Login / Signup
CISR
2015
2015
2015
Keyphrases
Publications
2015
Corinne L. Jones
,
Robert A. Bridges
,
Kelly M. T. Huffer
,
John R. Goodall
Towards a Relation Extraction Framework for Cyber-Security Concepts.
CISR
(2015)
Susan M. Bridges
,
Ken Keiser
,
Nathan Sissom
,
Sara J. Graves
Cyber Security for Additive Manufacturing.
CISR
(2015)
Yu Fu
,
Benafsh Husain
,
Richard R. Brooks
Analysis of Botnet Counter-Counter-Measures.
CISR
(2015)
Mark G. Pleszkoch
,
Rick Linger
Controlling Combinatorial Complexity in Software and Malware Behavior Computation.
CISR
(2015)
Jarilyn M. Hernández
,
Aaron E. Ferber
,
Stacy J. Prowell
,
Lee M. Hively
Phase-Space Detection of Cyber Events.
CISR
(2015)
Ryan Grandgenett
,
William R. Mahoney
,
Robin A. Gandhi
Authentication Bypass and Remote Escalated I/O Command Attacks.
CISR
(2015)
Dan Du
,
Lu Yu
,
Richard R. Brooks
Semantic Similarity Detection For Data Leak Prevention.
CISR
(2015)
Jaewon Yang
,
Xiuwen Liu
,
Shamik Bose
Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems.
CISR
(2015)
Suzanna Schmeelk
,
Junfeng Yang
,
Alfred V. Aho
Android Malware Static Analysis Techniques.
CISR
(2015)
Paul Carsten
,
Todd R. Andel
,
Mark Yampolskiy
,
Jeffrey Todd McDonald
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions.
CISR
(2015)
Robert K. Abercrombie
,
Frederick T. Sheldon
,
Bob G. Schlicher
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems.
CISR
(2015)
Lu Yu
,
Juan Deng
,
Richard R. Brooks
,
SeokBae Yun
Automobile ECU Design to Avoid Data Tampering.
CISR
(2015)
Xingsi Zhong
,
Paranietharan Arunagirinathan
,
Afshin Ahmadi
,
Richard R. Brooks
,
Ganesh Kumar Venayagamoorthy
Side-Channels in Electric Power Synchrophasor Network Data Traffic.
CISR
(2015)
Zoleikha Abdollahi Biron
,
Pierluigi Pisu
,
Baisravan HomChaudhuri
Observer Design Based Cyber Security for Cyber Physical Systems.
CISR
(2015)
Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015
CISR
(2015)
Michael D. Iannacone
,
Shawn Bohn
,
Grant Nakamura
,
John Gerth
,
Kelly M. T. Huffer
,
Robert A. Bridges
,
Erik M. Ferragut
,
John R. Goodall
Developing an Ontology for Cyber Security Knowledge Graphs.
CISR
(2015)
Hani Alturkostani
,
Anup Chitrakar
,
Robert Rinker
,
Axel W. Krings
On the Design of Jamming-Aware Safety Applications in VANETs.
CISR
(2015)
Mohammad Ashraf Hossain Sadi
,
Mohd. Hassan Ali
,
Dipankar Dasgupta
,
Robert K. Abercrombie
OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid.
CISR
(2015)
Christopher Robinson-Mallett
,
Sebastian Hansack
A Model of an Automotive Security Concept Phase.
CISR
(2015)
2014
Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014
CISR
(2014)
Xiaohong Yuan
,
Emmanuel Borkor Nuakoh
,
Jodria S. Beal
,
Huiming Yu
Retrieving relevant CAPEC attack patterns for secure software development.
CISR
(2014)
Ed Goff
,
Cliff Glantz
,
Rebecca Massello
Cybersecurity procurement language for energy delivery systems.
CISR
(2014)
Nathan Wallace
,
Stanislav Ponomarev
,
Travis Atkison
A dimensional transformation scheme for power grid cyber event detection.
CISR
(2014)
Qian Chen
,
Sherif Abdelwahed
Towards realizing self-protecting SCADA systems.
CISR
(2014)
Brian Lucas
,
Errin W. Fulp
,
David J. John
,
Daniel A. Cañas
An initial framework for evolving computer configurations as a moving target defense.
CISR
(2014)
Bogdan D. Czejdo
,
Michael D. Iannacone
,
Robert A. Bridges
,
Erik M. Ferragut
,
John R. Goodall
Integration of external data sources with cyber security data warehouse.
CISR
(2014)
Lindsey N. Whitehurst
,
Todd R. Andel
,
Jeffrey Todd McDonald
Exploring security in ZigBee networks.
CISR
(2014)
Steven Noel
,
Sushil Jajodia
Metrics suite for network attack graph analytics.
CISR
(2014)
George Chin Jr.
,
Sutanay Choudhury
,
John Feo
,
Lawrence B. Holder
Predicting and detecting emerging cyberattack patterns using StreamWorks.
CISR
(2014)
Christopher Robinson-Mallett
Coordinating security and safety engineering processes in automotive electronics development.
CISR
(2014)
Jeyasingam Nivethan
,
Mauricio Papa
,
Peter J. Hawrylak
Modeling and simulation of electric power substation employing an IEC 61850 network.
CISR
(2014)
Darrell M. Kienzle
,
Nathan S. Evans
,
Matthew C. Elder
NICE: endpoint-based topology discovery.
CISR
(2014)
Rattikorn Hewett
,
Sudeeptha Rudrapattana
,
Phongphun Kijsanayothin
Cyber-security analysis of smart grid SCADA systems with game models.
CISR
(2014)
Stanislav Ponomarev
,
Nathan Wallace
,
Travis Atkison
Detection of SSH host spoofing in control systems through network telemetry analysis.
CISR
(2014)
Matthew Sherburne
,
Randy C. Marchany
,
Joseph G. Tront
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid.
CISR
(2014)
Jacob Torrey
MoRE: measurement of running executables.
CISR
(2014)
Jin Dong
,
Seddik M. Djouadi
,
James J. Nutaro
,
Phani Teja Kuruganti
Secure control systems with application to cyber-physical systems.
CISR
(2014)
Michael Haney
,
Mauricio Papa
A framework for the design and deployment of a SCADA honeynet.
CISR
(2014)
Abhijit Kumar Nag
,
Dipankar Dasgupta
An adaptive approach for continuous multi-factor authentication in an identity eco-system.
CISR
(2014)
Anis Ben Aissa
,
Latifa Ben Arfa Rabai
,
Robert K. Abercrombie
,
Ali Mili
,
Frederick T. Sheldon
Quantifying availability in SCADA environments using the cyber security metric MFC.
CISR
(2014)
Sun-il Kim
,
William Edmonds
,
Nnamdi Nwanze
On GPU accelerated tuning for a payload anomaly-based network intrusion detection scheme.
CISR
(2014)
Alaa Darabseh
,
Akbar Siami Namin
The accuracy of user authentication through keystroke features using the most frequent words.
CISR
(2014)
Mohamed Fazeen
,
Garima Bajwa
,
Ram Dantu
Context-aware multimedia encryption in mobile platforms.
CISR
(2014)
Minzhe Guo
,
Prabir Bhattacharya
Diverse virtual replicas for improving intrusion tolerance in cloud.
CISR
(2014)
Rui Zhuang
,
Scott A. DeLoach
,
Xinming Ou
A model for analyzing the effect of moving target defenses on enterprise networks.
CISR
(2014)
Liang Kong
,
Gavin Bauer
,
John Hale
Location-based device grouping for function restriction.
CISR
(2014)
Shaun-inn Wu
,
Hieu Trong Ho
Image enhanced CAPTCHA for web security.
CISR
(2014)
Lahiru S. Gallege
,
Dimuthu U. Gamage
,
James H. Hill
,
Rajeev R. Raje
Towards trust-based recommender systems for online software services.
CISR
(2014)
George Louthan
,
Michael Haney
,
Phoebe Hardwicke
,
Peter J. Hawrylak
,
John Hale
Hybrid extensions for stateful attack graphs.
CISR
(2014)
Lakshmi Manohar Rao Velicheti
,
Dennis C. Feiock
,
Manjula Peiris
,
Rajeev R. Raje
,
James H. Hill
Towards modeling the behavior of static code analysis tools.
CISR
(2014)