


default search action
HotSoS 2018: Raleigh, NC, USA
- Munindar P. Singh, Laurie A. Williams, Rick Kuhn, Tao Xie:

Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018. ACM 2018 - Pooria Madani

, Natalija Vlajic:
Robustness of deep autoencoder in intrusion detection under adversarial contamination. 1:1-1:8 - Inger Anne Tøndel, Tosin Daniel Oyetoyan, Martin Gilje Jaatun, Daniela S. Cruzes:

Understanding challenges to adoption of the Microsoft elevation of privilege game. 2:1-2:10 - Ira Ray Jenkins, Sergey Bratus, Sean W. Smith, Maxwell Koo:

Reinventing the privilege drop: how principled preservation of programmer intent would prevent security bugs. 3:1-3:9 - Yao Dong, Ana L. Milanova, Julian Dolby:

SecureMR: secure mapreduce computation using homomorphic encryption and program partitioning. 4:1-4:13 - Bradley Potteiger

, Zhenkai Zhang
, Xenofon D. Koutsoukos:
Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems. 5:1-5:10 - Iness Ben Guirat

, Harry Halpin:
Formal verification of the W3C web authentication protocol. 6:1-6:10 - Martha McNeil, Thomas Llansó, Dallas Pearson:

Application of capability-based cyber risk assessment methodology to a space system. 7:1-7:10 - Daniela S. Cruzes, Martin Gilje Jaatun, Tosin Daniel Oyetoyan:

Challenges and approaches of performing canonical action research in software security: research paper. 8:1-8:11 - Huashan Chen, Jin-Hee Cho, Shouhuai Xu:

Quantifying the security effectiveness of firewalls and DMZs. 9:1-9:11 - Dimitris E. Simos, Rick Kuhn, Yu Lei, Raghu Kacker:

Combinatorial security testing course. 10:1-10:3 - Erkang Zheng, Phil Gates-Idem, Matt Lavin:

Building a virtually air-gapped secure environment in AWS: with principles of devops security program and secure software delivery. 11:1-11:8 - Leslie Leonard, William Glodek:

HACSAW: a trusted framework for cyber situational awareness. 12:1 - Sarah Elder, Anna Mattapallil, Laurie A. Williams:

A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER. 13:1 - Lindsey McGowen, Angela Stoica:

An expert-based bibliometric for a science of security: poster. 14:1-14:2 - Katharine Ahrens:

Cryptography in a post-quantum world: poster. 15:1 - Uttam Thakore, Ahmed M. Fawaz, William H. Sanders:

Detecting monitor compromise using evidential reasoning: poster. 16:1 - Nirav Ajmeri

, Hui Guo
, Pradeep K. Murukannaiah, Munindar P. Singh:
Ethics, values, and personal agents: poster. 17:1 - Andrés Alejos, Matthew Ball, Connor Eckert, Michael Ma, Hayden Ward, Peter Hanlon, Suzanne J. Matthews

:
Exploring the raspberry Pi for data summarization in wireless sensor networks: poster. 18:1 - Muhammad Umer Tariq, Marilyn Wolf:

Hourglass-shaped architecture for model-based development of safe and secure cyber-physical systems: poster. 19:1 - Christopher Theisen, Laurie A. Williams:

How bad is it, really? an analysis of severity scores for vulnerabilities: poster. 20:1 - Key-whan Chung

, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster. 21:1 - Spencer Drakontaidis, Michael Stanchi, Gabriel Glazer, Antoine Davis, Madison Stark, Caleb Clay, Jason Hussey, Nicholas Barry, Aaron St. Leger, Suzanne J. Matthews

:
Integrating historical and real-time anomaly detection to create a more resilient smart grid architecture: poster. 22:1 - Nikolay Shopov, Mingu Jeong, Evin Rude, Brennan Neseralla, Scott Hutchison, Alexander S. Mentis, Suzanne J. Matthews

:
Investigating tensorflow for airport facial identification: poster. 23:1 - Huashan Chen, Jin-Hee Cho, Shouhuai Xu:

Quantifying the security effectiveness of network diversity: poster. 24:1 - Ryan Wagner, David Garlan, Matt Fredrikson

:
Quantitative underpinnings of secure, graceful degradation: poster. 25:1 - Daniel G. Wolf, Donald L. Goff:

A ransomware research framework: poster. 26:1-26:2 - Hui Guo

, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh:
Toward extraction of security requirements from text: poster. 27:1 - Jayati Dev, Sanchari Das, L. Jean Camp:

Understanding privacy concerns of whatsapp users in India: poster. 28:1 - Darya Melicher, Yangqingwei Shi, Valerie Zhao, Alex Potanin

, Jonathan Aldrich
:
Using object capabilities and effects to build an authority-safe module system: poster. 29:1 - Rick Kuhn, M. S. Raunak, Raghu Kacker:

What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster. 30:1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














