Abstract is missing.
- Robustness of deep autoencoder in intrusion detection under adversarial contaminationPooria Madani, Natalija Vlajic. [doi]
- Exploring the raspberry Pi for data summarization in wireless sensor networks: posterAndrés Alejos, Matthew Ball, Connor Eckert, Michael Ma, Hayden Ward, Peter Hanlon, Suzanne J. Matthews. [doi]
- Challenges and approaches of performing canonical action research in software security: research paperDaniela S. Cruzes, Martin Gilje Jaatun, Tosin Daniel Oyetoyan. [doi]
- Cryptography in a post-quantum world: posterKatharine Ahrens. [doi]
- A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTERSarah Elder, Anna Mattapallil, Laurie Williams. [doi]
- Combinatorial security testing courseDimitris E. Simos, Rick Kuhn, Yu Lei, Raghu Kacker. [doi]
- Formal verification of the W3C web authentication protocolIness Ben Guirat, Harry Halpin. [doi]
- Integrating historical and real-time anomaly detection to create a more resilient smart grid architecture: posterSpencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Antoine Davis, Madison Stark, Caleb Clay, Jason Hussey, Nicholas Barry, Aaron St. Leger, Suzanne J. Matthews. [doi]
- Hourglass-shaped architecture for model-based development of safe and secure cyber-physical systems: posterMuhammad Umer Tariq, Marilyn Wolf. [doi]
- Quantifying the security effectiveness of firewalls and DMZsHuashan Chen, Jin-Hee Cho, Shouhuai Xu. [doi]
- HACSAW: a trusted framework for cyber situational awarenessLeslie Leonard, William Glodek. [doi]
- An expert-based bibliometric for a science of security: posterLindsey McGowen, Angela Stoica. [doi]
- SecureMR: secure mapreduce computation using homomorphic encryption and program partitioningYao Dong, Ana Milanova, Julian Dolby. [doi]
- Using object capabilities and effects to build an authority-safe module system: posterDarya Melicher, Yangqingwei Shi, Valerie Zhao, Alex Potanin, Jonathan Aldrich. [doi]
- Detecting monitor compromise using evidential reasoning: posterUttam Thakore, Ahmed M. Fawaz, William H. Sanders. [doi]
- How bad is it, really? an analysis of severity scores for vulnerabilities: posterChristopher Theisen, Laurie Williams. [doi]
- Ethics, values, and personal agents: posterNirav Ajmeri, Hui Guo, Pradeep K. Murukannaiah, Munindar P. Singh. [doi]
- What proportion of vulnerabilities can be attributed to ordinary coding errors?: posterRick Kuhn, Mohammad S. Raunak, Raghu Kacker. [doi]
- Investigating tensorflow for airport facial identification: posterNikolay Shopov, Mingu Jeong, Evin Rude, Brennan Neseralla, Scott Hutchison, Alexander Mentis, Suzanne J. Matthews. [doi]
- Application of capability-based cyber risk assessment methodology to a space systemMartha McNeil, Thomas Llansó, Dallas Pearson. [doi]
- Understanding challenges to adoption of the Microsoft elevation of privilege gameInger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela Cruzes. [doi]
- Toward extraction of security requirements from text: posterHui Guo, Özgür Kafali, Anne-Liz Jeukeng, Laurie Williams, Munindar P. Singh. [doi]
- A ransomware research framework: posterDaniel G. Wolf, Donald L. Goff. [doi]
- Integrated instruction set randomization and control reconfiguration for securing cyber-physical systemsBradley Potteiger, Zhenkai Zhang, Xenofon D. Koutsoukos. [doi]
- Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugsIra Ray Jenkins, Sergey Bratus, Sean W. Smith, Maxwell Koo. [doi]
- Quantitative underpinnings of secure, graceful degradation: posterRyan Wagner, David Garlan, Matt Fredrikson. [doi]
- Quantifying the security effectiveness of network diversity: posterHuashan Chen, Jin-Hee Cho, Shouhuai Xu. [doi]
- Indirect cyber attacks by perturbation of environment control: a data driven attack model: posterKey-whan Chung, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. [doi]
- Understanding privacy concerns of whatsapp users in India: posterJayati Dev, Sanchari Das, L. Jean Camp. [doi]
- Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software deliveryErkang Zheng, Phil Gates-Idem, Matt Lavin. [doi]