Abstract is missing.
- Integrated Adaptive Cyber Defense: Integration Spiral ResultsWende Peters. 1 [doi]
- Action Recommendation for Cyber ResilienceSutanay Choudhury, Luke Rodriguez, Darren Curtis, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray. 3-8 [doi]
- Cyber Resilience-by-Construction: Modeling, Measuring & VerifyingYasir Imtiaz Khan, Ehab Al-Shaer, Usman Rauf. 9-14 [doi]
- Estimating Risk Boundaries for Persistent and Stealthy Cyber-AttacksMalik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana. 15-20 [doi]
- Who Touched My Mission: Towards Probabilistic Mission Impact AssessmentXiaoyan Sun, Anoop Singhal, Peng Liu. 21-26 [doi]
- Using Probability Densities to Evolve more Secure Software ConfigurationsCaroline A. Odell, Matthew R. McNiece, Sarah K. Gage, Howard Donald Gage, Errin W. Fulp. 27-32 [doi]
- Policy Specialization to Support Domain IsolationSimone Mutti, Enrico Bacis, Stefano Paraboschi. 33-38 [doi]
- FlowMon: Detecting Malicious Switches in Software-Defined NetworksAndrzej Kamisinski, Carol Fung. 39-45 [doi]
- A Security Enforcement Framework for Virtual Machine Migration AuctionSantosh Kumar Majhi, Padmalochan Bera. 47-53 [doi]
- Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost MeasuresChristopher S. Oehmen, Thomas E. Carroll, Patrick C. Paulson, Daniel M. Best, Christine F. Noonan, Seth R. Thompson, Jeffrey L. Jensen, Glenn A. Fink, Elena S. Peterson. 55-58 [doi]
- Automated Decision Making for Active Cyber Defense: Panel DiscussionChristopher S. Oehmen, Ehab Al-Shaer, Mohammad Ashiqur Rahman. 59 [doi]