default search action
HotSoS 2018: Raleigh, NC, USA
- Munindar P. Singh, Laurie A. Williams, Rick Kuhn, Tao Xie:
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018. ACM 2018 - Pooria Madani, Natalija Vlajic:
Robustness of deep autoencoder in intrusion detection under adversarial contamination. 1:1-1:8 - Inger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela S. Cruzes:
Understanding challenges to adoption of the Microsoft elevation of privilege game. 2:1-2:10 - Ira Ray Jenkins, Sergey Bratus, Sean W. Smith, Maxwell Koo:
Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs. 3:1-3:9 - Yao Dong, Ana L. Milanova, Julian Dolby:
SecureMR: secure mapreduce computation using homomorphic encryption and program partitioning. 4:1-4:13 - Bradley Potteiger, Zhenkai Zhang, Xenofon D. Koutsoukos:
Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems. 5:1-5:10 - Iness Ben Guirat, Harry Halpin:
Formal verification of the W3C web authentication protocol. 6:1-6:10 - Martha McNeil, Thomas Llansó, Dallas Pearson:
Application of capability-based cyber risk assessment methodology to a space system. 7:1-7:10 - Daniela S. Cruzes, Martin Gilje Jaatun, Tosin Daniel Oyetoyan:
Challenges and approaches of performing canonical action research in software security: research paper. 8:1-8:11 - Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of firewalls and DMZs. 9:1-9:11 - Dimitris E. Simos, Rick Kuhn, Yu Lei, Raghu Kacker:
Combinatorial security testing course. 10:1-10:3 - Erkang Zheng, Phil Gates-Idem, Matt Lavin:
Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software delivery. 11:1-11:8 - Leslie Leonard, William Glodek:
HACSAW: a trusted framework for cyber situational awareness. 12:1 - Sarah Elder, Anna Mattapallil, Laurie A. Williams:
A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER. 13:1 - Lindsey McGowen, Angela Stoica:
An expert-based bibliometric for a science of security: poster. 14:1-14:2 - Katharine Ahrens:
Cryptography in a post-quantum world: poster. 15:1 - Uttam Thakore, Ahmed M. Fawaz, William H. Sanders:
Detecting monitor compromise using evidential reasoning: poster. 16:1 - Nirav Ajmeri, Hui Guo, Pradeep K. Murukannaiah, Munindar P. Singh:
Ethics, values, and personal agents: poster. 17:1 - Andrés Alejos, Matthew Ball, Connor Eckert, Michael Ma, Hayden Ward, Peter Hanlon, Suzanne J. Matthews:
Exploring the raspberry Pi for data summarization in wireless sensor networks: poster. 18:1 - Muhammad Umer Tariq, Marilyn Wolf:
Hourglass-shaped architecture for model-based development of safe and secure cyber-physical systems: poster. 19:1 - Christopher Theisen, Laurie A. Williams:
How bad is it, really? an analysis of severity scores for vulnerabilities: poster. 20:1 - Key-whan Chung, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster. 21:1 - Spencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Antoine Davis, Madison Stark, Caleb Clay, Jason Hussey, Nicholas Barry, Aaron St. Leger, Suzanne J. Matthews:
Integrating historical and real-time anomaly detection to create a more resilient smart grid architecture: poster. 22:1 - Nikolay Shopov, Mingu Jeong, Evin Rude, Brennan Neseralla, Scott Hutchison, Alexander S. Mentis, Suzanne J. Matthews:
Investigating tensorflow for airport facial identification: poster. 23:1 - Huashan Chen, Jin-Hee Cho, Shouhuai Xu:
Quantifying the security effectiveness of network diversity: poster. 24:1 - Ryan Wagner, David Garlan, Matt Fredrikson:
Quantitative underpinnings of secure, graceful degradation: poster. 25:1 - Daniel G. Wolf, Donald L. Goff:
A ransomware research framework: poster. 26:1-26:2 - Hui Guo, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh:
Toward extraction of security requirements from text: poster. 27:1 - Jayati Dev, Sanchari Das, L. Jean Camp:
Understanding privacy concerns of whatsapp users in India: poster. 28:1 - Darya Melicher, Yangqingwei Shi, Valerie Zhao, Alex Potanin, Jonathan Aldrich:
Using object capabilities and effects to build an authority-safe module system: poster. 29:1 - Rick Kuhn, M. S. Raunak, Raghu Kacker:
What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster. 30:1
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.