Abstract is missing.
- MARCS: mobile augmented reality for cybersecurityBrendan Mattina, Franki Yeung, Alex Hsu, Dale Savoy, Joseph G. Tront, David Raymond. [doi]
- Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applicationsR. Harkanson, Y. Kim. [doi]
- Alleviating eavesdropping attacks in software-defined networking data planeAhmad Aseeri, Nuttapong Netjinda, Rattikorn Hewett. [doi]
- UTB-SOI based adiabatic computing for low-power and secure IoT devicesHimanshu Thapliyal, T. S. S. Varun, S. Dinesh Kumar. [doi]
- Feedback control for resiliency in face of an attackJagannadh Vempati, Mark Thompson, Ram Dantu. [doi]
- Arav: monitoring a cloud's virtual routersMicah Bushouse, Sanghyun Ahn, Douglas S. Reeves. [doi]
- Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detectionMichael R. Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, Stacy J. Prowell. [doi]
- Parallel methods for evidence and trust based selection and recommendation of software apps from online marketplacesLahiru S. Gallege, Rajeev R. Raje. [doi]
- Selecting the minimal set of preferred responses to counter detected intrusionsMaheedhar Gunasekharan, Samik Basu, Ganesh Ram Santhanam. [doi]
- Automatic generation of network element software (AGNES): short paperChristopher A. Rouff, M. Douglas Williams, Qinqing Zhang, Daniel J. Bennett, Raymond C. McDowell, Anthony R. Nowicki, J. Aaron Pendergrass, Daniel R. Anderson, Robert Douglass, Bradley T. Dufresne, Jonathan T. Pham. [doi]
- Situational awareness of network system roles (SANSR)Kelly M. T. Huffer, Joel W. Reed. [doi]
- Private matching and set intersection computation in multi-agent and industrial control systemsAmar Rasheed, A. Kenneth, Rabi N. Mahapatra, Deepak Puthal. [doi]
- Introducing priority into hybrid attack graphsWill Nichols, Peter J. Hawrylak, J. Hale, M. Papa. [doi]
- Using sequential pattern mining for common event format (CEF) cyber dataAnna L. Buczak, Daniel S. Berman, Sean W. Yen, Lanier A. Watkins, Lien T. Duong, Jeffrey S. Chavis. [doi]
- Predicting cyber attacks with bayesian networks using unconventional signalsAhmet Okutan, Shanchieh Jay Yang, Katie McConky. [doi]
- Multi-asymmetric cryptographic RSA schemeAhmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, Ye Zhu. [doi]
- Time series forecasting of cyber attack intensityGordon Werner, Shanchieh Jay Yang, Katie McConky. [doi]
- Simulation and analysis framework for cyber-physical systemsZachary Hill, Samuel Chen, Donald Wall, Mauricio Papa, John Hale, Peter J. Hawrylak. [doi]