Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kun Sun 0001, Sushil Jajodia |
Protecting Enterprise Networks through Attack Surface Expansion. |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Noraden Alsaleh, Ehab Al-Shaer |
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems. |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Tate, T. Charles Clancy |
Secure and Tamper Proof Code Management. |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lujo Bauer |
Human Factors, Defaults, and Automation: Challenges and Opporunities. |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Krishna Kant 0001 (eds.) |
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014 |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carl A. Gunter |
Detecting Roles and Anomalies in Hospital Access Audit Logs. |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yasuyuki Tanaka, Atsuhiro Goto |
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network. |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fida Gillani, Ehab Al-Shaer |
Improving Efficiency of Spam Detection using Economic Model. |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ping Chen, Nick Nikiforakis, Lieven Desmet, Christophe Huygens |
Security Analysis of the Chinese Web: How well is it protected? |
SafeConfig |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie (eds.) |
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA] |
SafeConfig |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Noraden Alsaleh, Ehab Al-Shaer, Adel El-Atawy |
Towards a Unified Modeling and Verification of Network and System Security Configurations. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto |
Discovery of Unexpected Services and Communication Paths in Networked Systems. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ashiqur Rahman, Ehab Al-Shaer |
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shankaranarayanan Puzhavakath Narayanan, Seungjoon Lee, Subhabrata Sen |
GCNav: Generic Configuration Navigation System. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto |
Tracing Advanced Persistent Threats in Networked Systems. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hayawardh Vijayakumar, Trent Jaeger |
The Right Files at the Right Time. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor |
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq |
Risk Based Access Control Using Classification. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mingyi Zhao, Peng Liu 0005 |
Modeling and Checking the Security of DIFC System Configurations. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Meixing Le, Krishna Kant 0001, Sushil Jajodia |
Rule Configuration Checking in Secure Cooperative Data Access. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael R. Clement, Dennis M. Volpano |
Programmable Diagnostic Network Measurement with Localization and Traffic Observation. |
SafeConfig |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanjai Narain, Sharad Malik, Ehab Al-Shaer |
Towards Eliminating Configuration Errors in Cyber Infrastructure. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley, William M. Fitzgerald, Wayne Mac Adams |
Federated Autonomic Network Access Control. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fida Gillani, Umar Kalim, Noman Latif, Syed Ali Khayam |
Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Mohammed Noraden Alsaleh |
ConfigChecker: A tool for comprehensive security configuration analytics. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ashiqur Rahman, Ehab Al-Shaer |
AMIAnalyzer: Security analysis of AMI configurations. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun |
A Generic Data Flow Security Model. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | William M. Fitzgerald, Simon N. Foley |
Reasoning about the Security Configuration of SAN Switch Fabrics. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xin Sun 0002, Jinliang Wei, Sanjay G. Rao, Geoffrey G. Xie |
A software toolkit for visualizing enterprise routing design. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Noraden Alsaleh, Ehab Al-Shaer |
SCAP Based Configuration Analytics for Comprehensive Compliance Checking. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rick Kuhn |
Vulnerability Hierarchies in Access Control Configurations. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eugen Leontie, Gedare Bloom, Rahul Simha |
Automation for Creating and Configuring Security Manifests for Hardware Containers. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Al-Haj, Ehab Al-Shaer |
Measuring Firewall Security. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam, Shujun Li |
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Kant 0001, Meixing Le, Sushil Jajodia |
Security Considerations in Data Center Configuration Management. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ludi Akue, Emmanuel Lavinal, Michelle Sibilla |
A Dynamic Configuration Validation Language. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Said Marouf, Mohamed Shehab |
SEGrapher: Visualization-based SELinux Policy Analysis. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael B. Crouse, Errin W. Fulp |
A moving target environment for computer configurations using Genetic Algorithms. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Al-Haj, Ehab Al-Shaer |
CloudChecker: An imperative framework for cloud configuration management. |
SafeConfig |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian M. Molloy, Jorge Lobo 0001, Seraphin B. Calo |
Towards an integrated approach to role engineering. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bart Van Brabant, Thomas Delaet, Wouter Joosen |
Authorizing and directing configuration updates in contemporary it infrastructures. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh 0001 |
Generating policy based security implementation in enterprise network: a formal framework. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Divya Muthukumaran, Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger |
Cut me some security. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael Atighetchi, Jonathan Webb, Partha P. Pal, Joseph P. Loyall, Azer Bestavros, Michael J. Mayhew |
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Saeed Al-Haj |
FlowChecker: configuration analysis and verification of federated openflow infrastructures. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Palanivel A. Kodeswaran, Anupam Joshi, Timothy W. Finin, Filip Perich |
A declarative approach for secure and robust routing. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni |
FAME: a firewall anomaly management environment. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sunil Kumar Ghai, Prateek Nigam, Ponnurangam Kumaraguru |
Cue: a framework for generating meaningful feedback in XACML. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders |
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, Kellogg S. Booth |
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | William M. Fitzgerald, Simon N. Foley |
Management of heterogeneous security access control configuration using an ontology engineering approach. |
SafeConfig |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tony Sager, Gail-Joon Ahn, Krishna Kant 0001, Heather Richter Lipford (eds.) |
3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010 |
SafeConfig |
2010 |
DBLP BibTeX RDF |
|
1 | Robert Craven, Jorge Lobo 0001, Emil Lupu, Alessandra Russo, Morris Sloman |
Security policy refinement using data integration: a position paper. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Okhravi, Ryan H. Kagin, David M. Nicol |
PolicyGlobe: a framework for integrating network and operating system security policies. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed, Lin Liu 0001 |
Trust based security auto-configuration for smart assisted living environments. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jason Watson, Michael Whitney, Heather Richter Lipford |
Configuring audience-oriented privacy policies. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan, Casey O'Brien |
ePet: when cellular phone learns to recognize its owner. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mirko Montanari, Roy H. Campbell |
Multi-aspect security configuration assessment. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo 0001, Sanjai Narain, Felix Wu (eds.) |
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009 |
SafeConfig |
2009 |
DBLP BibTeX RDF |
|
1 | Alwyn Goodloe, Carl A. Gunter |
Completeness of discovery protocols. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer |
Towards network security policy generation for configuration analysis and testing. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Voellmy |
Proof of an interdomain policy: a load-balancing multi-homed network. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sunil Krothapalli, Xin Sun 0002, Yu-Wei Eric Sung, Suan Aik Yeo, Sanjay G. Rao |
A toolkit for automating and visualizing VLAN configuration. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Anitra Babic, Huijun Xiong, Danfeng Yao, Liviu Iftode |
Building robust authentication systems with activity-based personal questions. |
SafeConfig |
2009 |
DBLP DOI BibTeX RDF |
|