Abstract is missing.
- Resilient device authentication system (RDAS) through SIOMETRICSMichael Duren, John Walsh, Hal Aldridge, Meng-Day (Mandel) Yu. 1 [doi]
- Security and performance evaluation of security protocolsRichard Brooks, Benafsh Husain, SeokBae Yun, Juan Deng. 2 [doi]
- Addressing the challenges of anomaly detection for cyber physical energy grid systemsErik M. Ferragut, Jason Laska, Bogdan D. Czejdo, Alex Melin. 3 [doi]
- An architecture for cross-cloud auditingRui Xie, Rose Gamble. 4 [doi]
- Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocolHui Lin, Adam J. Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 5 [doi]
- Modeling and verification of security properties for critical infrastructure protectionRavi Akella, Bruce M. McMillin. 6 [doi]
- Graph coarsening for path finding in cybersecurity graphsEmilie Hogan, John R. Johnson, Mahantesh Halappanavar. 7 [doi]
- Interlocking obfuscation for anti-tamper hardwareAvinash R. Desai, Michael S. Hsiao, Chao Wang, Leyla Nazhandali, Simin Hall. 8 [doi]
- ADS-B encryption: confidentiality in the friendly skiesCindy Finke, Jonathan Butts, Robert Mills. 9 [doi]
- Threat modeling for security assessment in cyberphysical systemsJanusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki. 10 [doi]
- Identifying a preferred countermeasure strategy for attack graphsGanesh Ram Santhanam, Zachary J. Oster, Samik Basu. 11 [doi]
- Mission-aware time-dependent cyber asset criticality and resilienceHasan Cam, Pierre Mouallem. 12 [doi]
- Enabling trustworthy spaces via orchestrated analytical securityJoshua Howes, James Solderitsch, Ignatius Chen, Jonté Craighead. 13 [doi]
- Timing analysis in P2P botnet traffic using probabilistic context-free grammarsChen Lu, Richard R. Brooks. 14 [doi]
- Cost-effective quality assurance of wireless network securityKatherine C. Cameron, Richard R. Brooks, Juan Deng. 15 [doi]
- Trust contract of a service and its role in service selection for distributed software systemsLahiru S. Gallege, Dimuthu Gamage, James H. Hill, Rajeev R. Raje. 16 [doi]
- Tailoring trusted semantic informationLianyu Zhao, Richard R. Brooks. 17 [doi]
- Development & expansion of an industrial control system security laboratory and an international research collaborationRayford B. Vaughn, Thomas H. Morris, Elena Sitnikova. 18 [doi]
- Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili. 19 [doi]
- Optimizing investments in cyber-security for critical infrastructureIke Patterson, James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, David Fugate. 20 [doi]
- Fireaxe: the DHS secure design competition pilotYevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd, Ron Olsberg, Lyndon Pierson, Owen Redwood. 21 [doi]
- Relationships between information security metrics: an empirical studyRodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes. 22 [doi]
- A learning system for discriminating variants of malicious network trafficJustin M. Beaver, Christopher T. Symons, Robert E. Gillen. 23 [doi]
- Locating executable fragments with Concordia, a scalable, semantics-based architectureJason M. Carter. 24 [doi]
- XEBHRA: a virtualized platform for cross domain information sharingCharles N. Payne Jr., Jason Sonnek, Steven A. Harp. 25 [doi]
- Gesture-oriented data sharingZach Harbort, Conor Fellin. 26 [doi]
- Model-based intrustion detection for the smart grid (MINDS)Adam Hahn, Manimaran Govindarasu. 27 [doi]
- Developing a power measurement framework for cyber defenseJarilyn M. Hernández, Line Pouchard, Jeffrey McDonald, Stacy Prowell. 28 [doi]
- Securing system controllers in critical infrastructuresRattikorn Hewett, Phongphun Kijsanayothin. 29 [doi]
- Visualizing graph features for fast port scan detectionMaggie X. Cheng, Quanmin Ye, Robert F. Erbacher. 30 [doi]
- On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networksVictor Balogun, Axel W. Krings. 31 [doi]
- Using mobile agents and overlay networks to secure electrical networksNeal Dawes, Bryan Prosser, Errin W. Fulp, A. David McKinnon. 32 [doi]
- Machine-oriented biometrics and cocooning for dynamic network defenseJason J. Haas, J. D. Doak, Jason R. Hamlet. 33 [doi]
- A survivable critical infrastructure control applicationA. Serageldin, Axel W. Krings, Ahmed Abdel-Rahim. 34 [doi]
- Use of transfer entropy to infer relationships from behaviorTravis L. Bauer, Richard Colbaugh, Kristin Glass, David Schnizlein. 35 [doi]
- A layered approach to understanding network dependencies on moving target defense mechanismsSean Crosby, Marco M. Carvalho, Dan Kidwell. 36 [doi]
- Evolutionary drift models for moving target defenseChristopher S. Oehmen, Elena S. Peterson, Jeremy Teuton. 37 [doi]
- A human-agent teamwork command and control framework for moving target defense (MTC2)Marco M. Carvalho, Thomas C. Eskridge, Larry Bunch, Jeffrey M. Bradshaw, Adam Dalton, Paul J. Feltovich, James Lott, Dan Kidwell. 38 [doi]
- First steps toward scientific cyber-security experimentation in wide-area cyber-physical systemsRyan Goodfellow, Robert Braden, Terry Benzel, David E. Bakken. 39 [doi]
- Causal event graphs cyber-physical system intrusion detection systemShengyi Pan, Thomas H. Morris, Uttam Adhikari, Vahid Madani. 40 [doi]
- Protocol mutation intrusion detection for synchrophasor communicationsRead Sprabery, Thomas H. Morris, Shengyi Pan, Uttam Adhikari, Vahid Madani. 41 [doi]
- Entity authentication in a mobile-cloud environmentDavid Schwab, Li Yang. 42 [doi]
- Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstrationRichard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum. 43 [doi]
- Addressing smart grid cyber securityAnnarita Giani, Russell Bent. 44 [doi]
- Using simulation to engineer cybersecurity requirementsJames J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, Darren Highfill. 45 [doi]
- Estimating link availability and timing delays in ethernet-based networksJeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak. 46 [doi]
- Quantification of information systems security with stochastic calculusDimitrios Mermigas, Constantinos Patsakis, Sotirios Pirounias. 47 [doi]
- Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructureMichael Duren, Hal Aldridge, Robert K. Abercrombie, Frederick T. Sheldon. 48 [doi]
- Applying POMDP to moving target optimizationLu Yu, Richard R. Brooks. 49 [doi]
- Creating a tailored trustworthy space for democracy advocates using hostile hostR. R. Brooks, Oluwakemi Hambolu, Paul Marusich, Yu Fu, Saiprasad Balachandran. 50 [doi]
- Characterizing riskMichael J. Lewis. 51 [doi]
- Assessing trustworthiness in collaborative environmentsJeffrey Segall, Michael J. Mayhew, Michael Atighetchi, Rachel Greenstadt. 52 [doi]
- Using transport layer multihoming to enhance network layer moving target defensesReese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront. 53 [doi]
- Implementing graceful RFID privilege reductionMatthew Butler, Steven Reed, Peter J. Hawrylak, John Hale. 54 [doi]
- Operational system testing for designed in securityIlker Özçelik, Richard R. Brooks. 55 [doi]
- Towards automatic security management: a model-based approachQian Chen, Sherif Abdelwahed, Weston Monceaux. 56 [doi]
- Mission-oriented moving target defense based on cryptographically strong network dynamicsJustin Yackoski, Jason H. Li, Scott A. DeLoach, Xinming Ou. 57 [doi]
- Theorem-based, data-driven, cyber event detectionLee M. Hively, J. Todd McDonald. 58 [doi]
- Vulnerability analysis of a smart grid with monitoring and control systemMaggie X. Cheng, Mariesa Crow, Robert F. Erbacher. 59 [doi]
- A prediction model for anomalies in smart grid with sensor networkShubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, Paul Mixon. 60 [doi]
- On the use of the Clark-Wilson security model to protect industrial automation control systemsDennis K. Holstein. 61 [doi]
- Moving target defense (MTD) in an adaptive execution environmentAaron Paulos, P. Pal, Richard E. Schantz, Brett Benyo. 62 [doi]
- Intrinsically resilient energy control systemsFrederick T. Sheldon, Daniel Fetzer, David Manz, Jingshan Huang, Stuart Goose, Thomas Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei. 63 [doi]