Login / Signup
SafeConfig
2009
2014
2009
2014
Keyphrases
Publications
2014
Lujo Bauer
Human Factors, Defaults, and Automation: Challenges and Opporunities.
SafeConfig
(2014)
Ping Chen
,
Nick Nikiforakis
,
Lieven Desmet
,
Christophe Huygens
Security Analysis of the Chinese Web: How well is it protected?
SafeConfig
(2014)
Yasuyuki Tanaka
,
Atsuhiro Goto
n-ROPdetector: Proposal of a Method to Detect the ROP Attack Code on the Network.
SafeConfig
(2014)
Carl A. Gunter
Detecting Roles and Anomalies in Hospital Access Audit Logs.
SafeConfig
(2014)
Fida Gillani
,
Ehab Al-Shaer
Improving Efficiency of Spam Detection using Economic Model.
SafeConfig
(2014)
Jeremy Tate
,
T. Charles Clancy
Secure and Tamper Proof Code Management.
SafeConfig
(2014)
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems.
SafeConfig
(2014)
Kun Sun
,
Sushil Jajodia
Protecting Enterprise Networks through Attack Surface Expansion.
SafeConfig
(2014)
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014
SafeConfig
(2014)
2013
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]
SafeConfig
(2013)
2012
Meixing Le
,
Krishna Kant
,
Sushil Jajodia
Rule Configuration Checking in Secure Cooperative Data Access.
SafeConfig
(2012)
Ichita Higurashi
,
Akira Kanaoka
,
Masahiko Kato
,
Eiji Okamoto
Discovery of Unexpected Services and Communication Paths in Networked Systems.
SafeConfig
(2012)
Nazia Badar
,
Jaideep Vaidya
,
Vijayalakshmi Atluri
,
Basit Shafiq
Risk Based Access Control Using Classification.
SafeConfig
(2012)
Mohammad Ashiqur Rahman
,
Ehab Al-Shaer
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure.
SafeConfig
(2012)
Shankaranarayanan Puzhavakath Narayanan
,
Seungjoon Lee
,
Subhabrata Sen
GCNav: Generic Configuration Navigation System.
SafeConfig
(2012)
Michael R. Clement
,
Dennis M. Volpano
Programmable Diagnostic Network Measurement with Localization and Traffic Observation.
SafeConfig
(2012)
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
,
Adel El-Atawy
Towards a Unified Modeling and Verification of Network and System Security Configurations.
SafeConfig
(2012)
Masahiko Kato
,
Takumi Matsunami
,
Akira Kanaoka
,
Hiroshi Koide
,
Eiji Okamoto
Tracing Advanced Persistent Threats in Networked Systems.
SafeConfig
(2012)
Mingyi Zhao
,
Peng Liu
Modeling and Checking the Security of DIFC System Configurations.
SafeConfig
(2012)
Hayawardh Vijayakumar
,
Trent Jaeger
The Right Files at the Right Time.
SafeConfig
(2012)
Martín Barrère
,
Gaetan Hurel
,
Remi Badonnel
,
Olivier Festor
Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.
SafeConfig
(2012)
2011
Eugen Leontie
,
Gedare Bloom
,
Rahul Simha
Automation for Creating and Configuring Security Manifests for Hardware Containers.
SafeConfig
(2011)
Said Marouf
,
Mohamed Shehab
SEGrapher: Visualization-based SELinux Policy Analysis.
SafeConfig
(2011)
Xin Sun
,
Jinliang Wei
,
Sanjay G. Rao
,
Geoffrey G. Xie
A software toolkit for visualizing enterprise routing design.
SafeConfig
(2011)
Ehab Al-Shaer
,
Mohammed Noraden Alsaleh
ConfigChecker: A tool for comprehensive security configuration analytics.
SafeConfig
(2011)
Mohammed Noraden Alsaleh
,
Ehab Al-Shaer
SCAP Based Configuration Analytics for Comprehensive Compliance Checking.
SafeConfig
(2011)
Saeed Al-Haj
,
Ehab Al-Shaer
Measuring Firewall Security.
SafeConfig
(2011)
Ludi Akue
,
Emmanuel Lavinal
,
Michelle Sibilla
A Dynamic Configuration Validation Language.
SafeConfig
(2011)
Yousra Javed
,
Maliha Nazir
,
Muhammad Murtaza Khan
,
Syed Ali Khayam
,
Shujun Li
Captchæcker: Reconfigurable CAPTCHAs based on automated security and usability analysis.
SafeConfig
(2011)
Krishna Kant
,
Meixing Le
,
Sushil Jajodia
Security Considerations in Data Center Configuration Management.
SafeConfig
(2011)
Simon N. Foley
,
William M. Fitzgerald
,
Wayne Mac Adams
Federated Autonomic Network Access Control.
SafeConfig
(2011)
Mohammad Ashiqur Rahman
,
Ehab Al-Shaer
AMIAnalyzer: Security analysis of AMI configurations.
SafeConfig
(2011)
Hicham El Khoury
,
Romain Laborde
,
François Barrère
,
Abdelmalek Benzekri
,
Maroun Chamoun
A Generic Data Flow Security Model.
SafeConfig
(2011)
Saeed Al-Haj
,
Ehab Al-Shaer
CloudChecker: An imperative framework for cloud configuration management.
SafeConfig
(2011)
Michael B. Crouse
,
Errin W. Fulp
A moving target environment for computer configurations using Genetic Algorithms.
SafeConfig
(2011)
Rick Kuhn
Vulnerability Hierarchies in Access Control Configurations.
SafeConfig
(2011)
Sanjai Narain
,
Sharad Malik
,
Ehab Al-Shaer
Towards Eliminating Configuration Errors in Cyber Infrastructure.
SafeConfig
(2011)
Fida Gillani
,
Umar Kalim
,
Noman Latif
,
Syed Ali Khayam
Decision Theoretic Approach to Detect Anomalies beyond Enterprise Boundaries.
SafeConfig
(2011)
William M. Fitzgerald
,
Simon N. Foley
Reasoning about the Security Configuration of SAN Switch Fabrics.
SafeConfig
(2011)
2010
William M. Fitzgerald
,
Simon N. Foley
Management of heterogeneous security access control configuration using an ontology engineering approach.
SafeConfig
(2010)
Chris Giblin
,
Marcel Graf
,
Günter Karjoth
,
Andreas Wespi
,
Ian M. Molloy
,
Jorge Lobo
,
Seraphin B. Calo
Towards an integrated approach to role engineering.
SafeConfig
(2010)
Ehab Al-Shaer
,
Saeed Al-Haj
FlowChecker: configuration analysis and verification of federated openflow infrastructures.
SafeConfig
(2010)
Bart Van Brabant
,
Thomas Delaet
,
Wouter Joosen
Authorizing and directing configuration updates in contemporary it infrastructures.
SafeConfig
(2010)
Palanivel A. Kodeswaran
,
Anupam Joshi
,
Timothy W. Finin
,
Filip Perich
A declarative approach for secure and robust routing.
SafeConfig
(2010)
Hongxin Hu
,
Gail-Joon Ahn
,
Ketan Kulkarni
FAME: a firewall anomaly management environment.
SafeConfig
(2010)
Sunil Kumar Ghai
,
Prateek Nigam
,
Ponnurangam Kumaraguru
Cue: a framework for generating meaningful feedback in XACML.
SafeConfig
(2010)
Fahimeh Raja
,
Kirstie Hawkey
,
Pooya Jaferian
,
Konstantin Beznosov
,
Kellogg S. Booth
It's too complicated, so i turned it off!: expectations, perceptions, and misconceptions of personal firewalls.
SafeConfig
(2010)
Saman A. Zonouz
,
Kaustubh R. Joshi
,
William H. Sanders
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment.
SafeConfig
(2010)
3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010
SafeConfig
(2010)
Padmalochan Bera
,
Soumya Maity
,
Soumya Kanti Ghosh
Generating policy based security implementation in enterprise network: a formal framework.
SafeConfig
(2010)