default search action
HotSoS 2019: Nashville, TN, USA
- Xenofon D. Koutsoukos, Alvaro A. Cárdenas, Ehab Al-Shaer:
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019. ACM 2019, ISBN 978-1-4503-7147-6 - Avesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A. Gunter:
BEEER: distributed record and replay for medical devices in hospital operating rooms. 1:1-1:10 - Suresh K. Damodaran, Paul D. Rowe:
Limitations on observability of effects in cyber-physical systems. 2:1-2:10 - Bradley Potteiger, Zhenkai Zhang, Xenofon D. Koutsoukos:
Integrated data space randomization and control reconfiguration for securing cyber-physical systems. 3:1-3:10 - Kimberly Ferguson-Walter, Sunny Fugate, Justin Mauger, Maxine Major:
Game theory for adaptive defensive cyber deception. 4:1-4:8 - Sebastian Benthall:
Situated information flow theory. 5:1-5:10 - Adam Petz, Perry Alexander:
A copland attestation manager. 6:1-6:10 - Bernhard Garn, Dimitris E. Simos, Stefan Zauner, Rick Kuhn, Raghu Kacker:
Browser fingerprinting using combinatorial sequence testing. 7:1-7:9 - Quanyan Zhu:
Game theory for cyber deception: a tutorial. 8:1-8:3 - Akond Rahman, Laurie A. Williams:
A bird's eye view of knowledge needs related to penetration testing. 9:1-9:2 - Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A formal verification of mutation-based moving target defense. 10:1-10:2 - Jairo Giraldo, Alvaro A. Cárdenas:
A new metric to compare anomaly detection algorithms in cyber-physical systems. 11:1-11:2 - Nasif Imtiaz, Laurie A. Williams:
A synopsis of static analysis alerts on open source software. 12:1-12:3 - Md. Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, Mohammed Noraden Alsaleh:
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration. 13:1-13:3 - Ashutosh Dutta, Ehab Al-Shaer:
Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation. 14:1-14:2 - Himanshu Neema, Harsh Vardhan, Carlos A. Barreto, Xenofon D. Koutsoukos:
Design and simulation platform for evaluation of grid distribution system and transactive energy. 15:1-15:2 - Ryan Brunner, Sang-Keun Oh, Jesse Ramirez, Paul Houck, Nathaniel Stickney, Raymond W. Blaine:
Design for an educational cyber range. 16:1-16:2 - Brian H. Curtin, Rachelle H. David, Emmet D. Dunham, Cullen D. Johnson, Nikhil Shyamkumar, Thomas A. Babbitt, Suzanne J. Matthews:
Designing a Raspberry Pi sensor network for remote observation of wildlife. 17:1-17:2 - Daniel Andrews, Jennifer Behn, Danielle Jaksha, Jinwon Seo, Madeleine Schneider, James Yoon, Suzanne J. Matthews, Rajeev Agrawal, Alexander S. Mentis:
Exploring RNNs for analyzing Zeek HTTP data. 18:1-18:2 - Ghaith Husari, Ehab Al-Shaer, Bill Chu, Ruhani Faiheem Rahman:
Learning APT chains from cyber threat intelligence. 19:1-19:2 - Xingyu Zhou, Yi Li, Carlos A. Barreto, Péter Völgyesi, Xenofon D. Koutsoukos:
Load forecasting with adversarial attacks in power systems using DeepForge. 20:1-20:2 - Mohiuddin Ahmed, Ehab Al-Shaer:
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense. 21:1-21:3 - Bradley Potteiger, Hamzah Abdel-Aziz, Himanshu Neema, Xenofon D. Koutsoukos:
Simulation based evaluation of security and resilience in railway infrastructure. 22:1-22:2 - Xue Qin, Robert Neuhaus, Diego Gonzales, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Taming web views in the detection of Android privacy leaks. 23:1-23:2 - Ehsan Aghaei, Ehab Al-Shaer:
ThreatZoom: neural network for automated vulnerability mitigation. 24:1-24:3 - John Heaps, Xueling Zhang, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward a reliability measurement framework automated using deep learning. 25:1-25:2 - Francisco Pipa, John Symons:
Towards an understanding of resilience with complex networks. 26:1 - Key-whan Chung, Phuong Cao, Yuming Wu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers:
TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation. 27:1-27:2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.