Abstract is missing.
- Managing Robustness of Distributed Applications Under Uncertainties: An Information Assurance PerspectiveKaliappa Ravindran. [doi]
- Change the game or win the war: the metaphor mattersSusan Alexander. 1 [doi]
- Gov 2.0 and collaborative security models: security platforms and architectures of participation are the foundations of a winning strategyHart Rossman. 2 [doi]
- Coordinating and guiding federal, state and private sector cybersecurity initiativesSean McGurk. 3 [doi]
- Cyber physical systems R&D at DHS Science and Technology DirectorateNabil R. Adam. 4 [doi]
- Next generation computing: the rise of the utility in a future that is cloudy with scattered securityJim Stikeleather. 5 [doi]
- Holistic cyber approachGaret J. Moravec. 6 [doi]
- Securing the perimeter: challenges in enforcing global access controlDavid Nicol. 7 [doi]
- How Google tests softwareJames A. Whittaker. 8 [doi]
- A break down in trust, the emerging threat of cyber crime in connection with our dependence on web 2.0 technologiesScott Augenbaum. 9 [doi]
- Cyber science: moving from the toes to the shoulders of giantsTom Longstaff. 10 [doi]
- Cyberspace policy review and blueprint for research prioritiesMelissa Hathaway. 11 [doi]
- 20+years of cyber (in)security: what have we seen? what have we learned? what might we do?Rich Pethia. 12 [doi]
- Risk mitigation strategies: lessons learned from actual insider attacksDawn M. Cappelli. 13 [doi]
- Mission assurance: challenges and opportunitiesMichael R. Grimaila. 14 [doi]
- CIO/CTO perspectives panelThomas M. Overman. 15 [doi]
- CIO/CTO perspectives panelMichael E. Bartell. 16 [doi]
- "Keynote CIO/CTO perspectives panel" with panelistsMelissa Hathaway, Garet J. Moravec, Thomas M. Overman, Rich Pethia, Hart Rossman, Jim Stikeleather, Michael E. Bartell. 17 [doi]
- Cuckoo bags for exploring multikey dataJohn McHugh, Teryl Taylor, Jeff Janies. 18 [doi]
- PUF ROKs: generating read-once keys from physically unclonable functionsMichael S. Kirkpatrick, Elisa Bertino, Sam Kerr. 19 [doi]
- Towards safe and productive development of secure software: FADES and model-based software engineeringRiham Hassan, Shawn A. Bohner, Mohamed Eltoweissy. 20 [doi]
- Development of the PowerCyber SCADA security testbedAdam Hahn, Ben Kregel, Manimaran Govindarasu, Justin Fitzpatrick, Rafi Adnan, Siddharth Sridhar, Michael Higdon. 21 [doi]
- Forensic implications of Ext4Kevin D. Fairbanks, Christopher P. Lee, Henry L. Owen III. 22 [doi]
- Data diodes in support of trustworthy cyber infrastructureHamed Okhravi, Fredrick T. Sheldon. 23 [doi]
- Software process control for secure program executionJohn C. Munson, Jack L. Meador, Rick P. Hoover. 24 [doi]
- Graph based strategies to role engineeringDana Zhang, Kotagiri Ramamohanarao, Steven Versteeg, Rui Zhang 0003. 25 [doi]
- A Java based component identification tool for measuring the strength of circuit protectionsJames D. Parham, J. Todd McDonald, Michael R. Grimaila, Yong C. Kim. 26 [doi]
- SecureMyDroid: enforcing security in the mobile devices lifecycleAlessandro Distefano, Antonio Grillo, Alessandro Lentini, Giuseppe F. Italiano. 27 [doi]
- Cyber security analysis using attack countermeasure treesArpan Roy, Dong Seong Kim, Kishor S. Trivedi. 28 [doi]
- Vulnerability categorization using Bayesian networksJu An Wang, Minzhe Guo. 29 [doi]
- Concordia: a Google for malwareTimothy Daly, Luanne Burns. 30 [doi]
- Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasuresStan L. Bowie, Brenda S. Lenard, Craig A. Shue. 31 [doi]
- Adding value to log event correlation using distributed techniquesJustin Myers, Michael R. Grimaila, Robert F. Mills. 32 [doi]
- A reference based analysis framework for analyzing system call tracesVarun Chandola, Shyam Boriah, Vipin Kumar. 33 [doi]
- Game theory for cyber securitySajjan G. Shiva, Sankardas Roy, Dipankar Dasgupta. 34 [doi]
- The handicap principle, strategic information warfare and the paradox of asymmetryZhanshan (Sam) Ma, Frederick T. Sheldon, Axel W. Krings. 35 [doi]
- Computing the behavior of malwareRichard C. Linger, Mark G. Pleszkoch, Kirk Sayre, Tim Daly. 36 [doi]
- A data security protocol for the Trusted Truck® systemS. A. Bulusu, B. Arazi, I. Arel, A. Davis, G. Bitar. 37 [doi]
- Multi-variant program execution for vulnerability detection and analysisTodd Jackson, Christian Wimmer, Michael Franz. 38 [doi]
- Local binary patterns for face recognition under varying variationsYang Zhang, Taolun Chai, Chih-Cheng Hung. 39 [doi]
- Neighborhood monitoring in ad hoc networksAxel W. Krings, Stephan Muehlbacher-Karrer. 40 [doi]
- Alerts visualization and clustering in network-based intrusion detectionSwetha Dasireddy, Wade Gasior, Xiaohui Cui, Li Yang. 41 [doi]
- Towards a secure Frequency Monitoring NETwork (FNET) systemJoseph L. McDaniel, Ambareen Siraj. 42 [doi]
- Towards trustworthy shared networked sensor-actuator systemsRamy Eltarras, Mohamed Eltoweissy, Stephan Olariu, Ing-Ray Chen. 43 [doi]
- Extracting security control requirementsJ. Hosey, R. Gamble. 44 [doi]
- Fast malware classification by automated behavioral graph matchingYoung Hee Park, Douglas S. Reeves, Vikram Mulukutla, Balaji Sundaravel. 45 [doi]
- A security ontology for incident analysisClive Blackwell. 46 [doi]
- NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysisKenton Born, David Gustafson. 47 [doi]
- Propagation modeling and analysis of network worm attackOssama Toutonji, Seong-Moo Yoo, Moongyu Park. 48 [doi]
- Plug & execute framework for network traffic generationUta Ziegler, Youssif B. Al-Nashif, Salim Hariri. 49 [doi]
- A service model for network security applicationsLivio Ricciulli. 50 [doi]
- Multistage attack detection system for network administrators using data miningRajeshwar Katipally, Wade Gasior, Xiaohui Cui, Li Yang. 51 [doi]
- The privacy implications of stateless IPv6 addressingStephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront. 52 [doi]
- The need to consider both object identity and behavior in establishing the trustworthiness of network devices within a Smart GridOwen McCusker, Benjamin Gittins, Joel Glanfield, Scott Brunza, Stephen Brooks. 53 [doi]
- Vulnerabilities leading to denial of services attacks in grid computing systems: a surveyWonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino. 54 [doi]
- Modeling stakeholder/value dependency through mean failure costAnis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili. 55 [doi]
- Threat agents: a necessary component of threat analysisTimothy Casey, Patrick Koeberl, Claire Vishik. 56 [doi]
- Orwell was an optimistRyan Craven, Christopher Abbott, Harikrishnan Bhanu, Juan Deng, Richard R. Brooks. 57 [doi]
- Ontologies for modeling enterprise level security metricsAnoop Singhal, Duminda Wijesekera. 58 [doi]
- Lies and the lying liars that tell them: a fair and balanced look at TLSRichard R. Brooks, Juan Deng. 59 [doi]
- Overview of SLL's proposal in response to NIST's call for new global IdM/CKM designs without public keysBenjamin Gittins. 60 [doi]
- High assurance smart gridThomas M. Overman, Terry Davis, Ronald W. Sackman. 61 [doi]
- Power, performance and security optimized hardware design for H.264Mahadevan Gomathisankaran, Gayatri Mehta, Kamesh Namuduri. 62 [doi]
- Reasoning about policy noncomplianceRobert Baird, Rose F. Gamble. 63 [doi]
- Decentralized information flow control on a bare-metal JVMKarthikeyan Manivannan, Christian Wimmer, Michael Franz. 64 [doi]
- Building a trusted image for embedded systemsJack Harris, Raquel L. Hill. 65 [doi]
- An organic model for detecting cyber-eventsChristopher S. Oehmen, Elena S. Peterson, Scott Dowson. 66 [doi]
- Using formal methods for security in the Xenon projectJohn P. McDermott, Leo Freitas. 67 [doi]
- Discovery of C++ data structures from binariesDaniel Quinlan, Cory Cohen. 68 [doi]
- On generalization of performance of classifiers for steganalysisJosef D. Allen, Xiuwen Liu, Liam M. Mayron, Washington Mio. 69 [doi]
- A learning-based approach for SELinux policy optimization with type miningSaid Marouf, Doan Minh Phuong, Mohamed Shehab. 70 [doi]
- ReDS: reputation for directory services in P2P systemsMatthew Wright, Apu Kapadia, Mohan Kumar, Apurv Dhadphale. 71 [doi]
- Augmenting trust establishment in dynamic systems with social networksBrent Lagesse, Mohan Kumar, Svetha Venkatesh, Mihai Lazarescu. 72 [doi]
- Software requirements for a system to compute mean failure costAnis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili. 73 [doi]
- Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature miningJoseph R. Erskine, Gilbert L. Peterson, Barry E. Mullins, Michael R. Grimaila. 74 [doi]
- The impact of predicting attacker tools in security risk assessmentsEzequiel Gutesman, Ariel Waissbein. 75 [doi]
- Evaluating confidence levels for security scenarios in attribute architecturesTacksoo Im, John D. McGregor. 76 [doi]
- Safety and security in industrial controlAndrew J. Kornecki, Janusz Zalewski. 77 [doi]
- Positing social and justice models for cyber securityMichael Losavio, J. Eagle Shutt, Deborah W. Keeling. 78 [doi]
- Building ontology of cybersecurity operational informationTakeshi Takahashi, Hiroyuki Fujiwara, Youki Kadobayashi. 79 [doi]
- Degrees of anonymity in today's computing environments: decomposing complex processes for anonymity analysisClaire Vishik, Giusella Finocchiaro. 80 [doi]
- Behavioral model for secure group communication in wireless mesh networksQian Wei, Jingsha He, Xing Zhang. 81 [doi]
- Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspectiveHaricharan Rengamani, Shambhu J. Upadhyaya, H. Raghav Rao, Ponnurangam Kumaraguru. 82 [doi]
- A conceptual model of self-monitoring multi-core systemsDipankar Dasgupta, Harkeerat Bedi, Deon Garrett. 83 [doi]