Login / Signup
SafeConfig@CCS
2015
2017
2015
2017
Keyphrases
Publications
2017
Alexander Kedrowitsch
,
Danfeng (Daphne) Yao
,
Gang Wang
,
Kirk W. Cameron
A First Look: Using Linux Containers for Deceptive Honeypots.
SafeConfig@CCS
(2017)
Michael Atighetchi
,
Fusun Yaman
,
David Last
,
Nicholas Paltzer
,
Meghan Caiazzo
,
Stephen Raio
A Flexible Approach Towards Security Validation.
SafeConfig@CCS
(2017)
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017
SafeConfig@CCS
(2017)
Swarup Chandra
,
Vishal M. Karande
,
Latifur R. Khan
Secure IoT Stream Data Management and Analytics with Intel SGX.
SafeConfig@CCS
(2017)
Weiyu Wang
,
Quanyan Zhu
On the Detection of Adversarial Attacks against Deep Neural Networks.
SafeConfig@CCS
(2017)
Daniel Massey
Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems.
SafeConfig@CCS
(2017)
Amirreza Niakanlahiji
,
Mir Mehedi A. Pritom
,
Bei-tseng Chu
,
Ehab Al-Shaer
Predicting Zero-day Malicious IP Addresses.
SafeConfig@CCS
(2017)
Mahran Al-Zyoud
,
Laurie A. Williams
,
Jeffrey C. Carver
Step One Towards Science of Security.
SafeConfig@CCS
(2017)
Luca Allodi
,
Sandro Etalle
Towards Realistic Threat Modeling: Attack Commodification, Irrelevant Vulnerabilities, and Unrealistic Assumptions.
SafeConfig@CCS
(2017)
2016
Trent Jaeger
Configuring Software and Systems for Defense-in-Depth.
SafeConfig@CCS
(2016)
Tobias Fiebig
,
Anja Feldmann
,
Matthias Petschick
A One-Year Perspective on Exposed In-memory Key-Value Stores.
SafeConfig@CCS
(2016)
Stefan Marksteiner
,
Harald Lernbeiß
,
Bernhard Jandl-Scherf
An Iterative and Toolchain-Based Approach to Automate Scanning and Mapping Computer Networks.
SafeConfig@CCS
(2016)
Kevin Benton
,
L. Jean Camp
Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies.
SafeConfig@CCS
(2016)
Fabio De Gaspari
,
Sushil Jajodia
,
Luigi V. Mancini
,
Agostino Panico
AHEAD: A New Architecture for Active Defense.
SafeConfig@CCS
(2016)
Emilie Purvine
,
John R. Johnson
,
Chaomei Lo
A Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks.
SafeConfig@CCS
(2016)
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks.
SafeConfig@CCS
(2016)
Nicholas J. Multari
,
Anoop Singhal
,
David O. Manz
,
Robert Cowles
,
Jorge Cuéllar
,
Christopher S. Oehmen
,
Gregory Shannon
SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?
SafeConfig@CCS
(2016)
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October 24, 2016
SafeConfig@CCS
(2016)
George Sharkov
From Cybersecurity to Collaborative Resiliency.
SafeConfig@CCS
(2016)
2015
Simone Mutti
,
Enrico Bacis
,
Stefano Paraboschi
Policy Specialization to Support Domain Isolation.
SafeConfig@CCS
(2015)
Sutanay Choudhury
,
Luke Rodriguez
,
Darren S. Curtis
,
Kiri Oler
,
Peter Nordquist
,
Pin-Yu Chen
,
Indrajit Ray
Action Recommendation for Cyber Resilience.
SafeConfig@CCS
(2015)
Caroline A. Odell
,
Matthew R. McNiece
,
Sarah K. Gage
,
Howard Donald Gage
,
Errin W. Fulp
Using Probability Densities to Evolve more Secure Software Configurations.
SafeConfig@CCS
(2015)
Christopher S. Oehmen
,
Thomas E. Carroll
,
Patrick C. Paulson
,
Daniel M. Best
,
Christine F. Noonan
,
Seth R. Thompson
,
Jeffrey L. Jensen
,
Glenn A. Fink
,
Elena S. Peterson
Behavior-dependent Routing: Responding to Anomalies with Automated Low-cost Measures.
SafeConfig@CCS
(2015)
Christopher S. Oehmen
,
Ehab Al-Shaer
,
Mohammad Ashiqur Rahman
Automated Decision Making for Active Cyber Defense: Panel Discussion.
SafeConfig@CCS
(2015)
Yasir Imtiaz Khan
,
Ehab Al-Shaer
,
Usman Rauf
Cyber Resilience-by-Construction: Modeling, Measuring & Verifying.
SafeConfig@CCS
(2015)
Malik Shahzad Kaleem Awan
,
Pete Burnap
,
Omer F. Rana
Estimating Risk Boundaries for Persistent and Stealthy Cyber-Attacks.
SafeConfig@CCS
(2015)
Xiaoyan Sun
,
Anoop Singhal
,
Peng Liu
Who Touched My Mission: Towards Probabilistic Mission Impact Assessment.
SafeConfig@CCS
(2015)
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015
SafeConfig@CCS
(2015)
Santosh Kumar Majhi
,
Padmalochan Bera
A Security Enforcement Framework for Virtual Machine Migration Auction.
SafeConfig@CCS
(2015)
Andrzej Kamisinski
,
Carol J. Fung
FlowMon: Detecting Malicious Switches in Software-Defined Networks.
SafeConfig@CCS
(2015)
Wende Peters
Integrated Adaptive Cyber Defense: Integration Spiral Results.
SafeConfig@CCS
(2015)