Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kun Sun 0001, Sushil Jajodia |
Protecting Enterprise Networks through Attack Surface Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 29-32, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Noraden Alsaleh, Ehab Al-Shaer |
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 25-28, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Tate, T. Charles Clancy |
Secure and Tamper Proof Code Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 19-24, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lujo Bauer |
Human Factors, Defaults, and Automation: Challenges and Opporunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 37, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Krishna Kant 0001 (eds.) |
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![ACM, 978-1-4503-3147-0 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carl A. Gunter |
Detecting Roles and Anomalies in Hospital Access Audit Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 1, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yasuyuki Tanaka, Atsuhiro Goto |
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 33-36, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fida Gillani, Ehab Al-Shaer |
Improving Efficiency of Spam Detection using Economic Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 11-18, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ping Chen, Nick Nikiforakis, Lieven Desmet, Christophe Huygens |
Security Analysis of the Chinese Web: How well is it protected? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 3-9, 2014, ACM, 978-1-4503-3147-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie (eds.) |
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA] ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![Springer, 978-3-319-01432-6 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Noraden Alsaleh, Ehab Al-Shaer, Adel El-Atawy |
Towards a Unified Modeling and Verification of Network and System Security Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 3-19, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto |
Discovery of Unexpected Services and Communication Paths in Networked Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 169-178, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ashiqur Rahman, Ehab Al-Shaer |
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 59-77, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shankaranarayanan Puzhavakath Narayanan, Seungjoon Lee, Subhabrata Sen |
GCNav: Generic Configuration Navigation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 99-117, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto |
Tracing Advanced Persistent Threats in Networked Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 179-187, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hayawardh Vijayakumar, Trent Jaeger |
The Right Files at the Right Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 119-133, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Martín Barrère, Gaetan Hurel, Remi Badonnel, Olivier Festor |
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 41-58, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq |
Risk Based Access Control Using Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 79-95, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mingyi Zhao, Peng Liu 0005 |
Modeling and Checking the Security of DIFC System Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 21-38, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Meixing Le, Krishna Kant 0001, Sushil Jajodia |
Rule Configuration Checking in Secure Cooperative Data Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 135-149, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael R. Clement, Dennis M. Volpano |
Programmable Diagnostic Network Measurement with Localization and Traffic Observation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA], pp. 153-167, 2012, Springer, 978-3-319-01432-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanjai Narain, Sharad Malik, Ehab Al-Shaer |
Towards Eliminating Configuration Errors in Cyber Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley, William M. Fitzgerald, Wayne Mac Adams |
Federated Autonomic Network Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fida Gillani, Umar Kalim, Noman Latif, Syed Ali Khayam |
Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Mohammed Noraden Alsaleh |
ConfigChecker: A tool for comprehensive security configuration analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ashiqur Rahman, Ehab Al-Shaer |
AMIAnalyzer: Security analysis of AMI configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun |
A Generic Data Flow Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | William M. Fitzgerald, Simon N. Foley |
Reasoning about the Security Configuration of SAN Switch Fabrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xin Sun 0002, Jinliang Wei, Sanjay G. Rao, Geoffrey G. Xie |
A software toolkit for visualizing enterprise routing design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Noraden Alsaleh, Ehab Al-Shaer |
SCAP Based Configuration Analytics for Comprehensive Compliance Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rick Kuhn |
Vulnerability Hierarchies in Access Control Configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eugen Leontie, Gedare Bloom, Rahul Simha |
Automation for Creating and Configuring Security Manifests for Hardware Containers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Al-Haj, Ehab Al-Shaer |
Measuring Firewall Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yousra Javed, Maliha Nazir, Muhammad Murtaza Khan, Syed Ali Khayam, Shujun Li |
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Krishna Kant 0001, Meixing Le, Sushil Jajodia |
Security Considerations in Data Center Configuration Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ludi Akue, Emmanuel Lavinal, Michelle Sibilla |
A Dynamic Configuration Validation Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Said Marouf, Mohamed Shehab |
SEGrapher: Visualization-based SELinux Policy Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael B. Crouse, Errin W. Fulp |
A moving target environment for computer configurations using Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Al-Haj, Ehab Al-Shaer |
CloudChecker: An imperative framework for cloud configuration management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011, 2011, IEEE. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chris Giblin, Marcel Graf, Günter Karjoth, Andreas Wespi, Ian M. Molloy, Jorge Lobo 0001, Seraphin B. Calo |
Towards an integrated approach to role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 63-70, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bart Van Brabant, Thomas Delaet, Wouter Joosen |
Authorizing and directing configuration updates in contemporary it infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 79-82, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh 0001 |
Generating policy based security implementation in enterprise network: a formal framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 1-8, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Divya Muthukumaran, Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger |
Cut me some security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 75-78, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michael Atighetchi, Jonathan Webb, Partha P. Pal, Joseph P. Loyall, Azer Bestavros, Michael J. Mayhew |
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 83-88, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Saeed Al-Haj |
FlowChecker: configuration analysis and verification of federated openflow infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 37-44, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Palanivel A. Kodeswaran, Anupam Joshi, Timothy W. Finin, Filip Perich |
A declarative approach for secure and robust routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 45-52, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni |
FAME: a firewall anomaly management environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 17-26, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sunil Kumar Ghai, Prateek Nigam, Ponnurangam Kumaraguru |
Cue: a framework for generating meaningful feedback in XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 9-16, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Saman A. Zonouz, Kaustubh R. Joshi, William H. Sanders |
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 71-74, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fahimeh Raja, Kirstie Hawkey, Pooya Jaferian, Konstantin Beznosov, Kellogg S. Booth |
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 53-62, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | William M. Fitzgerald, Simon N. Foley |
Management of heterogeneous security access control configuration using an ontology engineering approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010, pp. 27-36, 2010, ACM, 978-1-4503-0093-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tony Sager, Gail-Joon Ahn, Krishna Kant 0001, Heather Richter Lipford (eds.) |
3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![ACM, 978-1-4503-0093-3 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Robert Craven, Jorge Lobo 0001, Emil Lupu, Alessandra Russo, Morris Sloman |
Security policy refinement using data integration: a position paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 25-28, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Okhravi, Ryan H. Kagin, David M. Nicol |
PolicyGlobe: a framework for integrating network and operating system security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 53-62, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Md. Endadul Hoque, Farzana Rahman, Sheikh Iqbal Ahamed, Lin Liu 0001 |
Trust based security auto-configuration for smart assisted living environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 7-12, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jason Watson, Michael Whitney, Heather Richter Lipford |
Configuring audience-oriented privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 71-78, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan, Casey O'Brien |
ePet: when cellular phone learns to recognize its owner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 13-18, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mirko Montanari, Roy H. Campbell |
Multi-aspect security configuration assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 1-6, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo 0001, Sanjai Narain, Felix Wu (eds.) |
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![ACM, 978-1-60558-778-3 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Alwyn Goodloe, Carl A. Gunter |
Completeness of discovery protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 29-36, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer |
Towards network security policy generation for configuration analysis and testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 45-52, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Voellmy |
Proof of an interdomain policy: a load-balancing multi-homed network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 37-44, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sunil Krothapalli, Xin Sun 0002, Yu-Wei Eric Sung, Suan Aik Yeo, Sanjay G. Rao |
A toolkit for automating and visualizing VLAN configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 63-70, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Anitra Babic, Huijun Xiong, Danfeng Yao, Liviu Iftode |
Building robust authentication systems with activity-based personal questions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SafeConfig ![In: Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009, pp. 19-24, 2009, ACM, 978-1-60558-778-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|