


default search action
6. CSIIRW 2010: Oak Ridge, TN, USA
- Frederick T. Sheldon, Stacy J. Prowell, Robert K. Abercrombie, Axel W. Krings:

Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2010, Oak Ridge, TN, USA, April 21-23, 2010. ACM 2010, ISBN 978-1-4503-0017-9
Plenary and panel sessions
- Susan Alexander:

Change the game or win the war: the metaphor matters. 1 - Hart Rossman:

Gov 2.0 and collaborative security models: security platforms and architectures of participation are the foundations of a winning strategy. 2 - Sean McGurk:

Coordinating and guiding federal, state and private sector cybersecurity initiatives. 3 - Nabil R. Adam:

Cyber physical systems R&D at DHS Science and Technology Directorate. 4 - Jim Stikeleather:

Next generation computing: the rise of the utility in a future that is cloudy with scattered security. 5 - Garet J. Moravec:

Holistic cyber approach. 6 - David M. Nicol:

Securing the perimeter: challenges in enforcing global access control. 7 - James A. Whittaker:

How Google tests software. 8 - Scott Augenbaum:

A break down in trust, the emerging threat of cyber crime in connection with our dependence on web 2.0 technologies. 9 - Tom Longstaff:

Cyber science: moving from the toes to the shoulders of giants. 10 - Melissa Hathaway:

Cyberspace policy review and blueprint for research priorities. 11 - Rich Pethia:

20+years of cyber (in)security: what have we seen? what have we learned? what might we do? 12 - Dawn M. Cappelli:

Risk mitigation strategies: lessons learned from actual insider attacks. 13 - Michael R. Grimaila:

Mission assurance: challenges and opportunities. 14 - Thomas M. Overman:

CIO/CTO perspectives panel. 15 - Michael E. Bartell:

CIO/CTO perspectives panel. 16
Panel discussions
- Melissa Hathaway, Garet J. Moravec, Thomas M. Overman, Rich Pethia, Hart Rossman, Jim Stikeleather, Michael E. Bartell:

"Keynote CIO/CTO perspectives panel" with panelists. 17
Design
- John McHugh, Teryl Taylor, Jeff Janies:

Cuckoo bags for exploring multikey data. 18 - Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr:

PUF ROKs: generating read-once keys from physically unclonable functions. 19 - Riham Hassan, Shawn A. Bohner, Mohamed Eltoweissy:

Towards safe and productive development of secure software: FADES and model-based software engineering. 20 - Adam Hahn, Benjamin Kregel, Manimaran Govindarasu, Justin Fitzpatrick, Rafi Adnan, Siddharth Sridhar, Michael Higdon:

Development of the PowerCyber SCADA security testbed. 21 - Kevin D. Fairbanks

, Christopher P. Lee, Henry L. Owen III:
Forensic implications of Ext4. 22 - Hamed Okhravi

, Frederick T. Sheldon
:
Data diodes in support of trustworthy cyber infrastructure. 23 - John C. Munson, Jack L. Meador, Rick P. Hoover:

Software process control for secure program execution. 24 - Dana Zhang, Kotagiri Ramamohanarao

, Steven Versteeg, Rui Zhang:
Graph based strategies to role engineering. 25 - James D. Parham, Jeffrey Todd McDonald, Michael R. Grimaila, Yong C. Kim:

A Java based component identification tool for measuring the strength of circuit protections. 26 - Alessandro Distefano, Antonio Grillo, Alessandro Lentini, Giuseppe F. Italiano

:
SecureMyDroid: enforcing security in the mobile devices lifecycle. 27
Malware
- Arpan Roy

, Dong Seong Kim
, Kishor S. Trivedi:
Cyber security analysis using attack countermeasure trees. 28 - Ju An Wang, Minzhe Guo:

Vulnerability categorization using Bayesian networks. 29 - Timothy Daly, Luanne Burns:

Concordia: a Google for malware. 30 - Stan L. Bowie, Brenda S. Lenard, Craig A. Shue:

Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures. 31 - Justin Myers, Michael R. Grimaila, Robert F. Mills:

Adding value to log event correlation using distributed techniques. 32 - Varun Chandola, Shyam Boriah, Vipin Kumar:

A reference based analysis framework for analyzing system call traces. 33 - Sajjan G. Shiva, Sankardas Roy, Dipankar Dasgupta:

Game theory for cyber security. 34 - Zhanshan (Sam) Ma, Frederick T. Sheldon

, Axel W. Krings:
The handicap principle, strategic information warfare and the paradox of asymmetry. 35 - Richard C. Linger, Mark G. Pleszkoch, Kirk Sayre, Tim Daly:

Computing the behavior of malware. 36 - Srinivasa Anuradha Bulusu, Benjamin Arazi

, Itamar Arel, Andrew S. Davis, George Bitar:
A data security protocol for the Trusted Truck® system. 37 - Todd Jackson, Christian Wimmer, Michael Franz:

Multi-variant program execution for vulnerability detection and analysis. 38 - Yang Zhang, Taolun Chai, Chih-Cheng Hung:

Local binary patterns for face recognition under varying variations. 39
Network
- Axel W. Krings, Stephan Muehlbacher-Karrer:

Neighborhood monitoring in ad hoc networks. 40 - Swetha Dasireddy, Wade Gasior, Xiaohui Cui, Li Yang:

Alerts visualization and clustering in network-based intrusion detection. 41 - Joseph L. McDaniel, Ambareen Siraj:

Towards a secure Frequency Monitoring NETwork (FNET) system. 42 - Ramy Eltarras, Mohamed Eltoweissy, Stephan Olariu, Ing-Ray Chen:

Towards trustworthy shared networked sensor-actuator systems. 43 - J. Hosey, Robert Gamble:

Extracting security control requirements. 44 - Young Hee Park, Douglas S. Reeves, Vikram Mulukutla, Balaji Sundaravel:

Fast malware classification by automated behavioral graph matching. 45 - Clive Blackwell:

A security ontology for incident analysis. 46 - Kenton Born, David Gustafson:

NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis. 47 - Ossama Toutonji, Seong-Moo Yoo, Moongyu Park:

Propagation modeling and analysis of network worm attack. 48 - Uta Ziegler, Youssif B. Al-Nashif, Salim Hariri:

Plug & execute framework for network traffic generation. 49 - Livio Ricciulli:

A service model for network security applications. 50 - Rajeshwar Katipally, Wade Gasior, Xiaohui Cui, Li Yang:

Multistage attack detection system for network administrators using data mining. 51 - Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:

The privacy implications of stateless IPv6 addressing. 52 - Owen McCusker, Benjamin Gittins, Joel Glanfield, Scott Brunza, Stephen Brooks:

The need to consider both object identity and behavior in establishing the trustworthiness of network devices within a Smart Grid. 53 - Wonjun Lee, Anna Cinzia Squicciarini

, Elisa Bertino:
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey. 54
Privacy and metrics
- Anis Ben Aissa

, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Modeling stakeholder/value dependency through mean failure cost. 55 - Timothy Casey, Patrick Koeberl, Claire Vishik:

Threat agents: a necessary component of threat analysis. 56 - Ryan Craven, Christopher Abbott, Harikrishnan Bhanu, Juan Deng, Richard R. Brooks

:
Orwell was an optimist. 57
Enterprise
- Anoop Singhal, Duminda Wijesekera:

Ontologies for modeling enterprise level security metrics. 58 - Richard R. Brooks

, Juan Deng:
Lies and the lying liars that tell them: a fair and balanced look at TLS. 59 - Benjamin Gittins:

Overview of SLL's proposal in response to NIST's call for new global IdM/CKM designs without public keys. 60 - Thomas M. Overman, Terry Davis, Ronald W. Sackman:

High assurance smart grid. 61 - Mahadevan Gomathisankaran, Gayatri Mehta, Kamesh Namuduri

:
Power, performance and security optimized hardware design for H.264. 62 - Robert Baird, Rose F. Gamble:

Reasoning about policy noncompliance. 63
Survivability
- Karthikeyan Manivannan, Christian Wimmer, Michael Franz:

Decentralized information flow control on a bare-metal JVM. 64 - Jack Harris, Raquel L. Hill:

Building a trusted image for embedded systems. 65 - Christopher S. Oehmen

, Elena S. Peterson, Scott Dowson:
An organic model for detecting cyber-events. 66
Formal methods
- John P. McDermott, Leo Freitas:

Using formal methods for security in the Xenon project. 67 - Daniel J. Quinlan, Cory Cohen:

Discovery of C++ data structures from binaries. 68 - Josef D. Allen, Xiuwen Liu, Liam M. Mayron, Washington Mio:

On generalization of performance of classifiers for steganalysis. 69
Trust
- Said Marouf, Doan Minh Phuong, Mohamed Shehab

:
A learning-based approach for SELinux policy optimization with type mining. 70 - Matthew K. Wright

, Apu Kapadia, Mohan Kumar, Apurv Dhadphale:
ReDS: reputation for directory services in P2P systems. 71 - Brent Lagesse

, Mohan Kumar, Svetha Venkatesh
, Mihai M. Lazarescu
:
Augmenting trust establishment in dynamic systems with social networks. 72
Posters
- Anis Ben Aissa

, Robert K. Abercrombie
, Frederick T. Sheldon
, Ali Mili:
Software requirements for a system to compute mean failure cost. 73 - Joseph R. Erskine, Gilbert L. Peterson

, Barry E. Mullins, Michael R. Grimaila:
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining. 74 - Ezequiel Gutesman, Ariel Waissbein:

The impact of predicting attacker tools in security risk assessments. 75 - Tacksoo Im, John D. McGregor:

Evaluating confidence levels for security scenarios in attribute architectures. 76 - Andrew J. Kornecki, Janusz Zalewski:

Safety and security in industrial control. 77 - Michael Losavio, J. Eagle Shutt, Deborah W. Keeling:

Positing social and justice models for cyber security. 78 - Takeshi Takahashi

, Hiroyuki Fujiwara, Youki Kadobayashi:
Building ontology of cybersecurity operational information. 79 - Claire Vishik, Giusella Finocchiaro:

Degrees of anonymity in today's computing environments: decomposing complex processes for anonymity analysis. 80 - Qian Wei, Jingsha He

, Xing Zhang:
Behavioral model for secure group communication in wireless mesh networks. 81 - Haricharan Rengamani, Shambhu J. Upadhyaya, H. Raghav Rao, Ponnurangam Kumaraguru:

Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective. 82 - Dipankar Dasgupta, Harkeerat Bedi, Deon Garrett:

A conceptual model of self-monitoring multi-core systems. 83 - Kaliappa Ravindran:

Managing Robustness of Distributed Applications Under Uncertainties: An Information Assurance Perspective.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














