default search action
12th CISRC 2017: Oak Ridge, TN, USA
- Joseph P. Trien, Stacy J. Prowell, John R. Goodall, Justin M. Beaver, Robert A. Bridges:
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, CISRC 2017, Oak Ridge, TN, USA, April 4 - 6, 2017. ACM 2017, ISBN 978-1-4503-4855-3 - Ahmed O. Aseeri, Nuttapong Netjinda, Rattikorn Hewett:
Alleviating eavesdropping attacks in software-defined networking data plane. 1:1-1:8 - Anna L. Buczak, Daniel S. Berman, Sean W. Yen, Lanier A. Watkins, Lien T. Duong, Jeffrey S. Chavis:
Using sequential pattern mining for common event format (CEF) cyber data. 2:1-2:4 - Micah Bushouse, Sanghyun Ahn, Douglas S. Reeves:
Arav: monitoring a cloud's virtual routers. 3:1-3:8 - Lahiru S. Gallege, Rajeev R. Raje:
Parallel methods for evidence and trust based selection and recommendation of software apps from online marketplaces. 4:1-4:8 - Maheedhar Gunasekharan, Samik Basu, Ganesh Ram Santhanam:
Selecting the minimal set of preferred responses to counter detected intrusions. 5:1-5:8 - Russell Harkanson, Yoohwan Kim:
Applications of elliptic curve cryptography: a light introduction to elliptic curves and a survey of their applications. 6:1-6:7 - Zachary Hill, Samuel Chen, Donald Wall, Mauricio Papa, John Hale, Peter J. Hawrylak:
Simulation and analysis framework for cyber-physical systems. 7:1-7:4 - Kelly M. T. Huffer, Joel W. Reed:
Situational awareness of network system roles (SANSR). 8:1-8:4 - Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, Ye Zhu:
Multi-asymmetric cryptographic RSA scheme. 9:1-9:8 - Brendan Mattina, Franki Yeung, Alex Hsu, Dale Savoy, Joseph G. Tront, David R. Raymond:
MARCS: mobile augmented reality for cybersecurity. 10:1-10:4 - Michael Roy Moore, Robert A. Bridges, Frank L. Combs, Michael S. Starr, Stacy J. Prowell:
Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection. 11:1-11:4 - Will Nichols, Peter J. Hawrylak, John Hale, Mauricio Papa:
Introducing priority into hybrid attack graphs. 12:1-12:4 - Ahmet Okutan, Shanchieh Jay Yang, Katie McConky:
Predicting cyber attacks with bayesian networks using unconventional signals. 13:1-13:4 - Amar A. Rasheed, A. Kenneth, Rabi N. Mahapatra, Deepak Puthal:
Private matching and set intersection computation in multi-agent and industrial control systems. 14:1-14:6 - Christopher A. Rouff, M. Douglas Williams, Qinqing Zhang, Daniel J. Bennett, Raymond C. McDowell, Anthony R. Nowicki, J. Aaron Pendergrass, Daniel R. Anderson, Robert Douglass, Bradley T. Dufresne, Jonathan T. Pham:
Automatic generation of network element software (AGNES): short paper. 15:1-15:4 - Himanshu Thapliyal, T. S. S. Varun, S. Dinesh Kumar:
UTB-SOI based adiabatic computing for low-power and secure IoT devices. 16:1-16:4 - Jagannadh Vempati, Mark A. Thompson, Ram Dantu:
Feedback control for resiliency in face of an attack. 17:1-17:7 - Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Time series forecasting of cyber attack intensity. 18:1-18:3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.