Login / Signup
CSIIRW
2008
2013
2008
2013
Keyphrases
Publications
2013
Matthew Butler
,
Steven Reed
,
Peter J. Hawrylak
,
John Hale
Implementing graceful RFID privilege reduction.
CSIIRW
(2013)
Lu Yu
,
Richard R. Brooks
Applying POMDP to moving target optimization.
CSIIRW
(2013)
Charles N. Payne Jr.
,
Jason Sonnek
,
Steven A. Harp
XEBHRA: a virtualized platform for cross domain information sharing.
CSIIRW
(2013)
Lee M. Hively
,
Jeffrey Todd McDonald
Theorem-based, data-driven, cyber event detection.
CSIIRW
(2013)
Janusz Zalewski
,
Steven Drager
,
William McKeever
,
Andrew J. Kornecki
Threat modeling for security assessment in cyberphysical systems.
CSIIRW
(2013)
Ganesh Ram Santhanam
,
Zachary J. Oster
,
Samik Basu
Identifying a preferred countermeasure strategy for attack graphs.
CSIIRW
(2013)
Cindy Finke
,
Jonathan Butts
,
Robert F. Mills
ADS-B encryption: confidentiality in the friendly skies.
CSIIRW
(2013)
Marco M. Carvalho
,
Thomas C. Eskridge
,
Larry Bunch
,
Jeffrey M. Bradshaw
,
Adam Dalton
,
Paul J. Feltovich
,
James Lott
,
Dan Kidwell
A human-agent teamwork command and control framework for moving target defense (MTC2).
CSIIRW
(2013)
Hui Lin
,
Adam J. Slagell
,
Catello Di Martino
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol.
CSIIRW
(2013)
Michael Duren
,
Hal Aldridge
,
Robert K. Abercrombie
,
Frederick T. Sheldon
Designing and operating through compromise: architectural analysis of CKMS for the advanced metering infrastructure.
CSIIRW
(2013)
Justin M. Beaver
,
Christopher T. Symons
,
Robert E. Gillen
A learning system for discriminating variants of malicious network traffic.
CSIIRW
(2013)
Dimitrios Mermigas
,
Constantinos Patsakis
,
Sotirios Pirounias
Quantification of information systems security with stochastic calculus.
CSIIRW
(2013)
Annarita Giani
,
Russell Bent
Addressing smart grid cyber security.
CSIIRW
(2013)
Ike Patterson
,
James J. Nutaro
,
Glenn Allgood
,
Phani Teja Kuruganti
,
David Fugate
Optimizing investments in cyber-security for critical infrastructure.
CSIIRW
(2013)
Jarilyn M. Hernández
,
Line Pouchard
,
Jeffrey Todd McDonald
,
Stacy J. Prowell
Developing a power measurement framework for cyber defense.
CSIIRW
(2013)
Hasan Cam
,
Pierre Mouallem
Mission-aware time-dependent cyber asset criticality and resilience.
CSIIRW
(2013)
Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013
CSIIRW
(2013)
Emilie Hogan
,
John R. Johnson
,
Mahantesh Halappanavar
Graph coarsening for path finding in cybersecurity graphs.
CSIIRW
(2013)
Qian Chen
,
Sherif Abdelwahed
,
Weston Monceaux
Towards automatic security management: a model-based approach.
CSIIRW
(2013)
Sean Crosby
,
Marco M. Carvalho
,
Dan Kidwell
A layered approach to understanding network dependencies on moving target defense mechanisms.
CSIIRW
(2013)
Read Sprabery
,
Thomas H. Morris
,
Shengyi Pan
,
Uttam Adhikari
,
Vahid Madani
Protocol mutation intrusion detection for synchrophasor communications.
CSIIRW
(2013)
Rui Xie
,
Rose F. Gamble
An architecture for cross-cloud auditing.
CSIIRW
(2013)
Zach Harbort
,
Conor Fellin
Gesture-oriented data sharing.
CSIIRW
(2013)
Yevgeniy Vorobeychik
,
Michael Z. Lee
,
Adam Anderson
,
Mitch Adair
,
William Atkins
,
Alan Berryhill
,
Dominic Chen
,
Ben Cook
,
Jeremy Erickson
,
Steve Hurd
,
Ron Olsberg
,
Lyndon Pierson
,
Owen Redwood
Fireaxe: the DHS secure design competition pilot.
CSIIRW
(2013)
Rayford B. Vaughn
,
Thomas H. Morris
,
Elena Sitnikova
Development & expansion of an industrial control system security laboratory and an international research collaboration.
CSIIRW
(2013)
James J. Nutaro
,
Glenn Allgood
,
Phani Teja Kuruganti
,
Darren Highfill
Using simulation to engineer cybersecurity requirements.
CSIIRW
(2013)
Ravi Akella
,
Bruce M. McMillin
Modeling and verification of security properties for critical infrastructure protection.
CSIIRW
(2013)
Richard C. Linger
,
Mark G. Pleszkoch
,
Stacy J. Prowell
,
Kirk Sayre
,
T. Scott Ankrum
Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.
CSIIRW
(2013)
Ilker Özçelik
,
Richard R. Brooks
Operational system testing for designed in security.
CSIIRW
(2013)
Jason J. Haas
,
J. D. Doak
,
Jason R. Hamlet
Machine-oriented biometrics and cocooning for dynamic network defense.
CSIIRW
(2013)
David Schwab
,
Li Yang
Entity authentication in a mobile-cloud environment.
CSIIRW
(2013)
Christopher S. Oehmen
,
Elena S. Peterson
,
Jeremy Teuton
Evolutionary drift models for moving target defense.
CSIIRW
(2013)
Ahmed Serageldin
,
Axel W. Krings
,
Ahmed Abdel-Rahim
A survivable critical infrastructure control application.
CSIIRW
(2013)
Lianyu Zhao
,
Richard R. Brooks
Tailoring trusted semantic information.
CSIIRW
(2013)
Avinash R. Desai
,
Michael S. Hsiao
,
Chao Wang
,
Leyla Nazhandali
,
T. Simin Hall
Interlocking obfuscation for anti-tamper hardware.
CSIIRW
(2013)
Reese Moore
,
Stephen Groat
,
Randy C. Marchany
,
Joseph G. Tront
Using transport layer multihoming to enhance network layer moving target defenses.
CSIIRW
(2013)
Michael Duren
,
John Walsh
,
Hal Aldridge
,
Meng-Day (Mandel) Yu
Resilient device authentication system (RDAS) through SIOMETRICS.
CSIIRW
(2013)
Shubhalaxmi Kher
,
Victor Nutt
,
Dipankar Dasgupta
,
Mohd. Hasan Ali
,
Paul Mixon
A prediction model for anomalies in smart grid with sensor network.
CSIIRW
(2013)
Lahiru S. Gallege
,
Dimuthu Gamage
,
James H. Hill
,
Rajeev R. Raje
Trust contract of a service and its role in service selection for distributed software systems.
CSIIRW
(2013)
Maggie X. Cheng
,
Quanmin Ye
,
Robert F. Erbacher
Visualizing graph features for fast port scan detection.
CSIIRW
(2013)
Maggie X. Cheng
,
Mariesa L. Crow
,
Robert F. Erbacher
Vulnerability analysis of a smart grid with monitoring and control system.
CSIIRW
(2013)
Rattikorn Hewett
,
Phongphun Kijsanayothin
Securing system controllers in critical infrastructures.
CSIIRW
(2013)
Travis L. Bauer
,
Richard Colbaugh
,
Kristin Glass
,
David Schnizlein
Use of transfer entropy to infer relationships from behavior.
CSIIRW
(2013)
Neal Dawes
,
Bryan Prosser
,
Errin W. Fulp
,
A. David McKinnon
Using mobile agents and overlay networks to secure electrical networks.
CSIIRW
(2013)
Justin Yackoski
,
Jason H. Li
,
Scott A. DeLoach
,
Xinming Ou
Mission-oriented moving target defense based on cryptographically strong network dynamics.
CSIIRW
(2013)
Adam Hahn
,
Manimaran Govindarasu
Model-based intrustion detection for the smart grid (MINDS).
CSIIRW
(2013)
Ryan Goodfellow
,
Robert Braden
,
Terry Benzel
,
David E. Bakken
First steps toward scientific cyber-security experimentation in wide-area cyber-physical systems.
CSIIRW
(2013)
Katherine C. Cameron
,
Richard R. Brooks
,
Juan Deng
Cost-effective quality assurance of wireless network security.
CSIIRW
(2013)
Robert K. Abercrombie
,
Frederick T. Sheldon
,
Katie R. Hauser
,
Margaret W. Lantz
,
Ali Mili
Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA).
CSIIRW
(2013)
Richard R. Brooks
,
Oluwakemi Hambolu
,
Paul Marusich
,
Yu Fu
,
Saiprasad Balachandran
Creating a tailored trustworthy space for democracy advocates using hostile host.
CSIIRW
(2013)