Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Richard R. Brooks, Oluwakemi Hambolu, Paul Marusich, Yu Fu 0005, Saiprasad Balachandran |
Creating a tailored trustworthy space for democracy advocates using hostile host. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Emilie Hogan, John R. Johnson, Mahantesh Halappanavar |
Graph coarsening for path finding in cybersecurity graphs. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rui Xie, Rose F. Gamble |
An architecture for cross-cloud auditing. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ike Patterson, James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, David Fugate |
Optimizing investments in cyber-security for critical infrastructure. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Janusz Zalewski, Steven Drager 0001, William McKeever, Andrew J. Kornecki |
Threat modeling for security assessment in cyberphysical systems. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dimitrios Mermigas, Constantinos Patsakis, Sotirios Pirounias |
Quantification of information systems security with stochastic calculus. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ganesh Ram Santhanam, Zachary J. Oster, Samik Basu 0001 |
Identifying a preferred countermeasure strategy for attack graphs. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ravi Akella, Bruce M. McMillin |
Modeling and verification of security properties for critical infrastructure protection. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | James J. Nutaro, Glenn Allgood, Phani Teja Kuruganti, Darren Highfill |
Using simulation to engineer cybersecurity requirements. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ilker Özçelik, Richard R. Brooks |
Operational system testing for designed in security. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Serageldin, Axel W. Krings, Ahmed Abdel-Rahim |
A survivable critical infrastructure control application. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Butler 0003, Steven Reed, Peter J. Hawrylak, John Hale |
Implementing graceful RFID privilege reduction. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Avinash R. Desai, Michael S. Hsiao, Chao Wang 0001, Leyla Nazhandali, T. Simin Hall |
Interlocking obfuscation for anti-tamper hardware. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Travis L. Bauer, Richard Colbaugh, Kristin Glass, David Schnizlein |
Use of transfer entropy to infer relationships from behavior. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lee M. Hively, Jeffrey Todd McDonald |
Theorem-based, data-driven, cyber event detection. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sean Crosby, Marco M. Carvalho, Dan Kidwell |
A layered approach to understanding network dependencies on moving target defense mechanisms. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Duren, Hal Aldridge, Robert K. Abercrombie, Frederick T. Sheldon |
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lahiru S. Gallege, Dimuthu Gamage, James H. Hill, Rajeev R. Raje |
Trust contract of a service and its role in service selection for distributed software systems. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lu Yu 0001, Richard R. Brooks |
Applying POMDP to moving target optimization. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Cindy Finke, Jonathan Butts, Robert F. Mills |
ADS-B encryption: confidentiality in the friendly skies. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Schwab, Li Yang 0001 |
Entity authentication in a mobile-cloud environment. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christopher S. Oehmen, Elena S. Peterson, Jeremy Teuton |
Evolutionary drift models for moving target defense. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Justin M. Beaver, Christopher T. Symons, Robert E. Gillen |
A learning system for discriminating variants of malicious network traffic. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Frederick T. Sheldon, Katie R. Hauser, Margaret W. Lantz, Ali Mili 0001 |
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA). |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Vorobeychik, Michael Z. Lee, Adam Anderson 0002, Mitch Adair, William Atkins, Alan Berryhill, Dominic Chen, Ben Cook, Jeremy Erickson, Steve Hurd, Ron Olsberg, Lyndon Pierson, Owen Redwood |
Fireaxe: the DHS secure design competition pilot. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rayford B. Vaughn, Thomas H. Morris, Elena Sitnikova |
Development & expansion of an industrial control system security laboratory and an international research collaboration. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Katherine C. Cameron, Richard R. Brooks, Juan Deng |
Cost-effective quality assurance of wireless network security. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Lin 0005, Adam J. Slagell, Catello Di Martino, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Neal Dawes, Bryan Prosser, Errin W. Fulp, A. David McKinnon |
Using mobile agents and overlay networks to secure electrical networks. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Read Sprabery, Thomas H. Morris, Shengyi Pan, Uttam Adhikari, Vahid Madani |
Protocol mutation intrusion detection for synchrophasor communications. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zach Harbort, Conor Fellin |
Gesture-oriented data sharing. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Goodfellow, Robert Braden, Terry Benzel, David E. Bakken |
First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Maggie X. Cheng, Mariesa L. Crow, Robert F. Erbacher |
Vulnerability analysis of a smart grid with monitoring and control system. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charles N. Payne Jr., Jason Sonnek, Steven A. Harp |
XEBHRA: a virtualized platform for cross domain information sharing. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Maggie X. Cheng, Quanmin Ye, Robert F. Erbacher |
Visualizing graph features for fast port scan detection. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco M. Carvalho, Thomas C. Eskridge, Larry Bunch, Jeffrey M. Bradshaw, Adam Dalton 0001, Paul J. Feltovich, James Lott, Dan Kidwell |
A human-agent teamwork command and control framework for moving target defense (MTC2). |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael Duren, John Walsh, Hal Aldridge, Meng-Day (Mandel) Yu |
Resilient device authentication system (RDAS) through SIOMETRICS. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frederick T. Sheldon, Annarita Giani, Axel W. Krings, Robert K. Abercrombie (eds.) |
Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013 |
CSIIRW |
2013 |
DBLP BibTeX RDF |
|
1 | Hasan Cam, Pierre Mouallem |
Mission-aware time-dependent cyber asset criticality and resilience. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Reese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront |
Using transport layer multihoming to enhance network layer moving target defenses. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Mohd. Hasan Ali, Paul Mixon |
A prediction model for anomalies in smart grid with sensor network. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Qian Chen 0019, Sherif Abdelwahed, Weston Monceaux |
Towards automatic security management: a model-based approach. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jarilyn M. Hernández, Line Pouchard, Jeffrey Todd McDonald, Stacy J. Prowell |
Developing a power measurement framework for cyber defense. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Annarita Giani, Russell Bent |
Addressing smart grid cyber security. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum |
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason J. Haas, J. D. Doak, Jason R. Hamlet |
Machine-oriented biometrics and cocooning for dynamic network defense. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lianyu Zhao, Richard R. Brooks |
Tailoring trusted semantic information. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rattikorn Hewett, Phongphun Kijsanayothin |
Securing system controllers in critical infrastructures. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Hahn, Manimaran Govindarasu |
Model-based intrustion detection for the smart grid (MINDS). |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Justin Yackoski, Jason H. Li, Scott A. DeLoach, Xinming Ou |
Mission-oriented moving target defense based on cryptographically strong network dynamics. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jason M. Carter |
Locating executable fragments with Concordia, a scalable, semantics-based architecture. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chen Lu, Richard R. Brooks |
Timing analysis in P2P botnet traffic using probabilistic context-free grammars. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Richard R. Brooks, Benafsh Husain, SeokBae Yun, Juan Deng |
Security and performance evaluation of security protocols. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Erik M. Ferragut, Jason A. Laska, Bogdan D. Czejdo, Alexander Melin |
Addressing the challenges of anomaly detection for cyber physical energy grid systems. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dennis K. Holstein |
On the use of the Clark-Wilson security model to protect industrial automation control systems. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Segall, Michael J. Mayhew, Michael Atighetchi, Rachel Greenstadt |
Assessing trustworthiness in collaborative environments. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Lewis |
Characterizing risk. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shengyi Pan, Thomas H. Morris, Uttam Adhikari, Vahid Madani |
Causal event graphs cyber-physical system intrusion detection system. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak |
Estimating link availability and timing delays in ethernet-based networks. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Frederick T. Sheldon, Daniel Fetzer, David Manz, Jingshan Huang, Stuart Goose, Thomas H. Morris, Jiangbo Dang, Jonathan Kirsch, Dong Wei 0009 |
Intrinsically resilient energy control systems. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Howes, James Solderitsch, Ignatius Chen, Jonté Craighead |
Enabling trustworthy spaces via orchestrated analytical security. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes |
Relationships between information security metrics: an empirical study. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Victor Balogun, Axel W. Krings |
On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo |
Moving target defense (MTD) in an adaptive execution environment. |
CSIIRW |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arun Velagapalli, Mahalingam Ramkumar |
Minimizing the TCB for securing SCADA systems. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thoshitha T. Gamage, Ravi Akella, Thomas P. Roth, Bruce M. McMillin |
Information flow security in cyber-physical systems. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rich Nolan, Peter P. Chen |
Supporting velocity of investigation with behavior analysis of malware. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Curtis Taylor, Craug Shue |
Implementing a "moving target" system to protect servers. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sunirmal Khatua, Nandini Mukherjee, Nabendu Chaki |
A new agent based security framework for collaborative cloud environment. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Frederick T. Sheldon, Robert K. Abercrombie, Axel W. Krings (eds.) |
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011 |
CSIIRW |
2011 |
DBLP BibTeX RDF |
|
1 | Debra Frincke |
National Laboratory panel. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas W. Edgar, David O. Manz, Thomas E. Carroll |
Towards an experimental testbed facility for cyber-physical security research. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Butler 0003, Peter J. Hawrylak, John Hale |
Graceful privilege reduction in RFID security. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert F. Erbacher, Steve E. Hutchinson, Joshua Edwards |
Web traffic profiling and characterization. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiayin Li, Daigu Zhang, Meikang Qiu, Yongxin Zhu 0001, Ju Shen |
Security protection on FPGA against differential power analysis attacks. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lucille McMinn, Jonathan Butts, David Robinson, Billy Rios |
Exploiting the critical infrastructure via nontraditional system inputs. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Janusz Zalewski, Steven Drager 0001, William McKeever, Andrew J. Kornecki |
Can we measure security and how? |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Md. Moshiur Rahman |
A framework for estimating security coverage for cloud service insurance. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael A. Brown |
Plenary Keynote Speaker: Rear Admiral Michael A. Brown, DoD/DHS. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Kirsch, Stuart Goose, Yair Amir, Paul M. Skare |
Toward survivable SCADA. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | William L. Sousan, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney |
Using anomalous event patterns in control systems for tamper detection. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas H. Morris, Shengyi Pan, Jeremy Lewis, Jonathan Moorhead, Nicolas H. Younan, Roger L. King, Mark Freund, Vahid Madani |
Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bereket Mathewos Hambebo, Marco M. Carvalho, Fredric M. Ham |
Network traffic classification using a parallel neural network classifier architecture. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Azab, Mohamed Eltoweissy |
Towards a cooperative autonomous resilient defense platform for cyber-physical systems. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ilker Özçelik, Richard R. Brooks |
Security experimentation using operational systems. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marco M. Carvalho, Carlos Perez |
An evolutionary multi-agent approach to anomaly detection and cyber defense. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wade Gasior, Li Yang 0001 |
Network covert channels on the Android platform. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jason Carter |
An architecture for Concordia. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhanshan (Sam) Ma, Hongju (Daisy) Chen, Jiajin Zhang, Axel W. Krings, Frederick T. Sheldon |
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim? |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Bilar, James Solderitsch, Elvis Hovor |
Monitoring smart grid operations and maintaining mission assurance through adaptive computer network defenses. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mark R. Heckman, Roger R. Schell, Edwards E. Reed |
Using a high assurance TCB for infrastructure security. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Gregory Neal Akers |
Plenary Speaker: Gregory Neal Akers, CISCO. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jinpeng Wei, Calton Pu, Keke Chen |
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | John Bumgarner |
Plenary Speaker: John Bumgarner, U.S. Cyber Consequences Unit. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Luanne Burns, Christina Selby, Thomas A. Longstaff |
DART3: DHS assistant for R&D tracking and technology transfer. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Osborn |
Transforming NNSA information, collaboration and security. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Calver, Michael R. Grimaila, Jeffrey W. Humphries |
An empirical analysis of the cascade error reconciliation protocol for quantum key distribution. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin W. Hamlen, Peng Liu 0005, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu 0001 |
Identity management for cloud computing: developments and directions. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carol Hawk |
Key questions for the day on cryptographic key management. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dipankar Dasgupta, Mohd. Hassan Ali, Robert K. Abercrombie, Bob G. Schlicher, Frederick T. Sheldon, Marco Carvalho 0001 |
Secure VM for monitoring industrial process controllers. |
CSIIRW |
2011 |
DBLP DOI BibTeX RDF |
|