default search action
5th CSIIRW 2009: Oak Ridge, TN, USA
- Frederick T. Sheldon, Greg Peterson, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Fifth Cyber Security and Information Intelligence Research Workshop, CSIIRW '09, Knoxville, TN, USA, April 13-15, 2009. ACM 2009, ISBN 978-1-60558-518-5
Plenary sessions
- Nabil R. Adam:
Cyber-physical systems security. 1 - Sajal K. Das:
Pervasively secured infrastructures: a multi-layer mathematical framework. 2 - Mike Hinchey:
We can't get there from here!: the paradox of developing new classes of complex systems. 3 - George Hull:
Security and complexity...are we on the wrong road? 4 - Carlton Pu, John P. Imlay Jr.:
Spam and denial of information attacks and defenses. 5 - Doug Maughan:
National cyber security research assessment and roadmap. 6 - Salvatore J. Stolfo:
Polymorphic shellcode: the demise of signature-based detection. 7 - Robert J. Stratton III:
Internet security threat landscape: scaling to meet the threat. 8 - Bhavani Thuraisingham:
Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. 9
Panel discussions
- Doug Maughan, George Hull, Salvatore J. Stolfo, Robert J. Stratton III:
Keynote panel. 10 - John McHugh, Robert C. Armstrong, Thomas A. Longstaff, Daniel Quinlan, Frederick T. Sheldon, Deborah A. Frincke:
DOE grass roots panel. 11
Track 1
- Munawar Hafiz, Ralph E. Johnson:
Security-oriented program transformations. 12 - Ting Yu, Dhivya Sivasubramanian, Tao Xie:
Security policy testing via automated program code generation. 13 - John McHugh:
Long term data storage issues for situational awareness. 14 - Ju An Wang, Minzhe Guo, Hao Wang, Min Xia, Linfeng Zhou:
Ontology-based security assessment for software products. 15 - Kyungsoo Im, John D. McGregor:
Debugging support for security properties of software architectures. 16 - Eduardo B. Fernández, Jie Wu, María M. Larrondo-Petrie, Yifeng Shao:
On building secure SCADA systems using security patterns. 17 - Giorgia Lodi, Leonardo Querzoni, Roberto Baldoni, Mirco Marchetti, Michele Colajanni, Vita Bortnikov, Gregory V. Chockler, Eliezer Dekel, Gennady Laventman, Alexey Roytman:
Defending financial infrastructures through early warning systems: the intelligence cloud approach. 18 - Jiang Bian, Remzi Seker, Srini Ramaswamy:
JigDFS in container communities for international cargo security. 19 - Richard Gesick, Caner Saritac, Chih-Cheng Hung:
Automatic image analysis process for the detection of concealed weapons. 20
Track 2
- Marco Carvalho:
A distributed reinforcement learning approach to mission survivability in tactical MANETs. 21 - Brian A. Malloy, Murali Sitaraman, Jason O. Hallstrom:
Detecting overflow vulnerabilities using automated verification. 22 - Axel W. Krings, Li Tan, Clinton Jeffery, Robert Rinker:
Resilient multi-core systems: a hierarchical formal model for N-variant executions. 23 - S. Srinivasan:
Privacy-aware security applications using RFID technology. 24 - Anoop Singhal, Xinming Ou:
Techniques for enterprise network security metrics. 25 - Anis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Quantifying security threats and their impact. 26 - Harkeerat Bedi, Li Yang, Joseph M. Kizza:
Fair electronic exchange using biometrics. 27 - Zhanshan (Sam) Ma, Axel W. Krings, Frederick T. Sheldon:
An outline of the three-layer survivability analysis architecture for strategic information warfare research. 28 - Daniel Wyschogrod, Jeffrey Dezso:
Using automatic signature generation as a sensor backend. 29
Track 3
- Philip C. Ritchey, Jorge R. Ramos, Vernon Rego:
A framework for synthetic stego. 30 - Robert C. Armstrong, Jackson R. Mayo:
Leveraging complexity in software for cybersecurity. 31 - Chin-Tser Huang, John Gerdes Jr.:
Privacy-preserving multi-dimensional credentialing using veiled certificates. 32 - Mark Hartong, Rajni Goel, Duminda Wijesekera:
Meta-models for misuse cases. 33 - Ju An Wang, Minzhe Guo:
OVM: an ontology for vulnerability management. 34 - Asesh Das, Y. V. Ramana Reddy, Luyi Wang, Sumitra Reddy:
Information intelligence in cloud computing: how can Vijjana, a collaborative, self-organizing, domain centric knowledge network model help. 35 - Richard C. Linger, Stacy J. Prowell, Kirk Sayre:
Computing the behavior of malicious code with function extraction technology. 36 - Ambareen Siraj:
Data fusion for improved situational understanding. 37 - Kamesh Namuduri:
An active trust model based on zero knowledge proofs for airborne networks. 38
Track 4
- Wonjun Lee, Anna Cinzia Squicciarini, Elisa Bertino:
An assessment of accountability policies for large-scale distributed computing systems. 39 - Daniel J. Quinlan, Thomas Panas:
Source code and binary analysis of software defects. 40 - Dipankar Dasgupta, Sudip Saha:
A biologically inspired password authentication system. 41 - Edward Ray, Eugene Schultz:
Virtualization security. 42 - Marianne Winslett, Adam J. Lee, Kenneth J. Perano:
Trust negotiation: authorization for virtual organizations. 43
Track 5
- William Eberle, Lawrence B. Holder:
Graph-based approaches to insider threat detection. 44 - Clive Blackwell:
A security architecture to protect against the insider threat from damage, fraud and theft. 45 - Yi Hu, Brajendra Panda:
A traceability link mining approach for identifying insider threats. 46 - Qishi Wu, Denise Ferebee, Yunyue Lin, Dipankar Dasgupta:
Monitoring security events using integrated correlation-based techniques. 47 - Alper K. Caglayan, Mike Toothaker, Dan Drapeau, Dustin Burke, Gerry Eaton:
Behavioral analysis of fast flux service networks. 48
Track 6
- Charles N. Payne Jr., Richard C. O'Brien, J. Thomas Haigh:
The case for prevention-based, host-resident defenses in the modern PCS network. 49 - Francesca Merighi, Stefano Ravaioli:
u-Vote: a convenient on-line e-voting system. 50 - Steve McKinney, Douglas S. Reeves:
User identification via process profiling: extended abstract. 51 - Darrell M. Kienzle, Ryan Persaud, Matthew C. Elder:
External monitoring of endpoint configuration compliance. 52 - Gregory Vert, S. S. Iyengar, Vir V. Phoha:
Security models for contextual based global processing an architecture and overview. 53
Track 7
- Justin Myers, Michael R. Grimaila, Robert F. Mills:
Towards insider threat detection using web server logs. 54 - Miron Abramovici, Paul Bradley:
Integrated circuit security: new threats and solutions. 55 - Jianyong Dai, Ratan K. Guha, Joohan Lee:
Feature set selection in data mining techniques for unknown virus detection: a comparison study. 56 - Suvrojit Das, Arijit Chattopadhayay, Dipesh Kumar Kalyani, Monojit Saha:
File-system intrusion detection by preserving MAC DTS: a loadable kernel module based approach for LINUX kernel 2.6.x. 57 - Christopher T. Rathgeb, Gregory D. Peterson:
Secure processing using dynamic partial reconfiguration. 58 - Monty McDougal:
Castle warrior: redefining 21st century network defense. 59 - Levent Erkök, John Matthews:
High assurance programming in Cryptol. 60 - Russell Cameron Thomas:
Total cost of security: a method for managing risks and incentives across the extended enterprise. 61
Track 8
- Li Yang, Alma Cemerlic:
Integrating Dirichlet reputation into usage control. 62 - Zhanshan (Sam) Ma, Axel W. Krings, Richard C. Millar:
Introduction of first passage time (FPT) analysis for software reliability and network security. 63 - Jose Romero-Mariona, Hadar Ziv, Debra J. Richardson, Dennis Bystritsky:
Towards usable cyber security requirements. 64 - Erik M. Ferragut:
A dynamic erasure code for multicasting live data. 65 - Philip Tricca:
A pipeline development toolkit in support of secure information flow goals. 66 - George Louthan, Brady Deetz, Matthew Walker, John Hale:
Content-based alternatives to conventional network monitoring systems. 67 - Nathan D. Kalka, Nick Bartlow, Bojan Cukic:
Decision dependability and its application to identity management. 68 - Stefan Fenz, Thomas Neubauer:
How to determine threat probabilities using ontologies and Bayesian networks. 69
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.