The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SafeConfig@CCS"( http://dblp.L3S.de/Venues/SafeConfig@CCS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/safeconfig

Publication years (Num. hits)
2015 (12) 2016 (10) 2017 (9)
Publication types (Num. hits)
inproceedings(28) proceedings(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 31 publication records. Showing 31 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Alexander Kedrowitsch, Danfeng (Daphne) Yao, Gang Wang 0011, Kirk W. Cameron A First Look: Using Linux Containers for Deceptive Honeypots. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Atighetchi, Fusun Yaman, David Last, Nicholas Paltzer, Meghan Caiazzo, Stephen Raio A Flexible Approach Towards Security Validation. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nicholas J. Multari, Anoop Singhal, Erin Miller (eds.) Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017 Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  BibTeX  RDF
1Swarup Chandra, Vishal M. Karande, Latifur R. Khan Secure IoT Stream Data Management and Analytics with Intel SGX. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  BibTeX  RDF
1Weiyu Wang, Quanyan Zhu On the Detection of Adversarial Attacks against Deep Neural Networks. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Massey Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  BibTeX  RDF
1Amirreza Niakanlahiji, Mir Mehedi A. Pritom, Bei-tseng Chu, Ehab Al-Shaer Predicting Zero-day Malicious IP Addresses. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mahran Al-Zyoud, Laurie A. Williams, Jeffrey C. Carver Step One Towards Science of Security. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luca Allodi, Sandro Etalle Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Trent Jaeger Configuring Software and Systems for Defense-in-Depth. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tobias Fiebig, Anja Feldmann, Matthias Petschick A One-Year Perspective on Exposed In-memory Key-Value Stores. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stefan Marksteiner, Harald Lernbeiß, Bernhard Jandl-Scherf An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kevin Benton, L. Jean Camp Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico AHEAD: A New Architecture for Active Defense. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Emilie Purvine, John R. Johnson, Chaomei Lo A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammed Noraden Alsaleh, Ehab Al-Shaer Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicholas J. Multari, Anoop Singhal, David O. Manz, Robert Cowles, Jorge Cuéllar, Christopher S. Oehmen, Gregory E. Shannon SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian? Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicholas J. Multari, Anoop Singhal, David O. Manz (eds.) Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October 24, 2016 Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1George Sharkov From Cybersecurity to Collaborative Resiliency. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Simone Mutti, Enrico Bacis, Stefano Paraboschi Policy Specialization to Support Domain Isolation. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sutanay Choudhury, Luke Rodriguez, Darren S. Curtis, Kiri Oler, Peter Nordquist, Pin-Yu Chen, Indrajit Ray Action Recommendation for Cyber Resilience. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Caroline A. Odell, Matthew R. McNiece, Sarah K. Gage, Howard Donald Gage, Errin W. Fulp Using Probability Densities to Evolve more Secure Software Configurations. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christopher S. Oehmen, Thomas E. Carroll, Patrick C. Paulson, Daniel M. Best, Christine F. Noonan, Seth R. Thompson, Jeffrey L. Jensen, Glenn A. Fink, Elena S. Peterson Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christopher S. Oehmen, Ehab Al-Shaer, Mohammad Ashiqur Rahman Automated Decision Making for Active Cyber Defense: Panel Discussion. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yasir Imtiaz Khan, Ehab Al-Shaer, Usman Rauf Cyber Resilience-by-Construction: Modeling, Measuring & Verifying. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Malik Shahzad Kaleem Awan, Pete Burnap, Omer F. Rana Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaoyan Sun 0003, Anoop Singhal, Peng Liu 0005 Who Touched My Mission: Towards Probabilistic Mission Impact Assessment. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman (eds.) Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015 Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Santosh Kumar Majhi, Padmalochan Bera A Security Enforcement Framework for Virtual Machine Migration Auction. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrzej Kamisinski, Carol J. Fung FlowMon: Detecting Malicious Switches in Software-Defined Networks. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wende Peters Integrated Adaptive Cyber Defense: Integration Spiral Results. Search on Bibsonomy SafeConfig@CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #31 of 31 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license