Abstract is missing.
- Cyber-physical systems securityNabil R. Adam. 1 [doi]
- Pervasively secured infrastructures: a multi-layer mathematical frameworkSajal Das. 2 [doi]
- We can't get there from here!: the paradox of developing new classes of complex systemsMike Hinchey. 3 [doi]
- Security and complexity...are we on the wrong road?George Hull. 4 [doi]
- Spam and denial of information attacks and defensesCarlton Pu, John P. Imlay Jr.. 5 [doi]
- National cyber security research assessment and roadmapDoug Maughan. 6 [doi]
- Polymorphic shellcode: the demise of signature-based detectionSalvatore J. Stolfo. 7 [doi]
- Internet security threat landscape: scaling to meet the threatRobert J. Stratton III. 8 [doi]
- Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partnersBhavani Thuaisingham. 9 [doi]
- Keynote panelDoug Maughan, George Hull, Salvatore J. Stolfo, Robert Stratton. 10 [doi]
- DOE grass roots panelJohn McHugh, Robert Armstrong, Thomas A. Longstaff, Daniel Quinlan, Frederick T. Sheldon, Deborah A. Frincke. 11 [doi]
- Security-oriented program transformationsMunawar Hafiz, Ralph E. Johnson. 12 [doi]
- Security policy testing via automated program code generationTing Yu, Dhivya Sivasubramanian, Tao Xie. 13 [doi]
- Long term data storage issues for situational awarenessJohn McHugh. 14 [doi]
- Ontology-based security assessment for software productsJu An Wang, Minzhe Guo, Hao Wang, Min Xia, Linfeng Zhou. 15 [doi]
- Debugging support for security properties of software architecturesKyungsoo Im, John D. McGregor. 16 [doi]
- On building secure SCADA systems using security patternsEduardo B. Fernández, Jie Wu 0001, María M. Larrondo-Petrie, Yifeng Shao. 17 [doi]
- Defending financial infrastructures through early warning systems: the intelligence cloud approachGiorgia Lodi, Leonardo Querzoni, Roberto Baldoni, Mirco Marchetti, Michele Colajanni, Vita Bortnikov, Gregory Chockler, Eliezer Dekel, Gennady Laventman, Alexey Roytman. 18 [doi]
- JigDFS in container communities for international cargo securityJiang Bian, Remzi Seker, Srini Ramaswamy. 19 [doi]
- Automatic image analysis process for the detection of concealed weaponsRichard Gesick, Caner Saritac, Chih-Cheng Hung. 20 [doi]
- A distributed reinforcement learning approach to mission survivability in tactical MANETsMarco Carvalho. 21 [doi]
- Detecting overflow vulnerabilities using automated verificationBrian A. Malloy, Murali Sitaraman, Jason O. Hallstrom. 22 [doi]
- Resilient multi-core systems: a hierarchical formal model for N-variant executionsAxel W. Krings, Li Tan, Clinton Jeffery, Robert Rinker. 23 [doi]
- Privacy-aware security applications using RFID technologyS. Srinivasan. 24 [doi]
- Techniques for enterprise network security metricsAnoop Singhal, Xinming Ou. 25 [doi]
- Quantifying security threats and their impactAnis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili. 26 [doi]
- Fair electronic exchange using biometricsHarkeerat Bedi, Li Yang, Joseph M. Kizza. 27 [doi]
- An outline of the three-layer survivability analysis architecture for strategic information warfare researchZhanshan (Sam) Ma, Axel W. Krings, Frederick T. Sheldon. 28 [doi]
- Using automatic signature generation as a sensor backendDaniel Wyschogrod, Jeffrey Dezso. 29 [doi]
- A framework for synthetic stegoPhilip C. Ritchey, Jorge R. Ramos, Vernon Rego. 30 [doi]
- Leveraging complexity in software for cybersecurityRobert C. Armstrong, Jackson R. Mayo. 31 [doi]
- Privacy-preserving multi-dimensional credentialing using veiled certificatesChin-Tser Huang, John Gerdes Jr.. 32 [doi]
- Meta-models for misuse casesMark Hartong, Rajni Goel, Duminda Wijesekera. 33 [doi]
- OVM: an ontology for vulnerability managementJu An Wang, Minzhe Guo. 34 [doi]
- Information intelligence in cloud computing: how can Vijjana, a collaborative, self-organizing, domain centric knowledge network model helpAsesh Das, Y. V. Ramana Reddy, Luyi Wang, Sumitra Reddy. 35 [doi]
- Computing the behavior of malicious code with function extraction technologyRichard C. Linger, Stacy J. Prowell, Kirk Sayre. 36 [doi]
- Data fusion for improved situational understandingAmbareen Siraj. 37 [doi]
- An active trust model based on zero knowledge proofs for airborne networksKamesh Namuduri. 38 [doi]
- An assessment of accountability policies for large-scale distributed computing systemsWonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino. 39 [doi]
- Source code and binary analysis of software defectsDaniel J. Quinlan, Thomas Panas. 40 [doi]
- A biologically inspired password authentication systemDipankar Dasgupta, Sudip Saha. 41 [doi]
- Virtualization securityEdward Ray, Eugene Schultz. 42 [doi]
- Trust negotiation: authorization for virtual organizationsMarianne Winslett, Adam J. Lee, Kenneth J. Perano. 43 [doi]
- Graph-based approaches to insider threat detectionWilliam Eberle, Lawrence B. Holder. 44 [doi]
- A security architecture to protect against the insider threat from damage, fraud and theftClive Blackwell. 45 [doi]
- A traceability link mining approach for identifying insider threatsYi Hu, Brajendra Panda. 46 [doi]
- Monitoring security events using integrated correlation-based techniquesQishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta. 47 [doi]
- Behavioral analysis of fast flux service networksAlper K. Caglayan, Mike Toothaker, Dan Drapeau, Dustin Burke, Gerry Eaton. 48 [doi]
- The case for prevention-based, host-resident defenses in the modern PCS networkCharles N. Payne Jr., Richard C. O'Brien, J. Thomas Haigh. 49 [doi]
- u-Vote: a convenient on-line e-voting systemFrancesca Merighi, Stefano Ravaioli. 50 [doi]
- User identification via process profiling: extended abstractSteve McKinney, Douglas S. Reeves. 51 [doi]
- External monitoring of endpoint configuration complianceDarrell M. Kienzle, Ryan Persaud, Matthew C. Elder. 52 [doi]
- Security models for contextual based global processing an architecture and overviewGregory Vert, S. S. Iyengar, Vir V. Phoha. 53 [doi]
- Towards insider threat detection using web server logsJustin Myers, Michael R. Grimaila, Robert F. Mills. 54 [doi]
- Integrated circuit security: new threats and solutionsMiron Abramovici, Paul Bradley. 55 [doi]
- Feature set selection in data mining techniques for unknown virus detection: a comparison studyJianyong Dai, Ratan K. Guha, Joohan Lee. 56 [doi]
- File-system intrusion detection by preserving MAC DTS: a loadable kernel module based approach for LINUX kernel 2.6.xSuvrojit Das, Arijit Chattopadhayay, Dipesh Kumar Kalyani, Monojit Saha. 57 [doi]
- Secure processing using dynamic partial reconfigurationChristopher T. Rathgeb, Gregory D. Peterson. 58 [doi]
- st century network defenseMonty McDougal. 59 [doi]
- High assurance programming in CryptolLevent Erkök, John Matthews. 60 [doi]
- Total cost of security: a method for managing risks and incentives across the extended enterpriseRussell Cameron Thomas. 61 [doi]
- Integrating Dirichlet reputation into usage controlLi Yang, Alma Cemerlic. 62 [doi]
- Introduction of first passage time (FPT) analysis for software reliability and network securityZhanshan (Sam) Ma, Axel W. Krings, Richard C. Millar. 63 [doi]
- Towards usable cyber security requirementsJose Romero-Mariona, Hadar Ziv, Debra J. Richardson, Dennis Bystritsky. 64 [doi]
- A dynamic erasure code for multicasting live dataErik M. Ferragut. 65 [doi]
- A pipeline development toolkit in support of secure information flow goalsPhilip Tricca. 66 [doi]
- Content-based alternatives to conventional network monitoring systemsGeorge Louthan, Brady Deetz, Matthew Walker, John Hale. 67 [doi]
- Decision dependability and its application to identity managementNathan D. Kalka, Nick Bartlow, Bojan Cukic. 68 [doi]
- How to determine threat probabilities using ontologies and Bayesian networksStefan Fenz, Thomas Neubauer. 69 [doi]