using evidential reasoning: poster
Uttam Thakore
,
Ahmed M. Fawaz
,
William H. Sanders
.
hotsos 2018
:
[doi]
How bad is it, really? an analysis of severity scores for vulnerabilities: poster
Christopher Theisen
,
Laurie Williams
.
hotsos 2018
:
[doi]
Understanding challenges to adoption of the Microsoft elevation of privilege game
Inger Anne Tøndel
,
Tosin Daniel Oyetoyan
,
Martin Gilje Jaatun
,
Daniela Cruzes
.
hotsos 2018
:
[doi]
Quantitative underpinnings of secure, graceful degradation: poster
Ryan Wagner
,
David Garlan
,
Matt Fredrikson
.
hotsos 2018
:
[doi]
A ransomware research framework: poster
Daniel G. Wolf
,
Donald L. Goff
.
hotsos 2018
:
[doi]
Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software delivery
Erkang Zheng
,
Phil Gates-Idem
,
Matt Lavin
.
hotsos 2018
:
[doi]
2017
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017
ACM,
2017.
[doi]
Optimal Security Investments in a Prevention and Detection Game
Carlos Barreto
,
Alvaro A. Cárdenas
,
Alain Bensoussan
.
hotsos 2017
:
24-34
[doi]
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers
Morgan Burcham
,
Mahran Al-Zyoud
,
Jeffrey C. Carver
,
Mohammed Noraden Alsaleh
,
Hongying Du
,
Fida Gillani
,
Jun Jiang
,
Akond Rahman
,
Özgür Kafali
,
Ehab Al-Shaer
,
Laurie A. Williams
.
hotsos 2017
:
13-23
[doi]
Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms
Jairo Giraldo
,
Alvaro Cardenas
,
Murat Kantarcioglu
.
hotsos 2017
:
1-12
[doi]
On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach
Richeng Jin
,
Xiaofan He
,
Huaiyu Dai
.
hotsos 2017
:
45-51
[doi]
Global Variation in Attack Encounters and Hosting
Ghita Mezzour
,
Kathleen M. Carley
,
L. Richard Carley
.
hotsos 2017
:
62-73
[doi]
Surveying Security Practice Adherence in Software Development
Patrick Morrison
,
Benjamin H. Smith
,
Laurie A. Williams
.
hotsos 2017
:
85-94
[doi]
Learning a Privacy Incidents Database
Pradeep K. Murukannaiah
,
Chinmaya Dabral
,
Karthik Sheshadri
,
Esha Sharma
,
Jessica Staddon
.
hotsos 2017
:
35-44
[doi]
An Approach to Incorporating Uncertainty in Network Security Analysis
Hoang Hai Nguyen
,
Kartik Palani
,
David M. Nicol
.
hotsos 2017
:
74-84
[doi]
Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment
Weining Yang
,
Aiping Xiong
,
Jing Chen
,
Robert W. Proctor
,
Ninghui Li
.
hotsos 2017
:
52-61
[doi]
Sign in
or
sign up
to see more results.