Abstract is missing.
- No Plan Survives Contact: Experience with Cybercrime MeasurementChris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Y. Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker. [doi]
- Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag ExerciseJoseph Werther, Michael Zhivich, Tim Leek, Nickolai Zeldovich. [doi]
- Active Learning with the CyberCIEGE Video GameMichael F. Thompson, Cynthia E. Irvine. [doi]
- Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP TestbedPeter Peterson, Digvijay Singh, William J. Kaiser, Peter L. Reiher. [doi]
- Challenges in Experimenting with Botnet Detection SystemsAdam J. Aviv, Andreas Haeberlen. [doi]
- Salting Public Traces with Attack Traffic to Test Flow ClassifiersZ. Berkay Celik, Jayaram Raghuram, George Kesidis, David J. Miller 0001. [doi]
- ExperimenTor: A Testbed for Safe and Realistic Tor ExperimentationKevin S. Bauer, Micah Sherr, Dirk Grunwald. [doi]
- Automating Network Monitoring on Experimental TestbedsMichael Golightly, Jack Brassil. [doi]
- Beyond Simulation: Large-Scale Distributed Emulation of P2P ProtocolsNathan S. Evans, Christian Grothoff. [doi]
- Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for MalwareTudor Dumitras, Iulian Neamtiu. [doi]
- Should Security Researchers Experiment More and Draw More Inferences?Kevin S. Killourhy, Roy A. Maxion. [doi]
- On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons LearnedMalek Ben Salem, Salvatore J. Stolfo. [doi]