|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 46 publication records. Showing 46 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Gordon Werner, Shanchieh Jay Yang, Katie McConky |
Time series forecasting of cyber attack intensity. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Will Nichols, Peter J. Hawrylak, John Hale, Mauricio Papa |
Introducing priority into hybrid attack graphs. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahmet Okutan, Shanchieh Jay Yang, Katie McConky |
Predicting cyber attacks with bayesian networks using unconventional signals. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zachary Hill, Samuel Chen, Donald Wall, Mauricio Papa, John Hale, Peter J. Hawrylak |
Simulation and analysis framework for cyber-physical systems. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christopher A. Rouff, M. Douglas Williams, Qinqing Zhang, Daniel J. Bennett, Raymond C. McDowell, Anthony R. Nowicki, J. Aaron Pendergrass, Daniel R. Anderson, Robert Douglass, Bradley T. Dufresne, Jonathan T. Pham |
Automatic generation of network element software (AGNES): short paper. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anna L. Buczak, Daniel S. Berman, Sean W. Yen, Lanier A. Watkins, Lien T. Duong, Jeffrey S. Chavis |
Using sequential pattern mining for common event format (CEF) cyber data. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kelly M. T. Huffer, Joel W. Reed |
Situational awareness of network system roles (SANSR). |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Roy Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, Stacy J. Prowell |
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Amar A. Rasheed, A. Kenneth, Rabi N. Mahapatra, Deepak Puthal |
Private matching and set intersection computation in multi-agent and industrial control systems. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Micah Bushouse, Sanghyun Ahn, Douglas S. Reeves |
Arav: monitoring a cloud's virtual routers. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Russell Harkanson, Yoohwan Kim |
Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Justin M. Beaver, Robert A. Bridges (eds.) |
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC 2017, Oak Ridge, TN, USA, April 4 - 6, 2017 |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Himanshu Thapliyal, T. S. S. Varun, S. Dinesh Kumar |
UTB-SOI based adiabatic computing for low-power and secure IoT devices. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jagannadh Vempati, Mark A. Thompson, Ram Dantu |
Feedback control for resiliency in face of an attack. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed O. Aseeri, Nuttapong Netjinda, Rattikorn Hewett |
Alleviating eavesdropping attacks in software-defined networking data plane. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, Ye Zhu 0001 |
Multi-asymmetric cryptographic RSA scheme. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Brendan Mattina, Franki Yeung, Alex Hsu, Dale Savoy, Joseph G. Tront, David R. Raymond |
MARCS: mobile augmented reality for cybersecurity. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lahiru S. Gallege, Rajeev R. Raje |
Parallel methods for evidence and trust based selection and recommendation of software apps from online marketplaces. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maheedhar Gunasekharan, Samik Basu 0001, Ganesh Ram Santhanam |
Selecting the minimal set of preferred responses to counter detected intrusions. |
CISRC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bailey Smith, Whitney Caruthers, Dalton Stewart, Peter J. Hawrylak, John Hale |
Network Modeling for Security Analytics. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jeny Teheran, Dave Dykstra, Mine Altunay |
Bringing Federated Identity to Grid Computing. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chris Strasburg, Samik Basu 0001, Johnny S. Wong |
A Cross-Domain Comparable Measurement Framework to Quantify Intrusion Detection Effectiveness. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | William H. Hawkins, Jason D. Hiser, Jack W. Davidson |
Dynamic Canary Randomization for Improved Software Security. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vahid Heydari, Sun-il Kim, Seong-Moo Yoo |
Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kyle Cook, Thomas Shaw, Peter J. Hawrylak, John Hale |
Scalable Attack Graph Generation. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Anna L. Buczak, Paul A. Hanke, George J. Cancro, Michael K. Toma, Lanier A. Watkins, Jeffrey S. Chavis |
Detection of Tunnels in PCAP Data by Random Forests. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jeyasingam Nivethan, Mauricio Papa |
A SCADA Intrusion Detection Framework that Incorporates Process Semantics. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leonora Gerlock, Abhishek Parakh |
Linear Cryptanalysis of Quasigroup Block Cipher. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mustafa Atici |
Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Atighetchi, Borislava I. Simidchieva, Marco M. Carvalho, David Last |
Experimentation Support for Cyber Security Evaluations. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christopher R. Harshaw, Robert A. Bridges, Michael D. Iannacone, Joel W. Reed, John R. Goodall |
GraphPrints: Towards a Graph Analytic Method for Network Anomaly Detection. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David Last |
Forecasting Zero-Day Vulnerabilities. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Reece Johnston, Sun-il Kim, David Coe, Letha H. Etzkorn, Jeffrey H. Kulick, Aleksandar Milenkovic |
Xen Network Flow Analysis for Intrusion Detection. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Erik M. Ferragut, Andrew C. Brady, Ethan J. Brady, Jacob M. Ferragut, Nathan M. Ferragut, Max C. Wildgruber |
HackAttack: Game-Theoretic Analysis of Realistic Cyber Conflicts. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kyle J. Temkin, Douglas H. Summerville |
An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Scot Tucker |
Trusted Information Exchange Using Trusted Network Processors. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joni Uitto, Sampsa Rauti, Ville Leppänen |
Practical implications and requirements of diversifying interpreted languages. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rayford B. Vaughn Jr., Tommy H. Morris |
Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | S. Dinesh Kumar, Himanshu Thapliyal |
QUALPUF: A Novel Quasi-Adiabatic Logic based Physical Unclonable Function. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ameya Sanzgiri, Dipankar Dasgupta |
Classification of Insider Threat Detection Techniques. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | John Dombrowski, Todd R. Andel, Jeffrey Todd McDonald |
The Application of Moving Target Defense to Field Programmable Gate Arrays. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L. Frazier, Tiffany M. Frazier, Bruno Dutertre, Ian A. Mason, Natarajan Shankar, Stephanie Forrest |
Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bertrand Cambou, Marius Orlowski |
PUF designed with Resistive RAM and Ternary States. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey A. Nichols, Benjamin A. Taylor, Laura Curtis |
Security Resilience: Exploring Windows Domain-Level Defenses Against Post-Exploitation Authentication Attacks. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Robert A. Bridges (eds.) |
Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016, Oak Ridge, TN, USA, April 5-7, 2016 |
CISRC |
2016 |
DBLP BibTeX RDF |
|
1 | Lahiru S. Gallege, Rajeev R. Raje |
Towards Selecting and Recommending Online Software Services by Evaluating External Attributes. |
CISRC |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #46 of 46 (100 per page; Change: )
|
|