Abstract is missing.
- A formal security analysis of ZigBee (1.0 and 3.0)Li Li, Proyash Podder, Md. Endadul Hoque. [doi]
- Simulation testbed for railway infrastructure security and resilience evaluationHimanshu Neema, Xenofon D. Koutsoukos, Bradley Potteiger, Chee Yee Tang, Keith Stouffer. [doi]
- Exploring hackers assets: topics of interest as indicators of compromiseMohammad A. Al-Ramahi, Izzat Alsmadi, Joshua Davenport. [doi]
- A raspberry Pi sensor network for wildlife conservationAndrew Arnold, Paul Corapi, Michael Nasta, Kevin Wolgast, Thomas A. Babbitt. [doi]
- Ghostbusting: mitigating spectre with intraprocess memory isolationIra Ray Jenkins, Prashant Anantharaman, Rebecca Shapiro, J. Peter Brady, Sergey Bratus, Sean W. Smith. [doi]
- Approaches to ethical hacking: expanding conceptual frameworks for researchLauren Elizabeth Provost, Rebecca Labitt, Danielle Alexandre, Asher Rodriguez. [doi]
- Cyber threat modeling and validation: port scanning and detectionEric D. Vugrin, Jerry Cruz, Christian Reedy, Thomas Tarman, Ali Pinar. [doi]
- The more the merrier: adding hidden measurements to secure industrial control systemsJairo Giraldo, David I. Urbina, Chee Yee Tang, Alvaro A. Cárdenas. [doi]
- Automated influence and the challenge of cognitive securitySarah Rajtmajer, Daniel Susser. [doi]
- How to swap instructions midstream: an embedding algorithm for program steganographyRyan Gabrys, Luis Martinez, Sunny Fugate. [doi]
- An seL4-based architecture for layered attestationGrant Jurgensen, Michael Neises, Perry Alexander. [doi]
- A curated dataset of security defects in scientific software projectsJustin Murphy, Elias T. Brady, Md. Shazibul Islam Shamim, Akond Rahman. [doi]
- Application of the armament cyber assessment framework: a security assessment methodology for military systemsAidan McCarthy, Liam Furey, Keagan Smith, Daniel Hawthorne, Raymond Blaine. [doi]
- An uncertain graph-based approach for cyber-security risk assessmentHoang Hai Nguyen. [doi]
- A preliminary taxonomy of techniques used in software fuzzingRaunak Shakya, Akond Rahman. [doi]
- Can we use software bug reports to identify vulnerability discovery strategies?Farzana Ahamed Bhuiyan, Raunak Shakya, Akond Rahman. [doi]
- RUCKUS: a cybersecurity engine for performing autonomous cyber-physical system vulnerability discovery at scaleBradley Potteiger, Jacob Mills, Daniel Cohen, Paul Velez. [doi]
- Tokens of interaction: psycho-physiological signals, a potential source of evidence of digital incidentsNancy Mogire. [doi]
- Resilient multi-robot target pursuitJiani Li, Waseem Abbas, Mudassir Shabbir, Xenofon D. Koutsoukos. [doi]
- Do configuration management tools make systems more secure?: an empirical research planMd. Rayhanur Rahman, William Enck, Laurie A. Williams. [doi]
- Time series anomaly detection in medical break-the-glassQais Tasali, Nikesh Gyawali, Eugene Y. Vasserman. [doi]
- Accelerating block propagation in PoW blockchain networks with pipelining and chunkingKaushik Ayinala, Baek-Young Choi, Sejun Song. [doi]
- Decentralized backup and recovery of TOTP secretsConor Gilsenan, Noura Alomar, Andrew Huang, Serge Egelman. [doi]
- Exploiting DRAM bank mapping and HugePages for effective denial-of-service attacks on shared cache in multicoreMichael Garrett Bechtel, Heechul Yun. [doi]
- @PAD: adversarial training of power systems against denial-of-service attacksAli Irmak Ozdagli, Carlos A. Barreto, Xenofon D. Koutsoukos. [doi]
- WOLF: automated machine learning workflow management framework for malware detection and other applicationsSohaib Kiani, Sana Awan, Jun Huan, FengJun Li, Bo Luo. [doi]
- Neutralizing manipulation of critical data by enforcing data-instruction dependencyChandra Sharma, Nathan Miller, George T. Amariucai. [doi]
- Toward just-in-time patching for containerized applicationsOlufogorehan Tunde-Onadele, Yuhang Lin, Jingzhu He, Xiaohui Gu. [doi]
- An infrastructure for faithful execution of remote attestation protocolsAdam Petz. [doi]
- Improving architectures for automating network security using specification-based protocolsKhir Henderson, Kevin Kornegay. [doi]