Login / Signup
CSET
2008
2011
2014
2008
2014
Keyphrases
Publications
2014
Melissa Danforth
,
Charles Lam
Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report.
CSET
(2014)
Nathan S. Evans
,
Azzedine Benameur
,
Matthew C. Elder
Large-Scale Evaluation of a Vulnerability Analysis Framework.
CSET
(2014)
7th Workshop on Cyber Security Experimentation and Test, CSET '14, San Diego, CA, USA, August 18, 2014.
CSET
(2014)
William Herlands
,
Thomas Hobson
,
Paula J. Donovan
Effective Entropy: Security-Centric Metric for Memory Randomization Techniques.
CSET
(2014)
Stanislav Dashevskyi
,
Daniel Ricardo dos Santos
,
Fabio Massacci
,
Antonino Sabetta
TESTREX: a Testbed for Repeatable Exploits.
CSET
(2014)
Abdulla Alwabel
,
Hao Shi
,
Genevieve Bartlett
,
Jelena Mirkovic
Safe and Automated Live Malware Experimentation on Public Testbeds.
CSET
(2014)
Stefan Boesen
,
Richard S. Weiss
,
James F. Sullivan
,
Michael E. Locasto
,
Jens Mache
,
Erik Nilsen
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments.
CSET
(2014)
Fanny Lalonde Lévesque
,
José M. Fernandez
Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot Study.
CSET
(2014)
Tobias Fiebig
,
Janis Danisevskis
,
Marta Piekarska
A Metric for the Evaluation and Comparison of Keylogger Performance.
CSET
(2014)
Kurt C. Wallnau
,
Brian Lindauer
,
Michael Theis
,
Robert S. Durst
,
Terrance G. Champion
,
Eric Renouf
,
Christian Petersen
Simulating Malicious Insiders in Real Host-Monitored User Data.
CSET
(2014)
Jason Gionta
,
Ahmed M. Azab
,
William Enck
,
Peng Ning
,
Xiaolan Zhang
DACSA: A Decoupled Architecture for Cloud Security Analysis.
CSET
(2014)
2013
Christopher E. Everett
,
Damon McCoy
OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students.
CSET
(2013)
Hadi Asghari
,
Michel van Eeten
,
Milton L. Mueller
Internet Measurements and Public Policy: Mind the Gap.
CSET
(2013)
Mark A. Gondree
,
Zachary N. J. Peterson
Valuing Security by Getting [d0x3d!]: Experiences with a Network Security Board Game.
CSET
(2013)
Hristo N. Djidjev
,
Lyudmil Aleksandrov
Generation of SSH Network Traffic Data for IDS Testbeds.
CSET
(2013)
Gary Nilson
,
Kent Wills
,
Jeffrey Stuckman
,
James Purtilo
BugBox: A Vulnerability Corpus for PHP Web Applications.
CSET
(2013)
Matthias Wählisch
,
Fabian Holler
,
Thomas C. Schmidt
,
Jochen H. Schiller
RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation.
CSET
(2013)
6th Workshop on Cyber Security Experimentation and Test, CSET '13, Washington, D.C., USA, August 12, 2013
CSET
(2013)
Azzedine Benameur
,
Nathan S. Evans
,
Matthew C. Elder
MINESTRONE: Testing the SOUP.
CSET
(2013)
Luca Allodi
,
Vadim Kotov
,
Fabio Massacci
MalwareLab: Experimentation with Cybercrime Attack Tools.
CSET
(2013)
John Sonchack
,
Adam J. Aviv
,
Jonathan M. Smith
Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems.
CSET
(2013)
2012
Marie Vasek
,
Tyler Moore
Do Malware Reports Expedite Cleanup? An Experimental Study.
CSET
(2012)
Roya Ensafi
,
Mike Jacobi
,
Jedidiah R. Crandall
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper.
CSET
(2012)
John F. Duncan
,
L. Jean Camp
Conducting an Ethical Study of Web Traffic.
CSET
(2012)
Jing Zhang
,
Robin Berthier
,
Will Rhee
,
Michael Bailey
,
Partha P. Pal
,
Farnam Jahanian
,
William H. Sanders
Learning from Early Attempts to Measure Information Security Performance.
CSET
(2012)
Michael Rosenstein
,
Frank Corvese
A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed.
CSET
(2012)
Tamas K. Lengyel
,
Justin Neumann
,
Steve Maresca
,
Bryan D. Payne
,
Aggelos Kiayias
Virtual Machine Introspection in a Hybrid Honeypot Architecture.
CSET
(2012)
Olaf Maennel
,
Iain Phillips
,
Debbie Perouli
,
Randy Bush
,
Rob Austein
,
Askar Jaboldinov
Towards a Framework for Evaluating BGP Security.
CSET
(2012)
Sandy Clark
,
Chris Wacek
,
Matt Blaze
,
Boon Thau Loo
,
Micah Sherr
,
Clay Shields
,
Jonathan M. Smith
Collaborative Red Teaming for Anonymity System Evaluation.
CSET
(2012)
Anas AlMajali
,
Arun Viswanathan
,
Clifford Neuman
Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack.
CSET
(2012)
Sebastian Koch
,
Jörg Schneider
,
Jan Nordholz
Disturbed Playing: Another Kind of Educational Security Games.
CSET
(2012)
Jelena Mirkovic
,
Abdulla Alwabel
,
Ted Faber
Beyond Disk Imaging for Preserving User State in Network Testbeds.
CSET
(2012)
5th Workshop on Cyber Security Experimentation and Test, CSET '12, Bellevue, WA, USA, August 6, 2012
CSET
(2012)
Rob Jansen
,
Kevin S. Bauer
,
Nicholas Hopper
,
Roger Dingledine
Methodically Modeling the Tor Network.
CSET
(2012)
2011
Kevin S. Killourhy
,
Roy A. Maxion
Should Security Researchers Experiment More and Draw More Inferences?
CSET
(2011)
Z. Berkay Celik
,
Jayaram Raghuram
,
George Kesidis
,
David J. Miller
Salting Public Traces with Attack Traffic to Test Flow Classifiers.
CSET
(2011)
4th Workshop on Cyber Security Experimentation and Test, CSET '11, San Francisco, CA, USA, August 8, 2011
CSET
(2011)
Kevin S. Bauer
,
Micah Sherr
,
Dirk Grunwald
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation.
CSET
(2011)
Malek Ben Salem
,
Salvatore J. Stolfo
On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned.
CSET
(2011)
Adam J. Aviv
,
Andreas Haeberlen
Challenges in Experimenting with Botnet Detection Systems.
CSET
(2011)
Nathan S. Evans
,
Christian Grothoff
Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols.
CSET
(2011)
Michael F. Thompson
,
Cynthia E. Irvine
Active Learning with the CyberCIEGE Video Game.
CSET
(2011)
Joseph Werther
,
Michael Zhivich
,
Tim Leek
,
Nickolai Zeldovich
Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise.
CSET
(2011)
Michael Golightly
,
Jack Brassil
Automating Network Monitoring on Experimental Testbeds.
CSET
(2011)
Peter Peterson
,
Digvijay Singh
,
William J. Kaiser
,
Peter L. Reiher
Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP Testbed.
CSET
(2011)
Tudor Dumitras
,
Iulian Neamtiu
Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware.
CSET
(2011)
Chris Kanich
,
Neha Chachra
,
Damon McCoy
,
Chris Grier
,
David Y. Wang
,
Marti Motoyama
,
Kirill Levchenko
,
Stefan Savage
,
Geoffrey M. Voelker
No Plan Survives Contact: Experience with Cybercrime Measurement.
CSET
(2011)
2010
Cody Cutler
,
Mike Hibler
,
Eric Eide
,
Robert Ricci
Trusted Disk Loading in the Emulab Network Testbed.
CSET
(2010)
Peter Peterson
,
Peter L. Reiher
Security Exercises for the Online Classroom with DETER.
CSET
(2010)
Joan Calvet
,
Carlton R. Davis
,
José M. Fernandez
,
Wadie Guizani
,
Matthieu Kaczmarek
,
Jean-Yves Marion
,
Pier-Luc St-Onge
Isolated Virtualised Clusters: Testbeds for High-Risk Security Experimentation and Training.
CSET
(2010)