


default search action
4th CSIIRW 2008: Oak Ridge, TN, USA
- Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili:

Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008. ACM 2008, ISBN 978-1-60558-098-2
Plenary session
- Richard M. (Dick) Kemmerer:

Electronic voting systems: are your votes really counted. 1:1 - Patrick Arnold:

End to end trust. 2:1 - Steve Lines:

Best practices on information sharing of threats and warnings between the USG and industry. 3:1 - Michael Franz:

Eliminating the insider threat in software development by combining parallelism, randomization and checkpointing. 4:1 - Mike McDuffie:

Computing and the future. 5:1 - Brian Witten:

Internet security threat landscape: current changes in targets & methods. 6:1 - Jeffrey M. Voas:

Thirteen rules for trust. 7:1
Track: formal methods
- Baishakhi Ray, Shivakant Mishra:

Secure and reliable covert channel. 8:1-8:3 - Daniel Bilar

:
Noisy defenses: subverting malware's OODA loop. 9:1-9:3 - Riham Hassan, Shawn A. Bohner, Sherif El-Kassas:

Formal derivation of security design specifications from security requirements. 10:1-10:3 - Phillip G. Bradford, Daniel A. Ray:

Semantics for a domain-specific language for the digital forensics domain. 11:1-11:3 - Axel Krings:

Design for survivability: a tradeoff space. 12:1-12:4 - Yomna Ali, Sherif El-Kassas:

A rigorous methodology for security architecture modeling and verification. 13:1-13:3
Track: intrusion detection/insider threat
- Joseph P. Trien, Robert K. Abercrombie

, Frederick T. Sheldon
:
4th annual cyber security and information intelligence research workshop. 14:1-14:5 - Matt Bishop

, Carrie Gates:
Defining the insider threat. 15:1-15:3 - Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal:

Detecting sensitive data exfiltration by an insider attack. 16:1-16:3 - Françoise Sailhan, Julien Bourgeois

:
Log-based distributed intrusion detection for hybrid networks. 17:1-17:3 - Jianyong Dai, Ratan Guha, Joohan Lee:

Dynamic instruction sequences monitor for virus detection. 18:1-18:3 - Wenbing Zhao:

Towards practical intrusion tolerant systems: a blueprint. 19:1-19:3 - Stefano Zanero

:
ULISSE, a network intrusion detection system. 20:1-20:4 - Michalis Polychronakis, Kostas G. Anagnostakis

, Evangelos P. Markatos:
Real-world polymorphic attack detection using network-level emulation. 21:1-21:3
Track: next generation security
- Bob G. Schlicher:

Emergence of cyber anti-forensics impacting cyber security. 22:1-22:12 - Brian L. Sharp, Gregory D. Peterson, Lok-Kwong Yan:

Extending hardware based mandatory access controls for memory to multicore architectures. 23:1-23:3 - Victor Yodaiken, Cort Dougan:

Active semantically aware hard real-time security hypervisors. 24:1-24:3 - Victor Raskin, Brian Buck, Arthur Keen, Christian F. Hempelmann

, Katrina E. Triezenberg:
Accessing and manipulating meaning of textual and data information for information assurance and security and intelligence information. 25:1-25:3 - R. R. Brooks, S. Sander, J. Deng, Joachim Taiber:

Automotive system security: challenges and state-of-the-art. 26:1-26:3 - Ryan S. Bennink

:
Quantum information: opportunities and challenges or "What's this quantum stuff and what does it have to do with cyber security?". 27:1 - Liangliang Xiao, I-Ling Yen, Farokh B. Bastani:

Security in a peer-to-peer data grid storage system. 28:1-28:3 - Elisa Bertino, Wonjun Lee, Anna Cinzia Squicciarini

, Bhavani Thuraisingham:
End-to-end accountability in grid computing systems for coalition information sharing. 29:1-29:3 - Ulf E. Larson, Dennis K. Nilsson:

Securing vehicles against cyber attacks. 30:1-30:3
Track: security frameworks
- John M. Abeles:

Abstract for NIST PRISMA enhancement. 31:1-31:3 - Michael R. Grimaila, Robert F. Mills, Larry W. Fortson:

Improving the cyber incident mission impact assessment (CIMIA) process. 32:1-32:2 - Robert A. Martin, Sean Barnum:

Creating the secure software testing target list. 33:1-33:2 - Benjamin Arazi

:
Mobile components security. 34:1-34:2 - Clive Blackwell:

A multi-layered security architecture for modelling complex systems. 35:1-35:4
Track: learning/optimization
- Thomas J. Sapienza:

Optimizing quality of service of wireless mobile ad-hoc networks using evolutionary computation. 36:1-36:5 - Franklin Webber, Partha P. Pal

, Paul Rubel, Michael Atighetchi:
An abstract interface for cyber-defense mechanisms. 37:1-37:3 - Geoffrey Mazeroff:

Markov models for application behavior analysis. 38:1-38:2 - Mohammad M. Masud

, Jing Gao, Latifur Khan
, Jiawei Han, Bhavani Thuraisingham:
Peer to peer botnet detection for cyber-security: a data mining approach. 39:1-39:2 - Karen Zita Haigh, Steven A. Harp:

Improving self defense by learning from limited experience. 40:1-40:4
Track: metrics
- Frederick T. Sheldon

, Robert K. Abercrombie
, Ali Mili:
Evaluating security controls based on key performance indicators and stakeholder mission. 41:1-41:11 - Ehab Al-Shaer, Latifur Khan

, Mohammad Salim Ahmed:
A comprehensive objective network security metric framework for proactive security configuration. 42:1-42:3 - Chee-Wooi Ten

, Chen-Ching Liu, Manimaran Govindarasu:
Cyber-vulnerability of power grid monitoring and control systems. 43:1-43:3 - Ju An Wang, Fengwei Zhang, Min Xia:

Temporal metrics for software vulnerabilities. 44:1-44:3

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














