Abstract is missing.
- Abstract runtime structure for reasoning about security: posterMarwan Abi-Antoun, Ebrahim Khalaj, Radu Vanciu, Ahmad Moghimi. 1-3 [doi]
- Efficient solving of string constraints for security analysisClark W. Barrett, Cesare Tinelli, Morgan Deters, Tianyi Liang, Andrew Reynolds, Nestan Tsiskaridze. 4-6 [doi]
- Intrusion detection in enterprise systems by combining and clustering diverse monitor dataAtul Bohara, Uttam Thakore, William H. Sanders. 7-16 [doi]
- Security is about control: insights from cyberneticsAntonio Roque, Kevin B. Bush, Christopher Degni. 17-24 [doi]
- Characterizing cybersecurity jobs: applying the cyber aptitude and talent assessment frameworkSusan G. Campbell, Lelyn D. Saner, Michael F. Bunting. 25-27 [doi]
- A framework for generation, replay, and analysis of real-world attack variantsPhuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 28-37 [doi]
- Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedingsJeffrey C. Carver, Morgan Burcham, Sedef Akinli Koçak, Ayse Bener, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, Laurie Williams. 38-51 [doi]
- Systematic analysis of qualitative data in securityHanan Hibshi. 52 [doi]
- Controller synthesis for linear dynamical systems with adversariesZhenqi Huang, Yu Wang, Sayan Mitra, Geir E. Dullerud. 53-62 [doi]
- Expressing and reasoning about conflicting norms in cybersecurity: posterJiaming Jiang, Nirav Ajmeri, Rada Chirkova, Jon Doyle, Munindar P. Singh. 63-64 [doi]
- Toward a normative approach for forensicabilityÖzgür Kafali, Munindar P. Singh, Laurie Williams. 65-67 [doi]
- Modules in wyvern: advanced control over security and privacyDarya Kurilova, Alex Potanin, Jonathan Aldrich. 68 [doi]
- A model-based approach to anomaly detection in software architecturesHemank Lamba, Thomas J. Glazier, Bradley R. Schmerl, Javier Cámara, David Garlan, Jürgen Pfeffer. 69-71 [doi]
- Optimal thresholds for intrusion detection systemsAron Laszka, Waseem Abbas, S. Shankar Sastry, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos. 72-81 [doi]
- Safety-critical cyber-physical attacks: analysis, detection, and mitigationHui Lin, Homa Alemzadeh, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 82-89 [doi]
- Decentralization and security in dynamic traffic light controlJian Lou, Yevgeniy Vorobeychik. 90-92 [doi]
- Visualizing the variational callgraph of the Linux kernel: an approach for reasoning about dependencies [poster]Momin M. Malik, Jürgen Pfeffer, Gabriel Ferreira, Christian Kästner. 93-94 [doi]
- Differences in trust between human and automated decision aidsCarl J. Pearson, Allaire K. Welk, William A. Boettcher, Roger C. Mayer, Sean Streck, Joseph M. Simons-Rudolph, Christopher B. Mayhorn. 95-98 [doi]
- Software and attack centric integrated threat modeling for quantitative risk assessmentBradley Potteiger, Gonçalo Martins, Xenofon D. Koutsoukos. 99-108 [doi]
- Security practices in DevOpsAkond Ashfaque Ur Rahman, Laurie Williams. 109-111 [doi]
- Operation-level traffic analyzer framework for smart gridWenyu Ren, Klara Nahrstedt, Tim Yardley. 112-114 [doi]
- Raindroid: a system for run-time mitigation of Android intent vulnerabilities [poster]Bradley R. Schmerl, Jeffrey Gennari, Javier Cámara, David Garlan. 115-117 [doi]
- Modeling, analyzing, and consistency checking privacy requirements using eddyDaniel Smullen, Travis D. Breaux. 118-120 [doi]
- Risk-based attack surface approximation: posterChristopher Theisen, Laurie Williams. 121-123 [doi]
- Text analytics for security: tutorialTao Xie, William Enck. 124-125 [doi]
- The persuasive phish: examining the social psychological principles hidden in phishing emailsOlga Zielinska, Allaire K. Welk, Christopher B. Mayhorn, Emerson R. Murphy-Hill. 126 [doi]