


default search action
10. CISR 2015: Oak Ridge, TN, USA
- Joseph P. Trien, Stacy J. Prowell, Robert A. Bridges, John R. Goodall:

Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015. ACM 2015, ISBN 978-1-4503-3345-0 - Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:

In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. 1:1-1:8 - Ryan Grandgenett, William R. Mahoney

, Robin A. Gandhi:
Authentication Bypass and Remote Escalated I/O Command Attacks. 2:1-2:7 - Xingsi Zhong, Paranietharan Arunagirinathan, Afshin Ahmadi, Richard R. Brooks

, Ganesh Kumar Venayagamoorthy
:
Side-Channels in Electric Power Synchrophasor Network Data Traffic. 3:1-3:8 - Dan Du, Lu Yu, Richard R. Brooks

:
Semantic Similarity Detection For Data Leak Prevention. 4:1-4:6 - Suzanna Schmeelk, Junfeng Yang, Alfred V. Aho:

Android Malware Static Analysis Techniques. 5:1-5:8 - Zoleikha Abdollahi Biron, Pierluigi Pisu

, Baisravan HomChaudhuri:
Observer Design Based Cyber Security for Cyber Physical Systems. 6:1-6:6 - Hani Alturkostani, Anup Chitrakar, Robert Rinker, Axel W. Krings:

On the Design of Jamming-Aware Safety Applications in VANETs. 7:1-7:8 - Jaewon Yang, Xiuwen Liu, Shamik Bose

:
Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems. 8:1-8:4 - Yu Fu, Benafsh Husain, Richard R. Brooks

:
Analysis of Botnet Counter-Counter-Measures. 9:1-9:4 - Lu Yu, Juan Deng, Richard R. Brooks

, SeokBae Yun:
Automobile ECU Design to Avoid Data Tampering. 10:1-10:4 - Corinne L. Jones, Robert A. Bridges, Kelly M. T. Huffer, John R. Goodall:

Towards a Relation Extraction Framework for Cyber-Security Concepts. 11:1-11:4 - Michael D. Iannacone, Shawn Bohn, Grant Nakamura, John Gerth, Kelly M. T. Huffer, Robert A. Bridges, Erik M. Ferragut, John R. Goodall:

Developing an Ontology for Cyber Security Knowledge Graphs. 12:1-12:4 - Jarilyn M. Hernández, Aaron E. Ferber, Stacy J. Prowell

, Lee M. Hively:
Phase-Space Detection of Cyber Events. 13:1-13:4 - Susan M. Bridges, Ken Keiser, Nathan Sissom, Sara J. Graves:

Cyber Security for Additive Manufacturing. 14:1-14:3 - Mark G. Pleszkoch, Rick Linger:

Controlling Combinatorial Complexity in Software and Malware Behavior Computation. 15:1-15:4 - Christopher Robinson-Mallett, Sebastian Hansack:

A Model of an Automotive Security Concept Phase. 16:1-16:4 - Mohammad Ashraf Hossain Sadi, Mohd. Hassan Ali, Dipankar Dasgupta, Robert K. Abercrombie

:
OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid. 17:1-17:4 - Robert K. Abercrombie

, Frederick T. Sheldon
, Bob G. Schlicher:
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems. 18:1-18:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














