Abstract is missing.
- Mobile components securityBenjamin Arazi. [doi]
- Optimizing quality of service of wireless mobile ad-hoc networks using evolutionary computationThomas J. Sapienza. [doi]
- Quantum information: opportunities and challenges or "What's this quantum stuff and what does it have to do with cyber security?"Ryan Bennink. [doi]
- Dynamic instruction sequences monitor for virus detectionJianyong Dai, Ratan Guha, Joohan Lee. [doi]
- A comprehensive objective network security metric framework for proactive security configurationEhab Al-Shaer, Latifur Khan, Mohammad Salim Ahmed. [doi]
- Temporal metrics for software vulnerabilitiesJu An Wang, Fengwei Zhang, Min Xia. [doi]
- Log-based distributed intrusion detection for hybrid networksFrançoise Sailhan, Julien Bourgeois. [doi]
- Towards practical intrusion tolerant systems: a blueprintWenbing Zhao. [doi]
- Creating the secure software testing target listRobert A. Martin, Sean Barnum. [doi]
- Semantics for a domain-specific language for the digital forensics domainPhillip G. Bradford, Daniel A. Ray. [doi]
- Detecting sensitive data exfiltration by an insider attackYali Liu, Cherita L. Corbett, Ken Chiang, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal. [doi]
- Cyber-vulnerability of power grid monitoring and control systemsChee-Wooi Ten, Chen-Ching Liu, Manimaran Govindarasu. [doi]
- Peer to peer botnet detection for cyber-security: a data mining approachMohammad M. Masud, Jing Gao 0004, Latifur Khan, Jiawei Han 0001, Bhavani M. Thuraisingham. [doi]
- Improving the cyber incident mission impact assessment (CIMIA) processMichael R. Grimaila, Robert F. Mills, Larry W. Fortson. [doi]
- Markov models for application behavior analysisGeoffrey Mazeroff. [doi]
- Improving self defense by learning from limited experienceKaren Zita Haigh, Steven A. Harp. [doi]
- Best practices on information sharing of threats and warnings between the USG and industrySteve Lines. [doi]
- Noisy defenses: subverting malware's OODA loopDaniel Bilar. [doi]
- Active semantically aware hard real-time security hypervisorsVictor Yodaiken, Cort Dougan. [doi]
- Computing and the futureMike McDuffie. [doi]
- Formal derivation of security design specifications from security requirementsRiham Hassan, Shawn A. Bohner, Sherif El-Kassas. [doi]
- Eliminating the insider threat in software development by combining parallelism, randomization and checkpointingMichael Franz. [doi]
- Accessing and manipulating meaning of textual and data information for information assurance and security and intelligence informationVictor Raskin, Brian Buck, Arthur Keen, Christian F. Hempelmann, Katrina E. Triezenberg. [doi]
- A rigorous methodology for security architecture modeling and verificationYomna Ali, Sherif El-Kassas. [doi]
- End-to-end accountability in grid computing systems for coalition information sharingElisa Bertino, Wonjun Lee, Anna Cinzia Squicciarini, Bhavani M. Thuraisingham. [doi]
- Security in a peer-to-peer data grid storage systemLiangliang Xiao, I-Ling Yen, Farokh B. Bastani. [doi]
- Evaluating security controls based on key performance indicators and stakeholder missionFrederick T. Sheldon, Robert K. Abercrombie, Ali Mili. [doi]
- Emergence of cyber anti-forensics impacting cyber securityBob G. Schlicher. [doi]
- Securing vehicles against cyber attacksUlf E. Larson, Dennis K. Nilsson. [doi]
- Extending hardware based mandatory access controls for memory to multicore architecturesBrian L. Sharp, Gregory D. Peterson, Lok-Kwong Yan. [doi]
- Electronic voting systems: are your votes really countedRichard M. (Dick) Kemmerer. [doi]
- An abstract interface for cyber-defense mechanismsFranklin Webber, Partha Pal, Paul Rubel, Michael Atighetchi. [doi]
- ULISSE, a network intrusion detection systemStefano Zanero. [doi]
- Real-world polymorphic attack detection using network-level emulationMichalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos. [doi]
- A multi-layered security architecture for modelling complex systemsClive Blackwell. [doi]
- th annual cyber security and information intelligence research workshopJoseph P. Trien, Robert K. Abercrombie, Frederick T. Sheldon. [doi]
- Internet security threat landscape: current changes in targets & methodsBrian Witten. [doi]
- End to end trustPatrick Arnold. [doi]
- Automotive system security: challenges and state-of-the-artR. R. Brooks, S. Sander, J. Deng, Joachim Taiber. [doi]
- Design for survivability: a tradeoff spaceAxel Krings. [doi]
- Abstract for NIST PRISMA enhancementJohn M. Abeles. [doi]
- Thirteen rules for trustJeff Voas. [doi]
- Defining the insider threatMatt Bishop, Carrie Gates. [doi]
- Secure and reliable covert channelBaishakhi Ray, Shivakant Mishra. [doi]