default search action
10. CISR 2015: Oak Ridge, TN, USA
- Joseph P. Trien, Stacy J. Prowell, Robert A. Bridges, John R. Goodall:
Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015. ACM 2015, ISBN 978-1-4503-3345-0 - Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. 1:1-1:8 - Ryan Grandgenett, William R. Mahoney, Robin A. Gandhi:
Authentication Bypass and Remote Escalated I/O Command Attacks. 2:1-2:7 - Xingsi Zhong, Paranietharan Arunagirinathan, Afshin Ahmadi, Richard R. Brooks, Ganesh Kumar Venayagamoorthy:
Side-Channels in Electric Power Synchrophasor Network Data Traffic. 3:1-3:8 - Dan Du, Lu Yu, Richard R. Brooks:
Semantic Similarity Detection For Data Leak Prevention. 4:1-4:6 - Suzanna Schmeelk, Junfeng Yang, Alfred V. Aho:
Android Malware Static Analysis Techniques. 5:1-5:8 - Zoleikha Abdollahi Biron, Pierluigi Pisu, Baisravan HomChaudhuri:
Observer Design Based Cyber Security for Cyber Physical Systems. 6:1-6:6 - Hani Alturkostani, Anup Chitrakar, Robert Rinker, Axel W. Krings:
On the Design of Jamming-Aware Safety Applications in VANETs. 7:1-7:8 - Jaewon Yang, Xiuwen Liu, Shamik Bose:
Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems. 8:1-8:4 - Yu Fu, Benafsh Husain, Richard R. Brooks:
Analysis of Botnet Counter-Counter-Measures. 9:1-9:4 - Lu Yu, Juan Deng, Richard R. Brooks, SeokBae Yun:
Automobile ECU Design to Avoid Data Tampering. 10:1-10:4 - Corinne L. Jones, Robert A. Bridges, Kelly M. T. Huffer, John R. Goodall:
Towards a Relation Extraction Framework for Cyber-Security Concepts. 11:1-11:4 - Michael D. Iannacone, Shawn Bohn, Grant Nakamura, John Gerth, Kelly M. T. Huffer, Robert A. Bridges, Erik M. Ferragut, John R. Goodall:
Developing an Ontology for Cyber Security Knowledge Graphs. 12:1-12:4 - Jarilyn M. Hernández, Aaron E. Ferber, Stacy J. Prowell, Lee M. Hively:
Phase-Space Detection of Cyber Events. 13:1-13:4 - Susan M. Bridges, Ken Keiser, Nathan Sissom, Sara J. Graves:
Cyber Security for Additive Manufacturing. 14:1-14:3 - Mark G. Pleszkoch, Rick Linger:
Controlling Combinatorial Complexity in Software and Malware Behavior Computation. 15:1-15:4 - Christopher Robinson-Mallett, Sebastian Hansack:
A Model of an Automotive Security Concept Phase. 16:1-16:4 - Mohammad Ashraf Hossain Sadi, Mohd. Hassan Ali, Dipankar Dasgupta, Robert K. Abercrombie:
OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid. 17:1-17:4 - Robert K. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher:
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems. 18:1-18:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.