The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CISRC"( http://dblp.L3S.de/Venues/CISRC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csiirw

Publication years (Num. hits)
2016 (27) 2017 (19)
Publication types (Num. hits)
inproceedings(44) proceedings(2)
Venues (Conferences, Journals, ...)
CISRC(46)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 46 publication records. Showing 46 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gordon Werner, Shanchieh Jay Yang, Katie McConky Time series forecasting of cyber attack intensity. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Will Nichols, Peter J. Hawrylak, John Hale, Mauricio Papa Introducing priority into hybrid attack graphs. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmet Okutan, Shanchieh Jay Yang, Katie McConky Predicting cyber attacks with bayesian networks using unconventional signals. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zachary Hill, Samuel Chen, Donald Wall, Mauricio Papa, John Hale, Peter J. Hawrylak Simulation and analysis framework for cyber-physical systems. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christopher A. Rouff, M. Douglas Williams, Qinqing Zhang, Daniel J. Bennett, Raymond C. McDowell, Anthony R. Nowicki, J. Aaron Pendergrass, Daniel R. Anderson, Robert Douglass, Bradley T. Dufresne, Jonathan T. Pham Automatic generation of network element software (AGNES): short paper. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anna L. Buczak, Daniel S. Berman, Sean W. Yen, Lanier A. Watkins, Lien T. Duong, Jeffrey S. Chavis Using sequential pattern mining for common event format (CEF) cyber data. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kelly M. T. Huffer, Joel W. Reed Situational awareness of network system roles (SANSR). Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Roy Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, Stacy J. Prowell Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amar A. Rasheed, A. Kenneth, Rabi N. Mahapatra, Deepak Puthal Private matching and set intersection computation in multi-agent and industrial control systems. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Micah Bushouse, Sanghyun Ahn, Douglas S. Reeves Arav: monitoring a cloud's virtual routers. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Russell Harkanson, Yoohwan Kim Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Justin M. Beaver, Robert A. Bridges (eds.) Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC 2017, Oak Ridge, TN, USA, April 4 - 6, 2017 Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Himanshu Thapliyal, T. S. S. Varun, S. Dinesh Kumar UTB-SOI based adiabatic computing for low-power and secure IoT devices. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jagannadh Vempati, Mark A. Thompson, Ram Dantu Feedback control for resiliency in face of an attack. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmed O. Aseeri, Nuttapong Netjinda, Rattikorn Hewett Alleviating eavesdropping attacks in software-defined networking data plane. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, Ye Zhu 0001 Multi-asymmetric cryptographic RSA scheme. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Brendan Mattina, Franki Yeung, Alex Hsu, Dale Savoy, Joseph G. Tront, David R. Raymond MARCS: mobile augmented reality for cybersecurity. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lahiru S. Gallege, Rajeev R. Raje Parallel methods for evidence and trust based selection and recommendation of software apps from online marketplaces. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maheedhar Gunasekharan, Samik Basu 0001, Ganesh Ram Santhanam Selecting the minimal set of preferred responses to counter detected intrusions. Search on Bibsonomy CISRC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bailey Smith, Whitney Caruthers, Dalton Stewart, Peter J. Hawrylak, John Hale Network Modeling for Security Analytics. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeny Teheran, Dave Dykstra, Mine Altunay Bringing Federated Identity to Grid Computing. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chris Strasburg, Samik Basu 0001, Johnny S. Wong A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1William H. Hawkins, Jason D. Hiser, Jack W. Davidson Dynamic Canary Randomization for Improved Software Security. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vahid Heydari, Sun-il Kim, Seong-Moo Yoo Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kyle Cook, Thomas Shaw, Peter J. Hawrylak, John Hale Scalable Attack Graph Generation. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anna L. Buczak, Paul A. Hanke, George J. Cancro, Michael K. Toma, Lanier A. Watkins, Jeffrey S. Chavis Detection of Tunnels in PCAP Data by Random Forests. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeyasingam Nivethan, Mauricio Papa A SCADA Intrusion Detection Framework that Incorporates Process Semantics. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leonora Gerlock, Abhishek Parakh Linear Cryptanalysis of Quasigroup Block Cipher. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mustafa Atici Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Atighetchi, Borislava I. Simidchieva, Marco M. Carvalho, David Last Experimentation Support for Cyber Security Evaluations. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Last Forecasting Zero-Day Vulnerabilities. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Reece Johnston, Sun-il Kim, David Coe, Letha H. Etzkorn, Jeffrey H. Kulick, Aleksandar Milenkovic Xen Network Flow Analysis for Intrusion Detection. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Erik M. Ferragut, Andrew C. Brady, Ethan J. Brady, Jacob M. Ferragut, Nathan M. Ferragut, Max C. Wildgruber HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kyle J. Temkin, Douglas H. Summerville An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Scot Tucker Trusted Information Exchange Using Trusted Network Processors. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joni Uitto, Sampsa Rauti, Ville Leppänen Practical implications and requirements of diversifying interpreted languages. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rayford B. Vaughn Jr., Tommy H. Morris Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1S. Dinesh Kumar, Himanshu Thapliyal QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable Function. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ameya Sanzgiri, Dipankar Dasgupta Classification of Insider Threat Detection Techniques. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Dombrowski, Todd R. Andel, Jeffrey Todd McDonald The Application of Moving Target Defense to Field Programmable Gate Arrays. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bertrand Cambou, Marius Orlowski PUF designed with Resistive RAM and Ternary States. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Robert A. Bridges (eds.) Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016 Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  BibTeX  RDF
1Lahiru S. Gallege, Rajeev R. Raje Towards Selecting and Recommending Online Software Services by Evaluating External Attributes. Search on Bibsonomy CISRC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #46 of 46 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license