Abstract is missing.
- Energy infrastructure cyber protection: protecting our critical infrastructurePatricia Hoffman. 1 [doi]
- Working to achieve cybersecurity in the energy sectorCarol Hawk. 2 [doi]
- Transforming NNSA information, collaboration and securityRobert Osborn. 3 [doi]
- Federal R&D landscape and DHS S&T overviewDoug Maughan. 4 [doi]
- Software assurance: mitigating risk of zero-day attacks and enabling resilience of cyber infrastructureJoe Jarzombeck. 5 [doi]
- Plenary Speakers: Jennifer Silk, White House and Matthew E. Luallen, SANSJennifer Silk, Matthew E. Luallen. 6 [doi]
- Plenary Keynote Speaker: Rear Admiral Michael A. Brown, DoD/DHSMichael A. Brown. 7 [doi]
- Towards a theory of high confidence networked control systems: action websShankar Sastry. 8 [doi]
- Plenary Speaker: Gregory Neal Akers, CISCOGregory Neal Akers. 9 [doi]
- Plenary keynote Speaker: Major General George J. Allen, J5, US Cyber CommandGeorge J. Allen. 10 [doi]
- Plenary Speaker: John Bumgarner, U.S. Cyber Consequences UnitJohn Bumgarner. 11 [doi]
- NICE: National Initiative for Cybersecurity EducationErnest McDuffie. 12 [doi]
- NSF investments in cybersecurity research and educationVictor Piotrowski. 13 [doi]
- Key questions for the day on cryptographic key managementCarol Hawk. 14 [doi]
- National Laboratory panelDebra Frincke. 15 [doi]
- A class of cyber-physical switching attacks for power system disruptionShan Liu, Xianyong Feng, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry. 16 [doi]
- Monitoring smart grid operations and maintaining mission assurance through adaptive computer network defensesDaniel Bilar, James Solderitsch, Elvis Hovor. 17 [doi]
- Verified workflow-based software development for infrastructure sensing and control applicationsDouglas A. Creager, John McHugh. 18 [doi]
- Minimizing the TCB for securing SCADA systemsArun Velagapalli, Mahalingam Ramkumar. 19 [doi]
- A cyber-physical security testbed for smart grid: system architecture and studiesAditya Ashok, Adam Hahn, Manimaran Govindarasu. 20 [doi]
- Toward survivable SCADAJonathan Kirsch, Stuart Goose, Yair Amir, Paul M. Skare. 21 [doi]
- How to glue a robust smart-grid?: a "finite-network" theory for interdependent network robustnessGyan Ranjan, Zhi-Li Zhang. 22 [doi]
- Formally modeling the electricity grid with bigraphsClive Blackwell. 23 [doi]
- Cybersecurity risk testing of substation phasor measurement units and phasor data concentratorsThomas Morris, Shengyi Pan, Jeremy Lewis, Jonathan Moorhead, Nicolas H. Younan, Roger L. King, Mark Freund, Vahid Madani. 24 [doi]
- SCADA security device: design and implementationAniket Rodrigues, Tish Best, Ravi Pendse. 25 [doi]
- Using anomalous event patterns in control systems for tamper detectionWilliam L. Sousan, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney. 26 [doi]
- A testbed for SCADA control system cybersecurity research and pedagogyThomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass. 27 [doi]
- An evolutionary multi-agent approach to anomaly detection and cyber defenseMarco M. Carvalho, Carlos Perez. 28 [doi]
- A predictive defense system for the smart gridNing Lu, Pengwei Du, Patrick Paulson, Frank L. Greitzer, Xinxin Guo, Mark Hadley. 29 [doi]
- Using clustering to detect Chinese censorwareBecker Polverini, William M. Pottenger. 30 [doi]
- Botnet traffic detection using hidden Markov modelsChen Lu, Richard R. Brooks. 31 [doi]
- Identity management for cloud computing: developments and directionsKevin W. Hamlen, Peng Liu 0005, Murat Kantarcioglu, Bhavani M. Thuraisingham, Ting Yu. 32 [doi]
- Network traffic classification using a parallel neural network classifier architectureBereket Mathewos, Marco Carvalho, Fredric Ham. 33 [doi]
- A measurement-based design and evaluation methodology for embedded control systemsAxel W. Krings, Victor Balogun, Saad Alshomrani, Ahmed Abdel-Rahim, Mike Dixon. 34 [doi]
- A novel data reduction techniqueRobert F. Erbacher, Anupama Biswas, Trent Cameron. 35 [doi]
- Collaborations, mergers, acquisitions, and security policy conflict analysisVimalathithan Subramanian, Remzi Seker, Jiang Bian, Nitin Kanaskar. 36 [doi]
- Tradeoffs in targeted fuzzing of cyber systems by defenders and attackersJackson Mayo, Robert C. Armstrong. 37 [doi]
- ILP security optimization method for embedded systems with timing constraintsZhi Chen, Meikang Qiu, Lei Zhang, Fei Hu, Lei Zhang. 38 [doi]
- Secure VM for monitoring industrial process controllersDipankar Dasgupta, Mohd. Hassan Ali, Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon, Marco Carvalho. 39 [doi]
- A framework for estimating security coverage for cloud service insuranceDipankar Dasgupta, Md Moshiur Rahman. 40 [doi]
- A formal test for detecting information leakage via covert channelsJason Jaskolka, Ridha Khédri, Khair Eddin Sabri. 41 [doi]
- Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?Zhanshan (Sam) Ma, Hongju (Daisy) Chen, Jiajin Zhang, Axel W. Krings, Frederick T. Sheldon. 42 [doi]
- A system for intelligent substitution of named entities with applications to the automatic generation of honey tokensAaron Mishtal, Craig Shue, Stephen Kelley. 43 [doi]
- System log summarization via semi-Markov models of inter-arrival timesErik M. Ferragut, Nicole Braden. 44 [doi]
- Physical-layer encryption for enhanced cyber-physical securityAlan Michaels, Josef Allen. 45 [doi]
- Can we measure security and how?Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki. 46 [doi]
- Graceful privilege reduction in RFID securityMatthew Butler, Peter J. Hawrylak, John Hale. 47 [doi]
- Implementing a "moving target" system to protect serversCurtis Taylor, Craug Shue. 48 [doi]
- Supporting velocity of investigation with behavior analysis of malwareRich Nolan, Peter Chen. 49 [doi]
- An architecture for ConcordiaJason Carter. 50 [doi]
- Behavior computation for smart grid software analysisRichard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre. 51 [doi]
- Information flow security in cyber-physical systemsThoshitha T. Gamage, Ravi Akella, Thomas P. Roth, Bruce M. McMillin. 52 [doi]
- Towards an experimental testbed facility for cyber-physical security researchThomas W. Edgar, David O. Manz, Thomas Carroll. 53 [doi]
- Preventing cascading event: a distributed cyber-physical approachJosef D. Allen, Sereyvathana Ty, Xiuwen Liu, Ivan Lozano. 54 [doi]
- Using a high assurance TCB for infrastructure securityMark Heckman, Roger R. Schell, Edwards Reed. 55 [doi]
- Towards a cooperative autonomous resilient defense platform for cyber-physical systemsMohamed Azab, Mohamed Eltoweissy. 56 [doi]
- Exploiting the critical infrastructure via nontraditional system inputsLucille McMinn, Jonathan Butts, David Robinson, Billy Rios. 57 [doi]
- An empirical analysis of the cascade error reconciliation protocol for quantum key distributionTimothy Calver, Michael Grimaila, Jeffrey Humphries. 58 [doi]
- Secure cryptographic key management system (CKMS) considerations for smart grid devicesRobert K. Abercrombie, Frederick T. Sheldon, Hal Aldridge, Michael Duren, Tracy Ricci, Elisa Bertino, N. Athula Kulatunga, Uditha Navaratne. 59 [doi]
- SignatureCheck: a protocol to detect man-in-the-middle attack in SSLKevin Benton, Ju-Yeon Jo, Yoohwan Kim. 60 [doi]
- Network covert channels on the Android platformWade Gasior, Li Yang. 61 [doi]
- Toward hybrid attack dependency graphsGeorge Louthan, Phoebe Hardwicke, Peter J. Hawrylak, John Hale. 62 [doi]
- Attacker behavior analysis in multi-stage attack detection systemRajeshwar Katipally, Li Yang, Anyi Liu. 63 [doi]
- On advanced cryptographic techniques for information security of smart grid AMIMiodrag J. Mihaljevic, Hideki Imai, Michael David, Kazukuni Kobara, Hajime Watanabe. 64 [doi]
- Jamming-resilient multi-radio multi-channel multihop wireless network for smart gridHai Su, Meikang Qiu, Huimin Chen, Zhonghai Lu, Xiao Qin. 65 [doi]
- Defining trust evidence: research directionsClaire Vishik, Anand Rajan, Chris Ramming, David Grawrock, Jesse Walker. 66 [doi]
- Security protection on FPGA against differential power analysis attacksJiayin Li, Daigu Zhang, Meikang Qiu, Yongxin Zhu, Ju Shen. 67 [doi]
- Deterministic circuit variation for anti-tamper applicationsJ. Todd McDonald, Yong C. Kim, Daniel J. Koranek. 68 [doi]
- Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structuresJinpeng Wei, Calton Pu, Keke Chen. 69 [doi]
- DART3: DHS assistant for R&D tracking and technology transferLuanne Burns, Christina Selby, Thomas A. Longstaff. 70 [doi]
- Web traffic profiling and characterizationRobert F. Erbacher, Steve E. Hutchinson, Joshua Edwards. 71 [doi]
- Distributed radio relay for communication and control with physical-layer security in smart gridTerry N. Guo. 72 [doi]
- Data integrity validation framework for distribution system operationsYonghe Guo, Chee-Wooi Ten, Panida Jirutitijaroen. 73 [doi]
- Techniques for attack graph visualization and interactionZach Harbort, George Louthan, John Hale. 74 [doi]
- Insider-free systemsAlec Yasinsac, Jonathan Alawine. 75 [doi]
- A new agent based security framework for collaborative cloud environmentSunirmal Khatua, Nandini Mukherjee, Nabendu Chaki. 76 [doi]
- Anomaly detection in multiple scale for insider threat analysisYoohwan Kim, Frederick T. Sheldon. 77 [doi]
- A layer cyber security defense strategy for smart grid programmable logic controllersSummer Olmstead, Joseph Stites, Ferrol Aderholdt. 78 [doi]
- Security experimentation using operational systemsIlker Ozcelik, Richard R. Brooks. 79 [doi]
- BioRAC: biologically inspired resilient autonomic cloudSalim Hariri, Mohamed Eltoweissy, Youssif B. Al-Nashif. 80 [doi]
- Implementing a "moving target" system to protect serversCurtis R. Taylor, Craig A. Shue. 81 [doi]
- Usable protection to healthcare applicationLi Yang, Mina Sartipi, Matt McNeely. 82 [doi]
- Observable subspace solution for irreducible POMDPs with infinite horizonLu Yu, Richard R. Brooks. 83 [doi]