Abstract is missing.
- On GPU accelerated tuning for a payload anomaly-based network intrusion detection schemeSun-il Kim, William Edmonds, Nnamdi Nwanze. 1-4 [doi]
- Metrics suite for network attack graph analyticsSteven Noel, Sushil Jajodia. 5-8 [doi]
- Secure control systems with application to cyber-physical systemsJin Dong, Seddik M. Djouadi, James J. Nutaro, Phani Teja Kuruganti. 9-12 [doi]
- A dimensional transformation scheme for power grid cyber event detectionNathan Wallace, Stanislav Ponomarev, Travis Atkison. 13-16 [doi]
- Towards modeling the behavior of static code analysis toolsLakshmi Manohar Rao Velicheti, Dennis C. Feiock, Manjula Peiris, Rajeev R. Raje, James H. Hill. 17-20 [doi]
- Detection of SSH host spoofing in control systems through network telemetry analysisStanislav Ponomarev, Nathan Wallace, Travis Atkison. 21-24 [doi]
- Exploring security in ZigBee networksLindsey N. Whitehurst, Todd R. Andel, J. Todd McDonald. 25-28 [doi]
- Image enhanced CAPTCHA for web securityShaun-Inn Wu, Hieu Trong Ho. 29-32 [doi]
- Retrieving relevant CAPEC attack patterns for secure software developmentXiaohong Yuan, Emmanuel Borkor Nuakoh, Jodria S. Beal, Huiming Yu. 33-36 [doi]
- Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart gridMatthew Sherburne, Randy C. Marchany, Joseph G. Tront. 37-40 [doi]
- Diverse virtual replicas for improving intrusion tolerance in cloudMinzhe Guo, Prabir Bhattacharya. 41-44 [doi]
- Coordinating security and safety engineering processes in automotive electronics developmentChristopher Robinson-Mallett. 45-48 [doi]
- Integration of external data sources with cyber security data warehouseBogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall. 49-52 [doi]
- Context-aware multimedia encryption in mobile platformsMohamed Fazeen, Garima Bajwa, Ram Dantu. 53-56 [doi]
- Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating setsBader Alwasel, Stephen D. Wolthusen. 57-60 [doi]
- Towards trust-based recommender systems for online software servicesLahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje. 61-64 [doi]
- An adaptive approach for continuous multi-factor authentication in an identity eco-systemAbhijit Kumar Nag, Dipankar Dasgupta. 65-68 [doi]
- An initial framework for evolving computer configurations as a moving target defenseBrian Lucas, Errin W. Fulp, David J. John, Daniel A. Cañas. 69-72 [doi]
- A model for analyzing the effect of moving target defenses on enterprise networksRui Zhuang, Scott A. DeLoach, Xinming Ou. 73-76 [doi]
- Cybersecurity procurement language for energy delivery systemsEd Goff, Cliff Glantz, Rebecca Massello. 77-79 [doi]
- Quantifying availability in SCADA environments using the cyber security metric MFCAnis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili, Frederick T. Sheldon. 81-84 [doi]
- The accuracy of user authentication through keystroke features using the most frequent wordsAlaa Darabseh, Akbar Siami Namin. 85-88 [doi]
- Modeling and simulation of electric power substation employing an IEC 61850 networkJeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak. 89-92 [doi]
- Predicting and detecting emerging cyberattack patterns using StreamWorksGeorge Chin Jr., Sutanay Choudhury, John Feo, Lawrence B. Holder. 93-96 [doi]
- NICE: endpoint-based topology discoveryDarrell M. Kienzle, Nathan S. Evans, Matthew C. Elder. 97-100 [doi]
- Hybrid extensions for stateful attack graphsGeorge Louthan, Michael Haney, Phoebe Hardwicke, Peter J. Hawrylak, John Hale. 101-104 [doi]
- Towards realizing self-protecting SCADA systemsQian Chen, Sherif Abdelwahed. 105-108 [doi]
- Cyber-security analysis of smart grid SCADA systems with game modelsRattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin. 109-112 [doi]
- Location-based device grouping for function restrictionLiang Kong, Gavin Bauer, John Hale. 113-116 [doi]
- MoRE: measurement of running executablesJacob Torrey. 117-120 [doi]
- A framework for the design and deployment of a SCADA honeynetMichael Haney, Mauricio Papa. 121-124 [doi]