Abstract is missing.
- Integrated data space randomization and control reconfiguration for securing cyber-physical systemsBradley Potteiger, Zhenkai Zhang, Xenofon D. Koutsoukos. [doi]
- BEEER: distributed record and replay for medical devices in hospital operating roomsAvesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A. Gunter. [doi]
- ThreatZoom: neural network for automated vulnerability mitigationEhsan Aghaei, Ehab Al-Shaer. [doi]
- A new metric to compare anomaly detection algorithms in cyber-physical systemsJairo Giraldo, Alvaro A. Cárdenas. [doi]
- Limitations on observability of effects in cyber-physical systemsSuresh K. Damodaran, Paul D. Rowe. [doi]
- A copland attestation managerAdam Petz, Perry Alexander. [doi]
- Simulation based evaluation of security and resilience in railway infrastructureBradley Potteiger, Hamzah Abdel-Aziz, Himanshu Neema, Xenofon D. Koutsoukos. [doi]
- A bird's eye view of knowledge needs related to penetration testingAkond Rahman, Laurie Williams. [doi]
- Game theory for adaptive defensive cyber deceptionKimberly Ferguson-Walter, Sunny Fugate, Justin Mauger, Maxine Major. [doi]
- Game theory for cyber deception: a tutorialQuanyan Zhu. [doi]
- Toward a reliability measurement framework automated using deep learningJohn Heaps, Xueling Zhang, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu 0001. [doi]
- Design for an educational cyber rangeRyan Brunner, Sang-Keun Oh, Jesse Ramirez, Paul Houck, Nathaniel Stickney, Raymond Blaine. [doi]
- Design and simulation platform for evaluation of grid distribution system and transactive energyHimanshu Neema, Harsh Vardhan, Carlos Barreto, Xenofon D. Koutsoukos. [doi]
- Exploring RNNs for analyzing Zeek HTTP dataDaniel Andrews, Jennifer Behn, Danielle Jaksha, Jinwon Seo, Madeleine Schneider, James Yoon, Suzanne J. Matthews, Rajeev Agrawal, Alexander S. Mentis. [doi]
- A formal verification of mutation-based moving target defenseMuhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer. [doi]
- A synopsis of static analysis alerts on open source softwareNasif Imtiaz, Laurie Williams. [doi]
- Designing a Raspberry Pi sensor network for remote observation of wildlifeBrian H. Curtin, Rachelle H. David, Emmet D. Dunham, Cullen D. Johnson, Nikhil Shyamkumar, Thomas A. Babbitt, Suzanne J. Matthews. [doi]
- Browser fingerprinting using combinatorial sequence testingBernhard Garn, Dimitris E. Simos, Stefan Zauner, Rick Kuhn, Raghu Kacker. [doi]
- Measures and metrics for the enforcement of critical security controls: a case study of boundary defenseMohiuddin Ahmed, Ehab Al-Shaer. [doi]
- Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigationAshutosh Dutta, Ehab Al-Shaer. [doi]
- TRACTION: an infrastructure for trusted alert sharing and collaborative mitigationKey-whan Chung, Phuong Cao, Yuming Wu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers. [doi]
- Situated information flow theorySebastian Benthall. [doi]
- Taming web views in the detection of Android privacy leaksXue-qin, Robert Neuhaus, Diego Gonzales, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu 0001. [doi]
- Load forecasting with adversarial attacks in power systems using DeepForgeXingyu Zhou, Yi Li, Carlos A. Barreto, Péter Völgyesi, Xenofon D. Koutsoukos. [doi]
- CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestrationMd. Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, Mohammed Noraden Alsaleh. [doi]
- Learning APT chains from cyber threat intelligenceGhaith Husari, Ehab Al-Shaer, Bill Chu, Ruhani Faiheem Rahman. [doi]
- Towards an understanding of resilience with complex networksFrancisco Pipa, John Symons. [doi]