researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2009
2010
2011
2012
2013
2014
2015
2016
2017
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Adel El-Atawy
Akira Kanaoka
Anoop Singhal
Carl A. Gunter
Christopher S. Oehmen
Ehab Al-Shaer
Eiji Okamoto
Errin W. Fulp
Fida Gillani
Hayawardh Vijayakumar
Jorge Lobo
Krishna Kant
Masahiko Kato
Mohammad Ashiqur Rahman
Mohammed Noraden Alsaleh
Saeed Al-Haj
Simon N. Foley
Sushil Jajodia
Trent Jaeger
William M. Fitzgerald
Filter by Top terms
[+]
OR
AND
NOT
1
access
active
analysis
approach
automated
configuration
configurations
cyber
data
defense
framework
management
network
policy
safeconfig
security
systems
towards
usa
using
SafeConfig (safeconfig)
Editions
Publications
Viewing Publication 1 - 96 from 96
2017
Step One Towards Science of Security
Mahran Al-Zyoud
,
Laurie Williams
,
Jeffrey C. Carver
.
safeconfig 2017
:
31-35
[doi]
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions
Luca Allodi
,
Sandro Etalle
.
safeconfig 2017
:
23-26
[doi]
A Flexible Approach Towards Security Validation
Michael Atighetchi
,
Fusun Yaman
,
David Last
,
Nicholas Paltzer
,
Meghan Caiazzo
,
Stephen Raio
.
safeconfig 2017
:
7-13
[doi]
Secure IoT Stream Data Management and Analytics with Intel SGX
Swarup Chandra
,
Vishal M. Karande
,
Latifur R. Khan
.
safeconfig 2017
:
37
[doi]
A First Look: Using Linux Containers for Deceptive Honeypots
Alexander Kedrowitsch
,
Danfeng (Daphne) Yao
,
Gang Wang
,
Kirk Cameron
.
safeconfig 2017
:
15-22
[doi]
Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems
Daniel Massey
.
safeconfig 2017
:
39
[doi]
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017
Nicholas J. Multari
,
Anoop Singhal
,
Erin Miller
, editors,
ACM,
2017.
[doi]
Predicting Zero-day Malicious IP Addresses
Amirreza Niakanlahiji
,
Mir Mehedi A. Pritom
,
Bei-tseng Chu
,
Ehab Al-Shaer
.
safeconfig 2017
:
1-6
[doi]
On the Detection of Adversarial Attacks against Deep Neural Networks
Weiyu Wang
,
Quanyan Zhu
.
safeconfig 2017
:
27-30
[doi]
2016
Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
.
safeconfig 2016
:
23-29
[doi]
Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies
Kevin Benton
,
L. Jean Camp
.
safeconfig 2016
:
31-36
[doi]
A One-Year Perspective on Exposed In-memory Key-Value Stores
Tobias Fiebig
,
Anja Feldmann
,
Matthias Petschick
.
safeconfig 2016
:
17-22
[doi]
AHEAD: A New Architecture for Active Defense
Fabio De Gaspari
,
Sushil Jajodia
,
Luigi V. Mancini
,
Agostino Panico
.
safeconfig 2016
:
11-16
[doi]
Configuring Software and Systems for Defense-in-Depth
Trent Jaeger
.
safeconfig 2016
:
1
[doi]
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks
Stefan Marksteiner
,
Harald Lernbeiß
,
Bernhard Jandl-Scherf
.
safeconfig 2016
:
37-43
[doi]
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October 24, 2016
Nicholas J. Multari
,
Anoop Singhal
,
David O. Manz
, editors,
ACM,
2016.
[doi]
SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?
Nicholas J. Multari
,
Anoop Singhal
,
David O. Manz
,
Robert Cowles
,
Jorge Cuéllar
,
Christopher Oehmen
,
Gregory Shannon
.
safeconfig 2016
:
53
[doi]
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks
Emilie Purvine
,
John R. Johnson
,
Chaomei Lo
.
safeconfig 2016
:
45-52
[doi]
From Cybersecurity to Collaborative Resiliency
George I. Sharkov
.
safeconfig 2016
:
3-9
[doi]
2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015
Ehab Al-Shaer
,
Christopher S. Oehmen
,
Mohammad Ashiqur Rahman
, editors,
ACM,
2015.
[doi]
Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks
Malik Shahzad Kaleem Awan
,
Pete Burnap
,
Omer F. Rana
.
safeconfig 2015
:
15-20
[doi]
Action Recommendation for Cyber Resilience
Sutanay Choudhury
,
Luke Rodriguez
,
Darren Curtis
,
Kiri Oler
,
Peter Nordquist
,
Pin-Yu Chen
,
Indrajit Ray
.
safeconfig 2015
:
3-8
[doi]
FlowMon: Detecting Malicious Switches in Software-Defined Networks
Andrzej Kamisinski
,
Carol Fung
.
safeconfig 2015
:
39-45
[doi]
Cyber Resilience-by-Construction: Modeling, Measuring & Verifying
Yasir Imtiaz Khan
,
Ehab Al-Shaer
,
Usman Rauf
.
safeconfig 2015
:
9-14
[doi]
A Security Enforcement Framework for Virtual Machine Migration Auction
Santosh Kumar Majhi
,
Padmalochan Bera
.
safeconfig 2015
:
47-53
[doi]
Policy Specialization to Support Domain Isolation
Simone Mutti
,
Enrico Bacis
,
Stefano Paraboschi
.
safeconfig 2015
:
33-38
[doi]
Using Probability Densities to Evolve more Secure Software Configurations
Caroline A. Odell
,
Matthew R. McNiece
,
Sarah K. Gage
,
Howard Donald Gage
,
Errin W. Fulp
.
safeconfig 2015
:
27-32
[doi]
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures
Christopher S. Oehmen
,
Thomas E. Carroll
,
Patrick C. Paulson
,
Daniel M. Best
,
Christine F. Noonan
,
Seth R. Thompson
,
Jeffrey L. Jensen
,
Glenn A. Fink
,
Elena S. Peterson
.
safeconfig 2015
:
55-58
[doi]
Automated Decision Making for Active Cyber Defense: Panel Discussion
Christopher S. Oehmen
,
Ehab Al-Shaer
,
Mohammad Ashiqur Rahman
.
safeconfig 2015
:
59
[doi]
Integrated Adaptive Cyber Defense: Integration Spiral Results
Wende Peters
.
safeconfig 2015
:
1
[doi]
Who Touched My Mission: Towards Probabilistic Mission Impact Assessment
Xiaoyan Sun
,
Anoop Singhal
,
Peng Liu
.
safeconfig 2015
:
21-26
[doi]
2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014
Ehab Al-Shaer
,
Krishna Kant
, editors,
ACM,
2014.
[doi]
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
.
safeconfig 2014
:
25-28
[doi]
Human Factors, Defaults, and Automation: Challenges and Opporunities
Lujo Bauer
.
safeconfig 2014
:
37
[doi]
Security Analysis of the Chinese Web: How well is it protected?
Ping Chen
,
Nick Nikiforakis
,
Lieven Desmet
,
Christophe Huygens
.
safeconfig 2014
:
3-9
[doi]
Improving Efficiency of Spam Detection using Economic Model
Fida Gillani
,
Ehab Al-Shaer
.
safeconfig 2014
:
11-18
[doi]
Detecting Roles and Anomalies in Hospital Access Audit Logs
Carl A. Gunter
.
safeconfig 2014
:
1
[doi]
Protecting Enterprise Networks through Attack Surface Expansion
Kun Sun
,
Sushil Jajodia
.
safeconfig 2014
:
29-32
[doi]
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network
Yasuyuki Tanaka
,
Atsuhiro Goto
.
safeconfig 2014
:
33-36
[doi]
Secure and Tamper Proof Code Management
Jeremy Tate
,
T. Charles Clancy
.
safeconfig 2014
:
19-24
[doi]
2013
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]
Ehab Al-Shaer
,
Xinming Ou
,
Geoffrey G. Xie
, editors,
Springer,
2013.
[doi]
2012
Towards a Unified Modeling and Verification of Network and System Security Configurations
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
,
Adel El-Atawy
.
safeconfig 2013
:
3-19
[doi]
Risk Based Access Control Using Classification
Nazia Badar
,
Jaideep Vaidya
,
Vijayalakshmi Atluri
,
Basit Shafiq
.
safeconfig 2013
:
79-95
[doi]
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework
Martín Barrère
,
Gaetan Hurel
,
Remi Badonnel
,
Olivier Festor
.
safeconfig 2013
:
41-58
[doi]
Programmable Diagnostic Network Measurement with Localization and Traffic Observation
Michael R. Clement
,
Dennis M. Volpano
.
safeconfig 2013
:
153-167
[doi]
Discovery of Unexpected Services and Communication Paths in Networked Systems
Ichita Higurashi
,
Akira Kanaoka
,
Masahiko Kato
,
Eiji Okamoto
.
safeconfig 2013
:
169-178
[doi]
Tracing Advanced Persistent Threats in Networked Systems
Masahiko Kato
,
Takumi Matsunami
,
Akira Kanaoka
,
Hiroshi Koide
,
Eiji Okamoto
.
safeconfig 2013
:
179-187
[doi]
Rule Configuration Checking in Secure Cooperative Data Access
Meixing Le
,
Krishna Kant
,
Sushil Jajodia
.
safeconfig 2013
:
135-149
[doi]
GCNav: Generic Configuration Navigation System
Shankaranarayanan Puzhavakath Narayanan
,
Seungjoon Lee
,
Subhabrata Sen
.
safeconfig 2013
:
99-117
[doi]
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure
Mohammad Ashiqur Rahman
,
Ehab Al-Shaer
.
safeconfig 2013
:
59-77
[doi]
The Right Files at the Right Time
Hayawardh Vijayakumar
,
Trent Jaeger
.
safeconfig 2013
:
119-133
[doi]
Modeling and Checking the Security of DIFC System Configurations
Mingyi Zhao
,
Peng Liu
.
safeconfig 2013
:
21-38
[doi]
2011
A Dynamic Configuration Validation Language
Ludi Akue
,
Emmanuel Lavinal
,
Michelle Sibilla
.
safeconfig 2011
:
[doi]
Measuring Firewall Security
Saeed Al-Haj
,
Ehab Al-Shaer
.
safeconfig 2011
:
[doi]
CloudChecker: An imperative framework for cloud configuration management
Saeed Al-Haj
,
Ehab Al-Shaer
.
safeconfig 2011
:
[doi]
ConfigChecker: A tool for comprehensive security configuration analytics
Ehab Al-Shaer
,
Mohammed Noraden Alsaleh
.
safeconfig 2011
:
[doi]
SCAP Based Configuration Analytics for Comprehensive Compliance Checking
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
.
safeconfig 2011
:
[doi]
4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011
John Banghart
,
Ehab Al-Shaer
,
Tony Sager
,
HariGovind V. Ramasamy
, editors,
IEEE,
2011.
A moving target environment for computer configurations using Genetic Algorithms
Michael B. Crouse
,
Errin W. Fulp
.
safeconfig 2011
:
[doi]
Reasoning about the Security Configuration of SAN Switch Fabrics
William M. Fitzgerald
,
Simon N. Foley
.
safeconfig 2011
:
[doi]
Federated Autonomic Network Access Control
Simon N. Foley
,
William M. Fitzgerald
,
Wayne Mac Adams
.
safeconfig 2011
:
[doi]
Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries
Fida Gillani
,
Umar Kalim
,
Noman Latif
,
Syed Ali Khayam
.
safeconfig 2011
:
[doi]
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis
Yousra Javed
,
Maliha Nazir
,
Muhammad Murtaza Khan
,
Syed Ali Khayam
,
Shujun Li
.
safeconfig 2011
:
[doi]
Security Considerations in Data Center Configuration Management
Krishna Kant
,
Meixing Le
,
Sushil Jajodia
.
safeconfig 2011
:
[doi]
A Generic Data Flow Security Model
Hicham El Khoury
,
Romain Laborde
,
François Barrère
,
Abdelmalek Benzekri
,
Maroun Chamoun
.
safeconfig 2011
:
[doi]
Vulnerability Hierarchies in Access Control Configurations
Rick Kuhn
.
safeconfig 2011
:
[doi]
Automation for Creating and Configuring Security Manifests for Hardware Containers
Eugen Leontie
,
Gedare Bloom
,
Rahul Simha
.
safeconfig 2011
:
[doi]
SEGrapher: Visualization-based SELinux Policy Analysis
Said Marouf
,
Mohamed Shehab
.
safeconfig 2011
:
[doi]
Towards Eliminating Configuration Errors in Cyber Infrastructure
Sanjai Narain
,
Sharad Malik
,
Ehab Al-Shaer
.
safeconfig 2011
:
[doi]
AMIAnalyzer: Security analysis of AMI configurations
Mohammad Ashiqur Rahman
,
Ehab Al-Shaer
.
safeconfig 2011
:
[doi]
A software toolkit for visualizing enterprise routing design
Xin Sun
,
Jinliang Wei
,
Sanjay G. Rao
,
Geoffrey G. Xie
.
safeconfig 2011
:
[doi]
2010
FlowChecker: configuration analysis and verification of federated openflow infrastructures
Ehab Al-Shaer
,
Saeed Al-Haj
.
safeconfig 2010
:
37-44
[doi]
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management
Michael Atighetchi
,
Jonathan Webb
,
Partha Pratim Pal
,
Joseph P. Loyall
,
Azer Bestavros
,
Michael J. Mayhew
.
safeconfig 2010
:
83-88
[doi]
Generating policy based security implementation in enterprise network: a formal framework
Padmalochan Bera
,
Soumya Maity
,
Soumya Kanti Ghosh
.
safeconfig 2010
:
1-8
[doi]
Authorizing and directing configuration updates in contemporary it infrastructures
Bart Van Brabant
,
Thomas Delaet
,
Wouter Joosen
.
safeconfig 2010
:
79-82
[doi]
Management of heterogeneous security access control configuration using an ontology engineering approach
William M. Fitzgerald
,
Simon N. Foley
.
safeconfig 2010
:
27-36
[doi]
Cue: a framework for generating meaningful feedback in XACML
Sunil Kumar Ghai
,
Prateek Nigam
,
Ponnurangam Kumaraguru
.
safeconfig 2010
:
9-16
[doi]
Towards an integrated approach to role engineering
Chris Giblin
,
Marcel Graf
,
Günter Karjoth
,
Andreas Wespi
,
Ian Molloy
,
Jorge Lobo
,
Seraphin B. Calo
.
safeconfig 2010
:
63-70
[doi]
FAME: a firewall anomaly management environment
Hongxin Hu
,
Gail-Joon Ahn
,
Ketan Kulkarni
.
safeconfig 2010
:
17-26
[doi]
A declarative approach for secure and robust routing
Palanivel A. Kodeswaran
,
Anupam Joshi
,
Timothy W. Finin
,
Filip Perich
.
safeconfig 2010
:
45-52
[doi]
Cut me some security
Divya Muthukumaran
,
Sandra Rueda
,
Hayawardh Vijayakumar
,
Trent Jaeger
.
safeconfig 2010
:
75-78
[doi]
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls
Fahimeh Raja
,
Kirstie Hawkey
,
Pooya Jaferian
,
Konstantin Beznosov
,
Kellogg S. Booth
.
safeconfig 2010
:
53-62
[doi]
3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010
Tony Sager
,
Gail-Joon Ahn
,
Krishna Kant
,
Heather Richter Lipford
, editors,
ACM,
2010.
[doi]
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment
Saman A. Zonouz
,
Kaustubh R. Joshi
,
William H. Sanders
.
safeconfig 2010
:
71-74
[doi]
2009
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009
Ehab Al-Shaer
,
Mohamed G. Gouda
,
Jorge Lobo
,
Sanjai Narain
,
Felix Wu
, editors,
ACM,
2009.
[doi]
Building robust authentication systems with activity-based personal questions
Anitra Babic
,
Huijun Xiong
,
Danfeng Yao
,
Liviu Iftode
.
safeconfig 2009
:
19-24
[doi]
Security policy refinement using data integration: a position paper
Robert Craven
,
Jorge Lobo
,
Emil Lupu
,
Alessandra Russo
,
Morris Sloman
.
safeconfig 2009
:
25-28
[doi]
Completeness of discovery protocols
Alwyn Goodloe
,
Carl A. Gunter
.
safeconfig 2009
:
29-36
[doi]
Trust based security auto-configuration for smart assisted living environments
Md. Endadul Hoque
,
Farzana Rahman
,
Sheikh Iqbal Ahamed
,
Lin Liu 0001
.
safeconfig 2009
:
7-12
[doi]
A toolkit for automating and visualizing VLAN configuration
Sunil Krothapalli
,
Xin Sun
,
Yu-Wei Eric Sung
,
Suan Aik Yeo
,
Sanjay G. Rao
.
safeconfig 2009
:
63-70
[doi]
Multi-aspect security configuration assessment
Mirko Montanari
,
Roy H. Campbell
.
safeconfig 2009
:
1-6
[doi]
PolicyGlobe: a framework for integrating network and operating system security policies
Hamed Okhravi
,
Ryan H. Kagin
,
David M. Nicol
.
safeconfig 2009
:
53-62
[doi]
Towards network security policy generation for configuration analysis and testing
Taghrid Samak
,
Adel El-Atawy
,
Ehab Al-Shaer
.
safeconfig 2009
:
45-52
[doi]
ePet: when cellular phone learns to recognize its owner
Mohammad Tanviruzzaman
,
Sheikh Iqbal Ahamed
,
Chowdhury Sharif Hasan
,
Casey O'Brien
.
safeconfig 2009
:
13-18
[doi]
Proof of an interdomain policy: a load-balancing multi-homed network
Andreas Voellmy
.
safeconfig 2009
:
37-44
[doi]
Configuring audience-oriented privacy policies
Jason Watson
,
Michael Whitney
,
Heather Richter Lipford
.
safeconfig 2009
:
71-78
[doi]
Sign in
or
sign up
to see more results.