Abstract is missing.
- Forecasting Zero-Day VulnerabilitiesDavid Last. [doi]
- Xen Network Flow Analysis for Intrusion DetectionReece Johnston, Sun-il Kim, David Coe, Letha Etzkorn, Jeffrey H. Kulick, Aleksandar Milenkovic. [doi]
- A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection EffectivenessChris Strasburg, Samik Basu, Johnny S. Wong. [doi]
- Towards Selecting and Recommending Online Software Services by Evaluating External AttributesLahiru S. Gallege, Rajeev R. Raje. [doi]
- Double Helix and RAVEN: A System for Cyber Fault Tolerance and RecoveryMichele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest. [doi]
- Bringing Federated Identity to Grid ComputingJeny Teheran, Dave Dykstra, Mine Altunay. [doi]
- Network Modeling for Security AnalyticsBailey Smith, Whitney Caruthers, Dalton Stewart, Peter J. Hawrylak, John Hale. [doi]
- Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access StructureMustafa Atici. [doi]
- Scalable Attack Graph GenerationKyle Cook, Thomas Shaw, Peter J. Hawrylak, John Hale. [doi]
- An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware TrojansKyle J. Temkin, Douglas H. Summerville. [doi]
- Detection of Tunnels in PCAP Data by Random ForestsAnna L. Buczak, Paul A. Hanke, George J. Cancro, Michael K. Toma, Lanier A. Watkins, Jeffrey S. Chavis. [doi]
- Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication AttacksJeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis. [doi]
- Experimentation Support for Cyber Security EvaluationsMichael Atighetchi, Borislava I. Simidchieva, Marco Carvalho, David Last. [doi]
- A SCADA Intrusion Detection Framework that Incorporates Process SemanticsJeyasingam Nivethan, Mauricio Papa. [doi]
- Dynamic Canary Randomization for Improved Software SecurityWilliam H. Hawkins, Jason D. Hiser, Jack W. Davidson. [doi]
- Classification of Insider Threat Detection TechniquesAmeya Sanzgiri, Dipankar Dasgupta. [doi]
- Practical implications and requirements of diversifying interpreted languagesJoni Uitto, Sampsa Rauti, Ville Leppänen. [doi]
- GraphPrints: Towards a Graph Analytic Method for Network Anomaly DetectionChristopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall. [doi]
- Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity SimulationRayford B. Vaughn Jr., Tommy Morris. [doi]
- HackAttack: Game-Theoretic Analysis of Realistic Cyber ConflictsErik M. Ferragut, Andrew C. Brady, Ethan J. Brady, Jacob M. Ferragut, Nathan M. Ferragut, Max C. Wildgruber. [doi]
- PUF designed with Resistive RAM and Ternary StatesBertrand Cambou, Marius Orlowski. 1 [doi]
- Trusted Information Exchange Using Trusted Network ProcessorsScot Tucker. 3 [doi]
- Anti-Censorship Framework using Mobile IPv6 based Moving Target DefenseVahid Heydari, Sun-il Kim, Seong-Moo Yoo. 7 [doi]
- The Application of Moving Target Defense to Field Programmable Gate ArraysJohn Dombrowski, Todd R. Andel, Jeffrey Todd McDonald. 20 [doi]
- QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable FunctionS. Dinesh Kumar, Himanshu Thapliyal. 24 [doi]