Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Richard R. Brooks, Oluwakemi Hambolu, Paul Marusich, Yu Fu 0005, Saiprasad Balachandran |
Creating a tailored trustworthy space for democracy advocates using hostile host.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Emilie Hogan, John R. Johnson, Mahantesh Halappanavar |
Graph coarsening for path finding in cybersecurity graphs.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rui Xie, Rose F. Gamble |
An architecture for cross-cloud auditing.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ike Patterson, James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, David Fugate |
Optimizing investments in cyber-security for critical infrastructure.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Janusz Zalewski, Steven Drager 0001, William McKeever, Andrew J. Kornecki |
Threat modeling for security assessment in cyberphysical systems.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dimitrios Mermigas, Constantinos Patsakis, Sotirios Pirounias |
Quantification of information systems security with stochastic calculus.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ganesh Ram Santhanam, Zachary J. Oster, Samik Basu 0001 |
Identifying a preferred countermeasure strategy for attack graphs.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Akella, Bruce M. McMillin |
Modeling and verification of security properties for critical infrastructure protection.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, Darren Highfill |
Using simulation to engineer cybersecurity requirements.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ilker Özçelik, Richard R. Brooks |
Operational system testing for designed in security.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Serageldin, Axel W. Krings, Ahmed Abdel-Rahim |
A survivable critical infrastructure control application.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Butler 0003, Steven Reed, Peter J. Hawrylak, John Hale |
Implementing graceful RFID privilege reduction.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Avinash R. Desai, Michael S. Hsiao, Chao Wang 0001, Leyla Nazhandali, T. Simin Hall |
Interlocking obfuscation for anti-tamper hardware.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Travis L. Bauer, Richard Colbaugh, Kristin Glass, David Schnizlein |
Use of transfer entropy to infer relationships from behavior.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lee M. Hively, Jeffrey Todd McDonald |
Theorem-based, data-driven, cyber event detection.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sean Crosby, Marco M. Carvalho, Dan Kidwell |
A layered approach to understanding network dependencies on moving target defense mechanisms.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Duren, Hal Aldridge, Robert K. Abercrombie, Frederick T. Sheldon |
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lahiru S. Gallege, Dimuthu Gamage, James H. Hill, Rajeev R. Raje |
Trust contract of a service and its role in service selection for distributed software systems.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lu Yu 0001, Richard R. Brooks |
Applying POMDP to moving target optimization.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cindy Finke, Jonathan Butts, Robert F. Mills |
ADS-B encryption: confidentiality in the friendly skies.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Schwab, Li Yang 0001 |
Entity authentication in a mobile-cloud environment.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christopher S. Oehmen, Elena S. Peterson, Jeremy Teuton |
Evolutionary drift models for moving target defense.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Justin M. Beaver, Christopher T. Symons, Robert E. Gillen |
A learning system for discriminating variants of malicious network traffic.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili 0001 |
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA).  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson 0002, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd, Ron Olsberg, Lyndon Pierson, Owen Redwood |
Fireaxe: the DHS secure design competition pilot.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rayford B. Vaughn, Thomas H. Morris, Elena Sitnikova |
Development & expansion of an industrial control system security laboratory and an international research collaboration.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Katherine C. Cameron, Richard R. Brooks, Juan Deng |
Cost-effective quality assurance of wireless network security.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Lin 0005, Adam J. Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Neal Dawes, Bryan Prosser, Errin W. Fulp, A. David McKinnon |
Using mobile agents and overlay networks to secure electrical networks.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Read Sprabery, Thomas H. Morris, Shengyi Pan, Uttam Adhikari, Vahid Madani |
Protocol mutation intrusion detection for synchrophasor communications.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zach Harbort, Conor Fellin |
Gesture-oriented data sharing.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Goodfellow, Robert Braden, Terry Benzel, David E. Bakken |
First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Maggie X. Cheng, Mariesa L. Crow, Robert F. Erbacher |
Vulnerability analysis of a smart grid with monitoring and control system.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charles N. Payne Jr., Jason Sonnek, Steven A. Harp |
XEBHRA: a virtualized platform for cross domain information sharing.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher |
Visualizing graph features for fast port scan detection.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco M. Carvalho, Thomas C. Eskridge, Larry Bunch, Jeffrey M. Bradshaw, Adam Dalton 0001, Paul J. Feltovich, James Lott, Dan Kidwell |
A human-agent teamwork command and control framework for moving target defense (MTC2).  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Duren, John Walsh, Hal Aldridge, Meng-Day (Mandel) Yu |
Resilient device authentication system (RDAS) through SIOMETRICS.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frederick T. Sheldon, Annarita Giani, Axel W. Krings, Robert K. Abercrombie (eds.) |
Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013  |
CSIIRW  |
2013 |
DBLP BibTeX RDF |
|
1 | Hasan Cam, Pierre Mouallem |
Mission-aware time-dependent cyber asset criticality and resilience.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Reese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront |
Using transport layer multihoming to enhance network layer moving target defenses.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Mohd. Hasan Ali, Paul Mixon |
A prediction model for anomalies in smart grid with sensor network.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qian Chen 0019, Sherif Abdelwahed, Weston Monceaux |
Towards automatic security management: a model-based approach.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jarilyn M. Hernández, Line Pouchard, Jeffrey Todd McDonald, Stacy J. Prowell |
Developing a power measurement framework for cyber defense.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Annarita Giani, Russell Bent |
Addressing smart grid cyber security.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum |
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason J. Haas, J. D. Doak, Jason R. Hamlet |
Machine-oriented biometrics and cocooning for dynamic network defense.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lianyu Zhao, Richard R. Brooks |
Tailoring trusted semantic information.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rattikorn Hewett, Phongphun Kijsanayothin |
Securing system controllers in critical infrastructures.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Hahn, Manimaran Govindarasu |
Model-based intrustion detection for the smart grid (MINDS).  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Justin Yackoski, Jason H. Li, Scott A. DeLoach, Xinming Ou |
Mission-oriented moving target defense based on cryptographically strong network dynamics.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason M. Carter |
Locating executable fragments with Concordia, a scalable, semantics-based architecture.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chen Lu, Richard R. Brooks |
Timing analysis in P2P botnet traffic using probabilistic context-free grammars.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Richard R. Brooks, Benafsh Husain, SeokBae Yun, Juan Deng |
Security and performance evaluation of security protocols.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Erik M. Ferragut, Jason A. Laska, Bogdan D. Czejdo, Alexander Melin |
Addressing the challenges of anomaly detection for cyber physical energy grid systems.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dennis K. Holstein |
On the use of the Clark-Wilson security model to protect industrial automation control systems.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Segall, Michael J. Mayhew, Michael Atighetchi, Rachel Greenstadt |
Assessing trustworthiness in collaborative environments.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Lewis |
Characterizing risk.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shengyi Pan, Thomas H. Morris, Uttam Adhikari, Vahid Madani |
Causal event graphs cyber-physical system intrusion detection system.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak |
Estimating link availability and timing delays in ethernet-based networks.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frederick T. Sheldon, Daniel Fetzer, David Manz, Jingshan Huang, Stuart Goose, Thomas H. Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei 0009 |
Intrinsically resilient energy control systems.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Howes, James Solderitsch, Ignatius Chen, Jonté Craighead |
Enabling trustworthy spaces via orchestrated analytical security.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes |
Relationships between information security metrics: an empirical study.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Victor Balogun, Axel W. Krings |
On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo |
Moving target defense (MTD) in an adaptive execution environment.  |
CSIIRW  |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arun Velagapalli, Mahalingam Ramkumar |
Minimizing the TCB for securing SCADA systems.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thoshitha T. Gamage, Ravi Akella, Thomas P. Roth, Bruce M. McMillin |
Information flow security in cyber-physical systems.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rich Nolan, Peter P. Chen |
Supporting velocity of investigation with behavior analysis of malware.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Curtis Taylor, Craug Shue |
Implementing a "moving target" system to protect servers.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sunirmal Khatua, Nandini Mukherjee, Nabendu Chaki |
A new agent based security framework for collaborative cloud environment.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Frederick T. Sheldon, Robert K. Abercrombie, Axel W. Krings (eds.) |
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011  |
CSIIRW  |
2011 |
DBLP BibTeX RDF |
|
1 | Debra Frincke |
National Laboratory panel.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas W. Edgar, David O. Manz, Thomas E. Carroll |
Towards an experimental testbed facility for cyber-physical security research.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Butler 0003, Peter J. Hawrylak, John Hale |
Graceful privilege reduction in RFID security.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert F. Erbacher, Steve E. Hutchinson, Joshua Edwards |
Web traffic profiling and characterization.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiayin Li, Daigu Zhang, Meikang Qiu, Yongxin Zhu 0001, Ju Shen |
Security protection on FPGA against differential power analysis attacks.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lucille McMinn, Jonathan Butts, David Robinson, Billy Rios |
Exploiting the critical infrastructure via nontraditional system inputs.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Janusz Zalewski, Steven Drager 0001, William McKeever, Andrew J. Kornecki |
Can we measure security and how?  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Md. Moshiur Rahman |
A framework for estimating security coverage for cloud service insurance.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael A. Brown |
Plenary Keynote Speaker: Rear Admiral Michael A. Brown, DoD/DHS.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Kirsch, Stuart Goose, Yair Amir, Paul M. Skare |
Toward survivable SCADA.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | William L. Sousan, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney |
Using anomalous event patterns in control systems for tamper detection.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas H. Morris, Shengyi Pan, Jeremy Lewis, Jonathan Moorhead, Nicolas H. Younan, Roger L. King, Mark Freund, Vahid Madani |
Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bereket Mathewos Hambebo, Marco M. Carvalho, Fredric M. Ham |
Network traffic classification using a parallel neural network classifier architecture.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Azab, Mohamed Eltoweissy |
Towards a cooperative autonomous resilient defense platform for cyber-physical systems.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ilker Özçelik, Richard R. Brooks |
Security experimentation using operational systems.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marco M. Carvalho, Carlos Perez |
An evolutionary multi-agent approach to anomaly detection and cyber defense.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wade Gasior, Li Yang 0001 |
Network covert channels on the Android platform.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jason Carter |
An architecture for Concordia.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhanshan (Sam) Ma, Hongju (Daisy) Chen, Jiajin Zhang, Axel W. Krings, Frederick T. Sheldon |
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Bilar, James Solderitsch, Elvis Hovor |
Monitoring smart grid operations and maintaining mission assurance through adaptive computer network defenses.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mark R. Heckman, Roger R. Schell, Edwards E. Reed |
Using a high assurance TCB for infrastructure security.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gregory Neal Akers |
Plenary Speaker: Gregory Neal Akers, CISCO.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jinpeng Wei, Calton Pu, Keke Chen |
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John Bumgarner |
Plenary Speaker: John Bumgarner, U.S. Cyber Consequences Unit.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Luanne Burns, Christina Selby, Thomas A. Longstaff |
DART3: DHS assistant for R&D tracking and technology transfer.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Osborn |
Transforming NNSA information, collaboration and security.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Calver, Michael R. Grimaila, Jeffrey W. Humphries |
An empirical analysis of the cascade error reconciliation protocol for quantum key distribution.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin W. Hamlen, Peng Liu 0005, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu 0001 |
Identity management for cloud computing: developments and directions.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carol Hawk |
Key questions for the day on cryptographic key management.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Mohd. Hassan Ali, Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon, Marco Carvalho 0001 |
Secure VM for monitoring industrial process controllers.  |
CSIIRW  |
2011 |
DBLP DOI BibTeX RDF |
|