default search action
4th CSIIRW 2008: Oak Ridge, TN, USA
- Frederick T. Sheldon, Axel W. Krings, Robert K. Abercrombie, Ali Mili:
Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Oak Ridge, Tennessee, USA, May 12-14, 2008. ACM 2008, ISBN 978-1-60558-098-2
Plenary session
- Richard M. (Dick) Kemmerer:
Electronic voting systems: are your votes really counted. 1:1 - Patrick Arnold:
End to end trust. 2:1 - Steve Lines:
Best practices on information sharing of threats and warnings between the USG and industry. 3:1 - Michael Franz:
Eliminating the insider threat in software development by combining parallelism, randomization and checkpointing. 4:1 - Mike McDuffie:
Computing and the future. 5:1 - Brian Witten:
Internet security threat landscape: current changes in targets & methods. 6:1 - Jeffrey M. Voas:
Thirteen rules for trust. 7:1
Track: formal methods
- Baishakhi Ray, Shivakant Mishra:
Secure and reliable covert channel. 8:1-8:3 - Daniel Bilar:
Noisy defenses: subverting malware's OODA loop. 9:1-9:3 - Riham Hassan, Shawn A. Bohner, Sherif El-Kassas:
Formal derivation of security design specifications from security requirements. 10:1-10:3 - Phillip G. Bradford, Daniel A. Ray:
Semantics for a domain-specific language for the digital forensics domain. 11:1-11:3 - Axel Krings:
Design for survivability: a tradeoff space. 12:1-12:4 - Yomna Ali, Sherif El-Kassas:
A rigorous methodology for security architecture modeling and verification. 13:1-13:3
Track: intrusion detection/insider threat
- Joseph P. Trien, Robert K. Abercrombie, Frederick T. Sheldon:
4th annual cyber security and information intelligence research workshop. 14:1-14:5 - Matt Bishop, Carrie Gates:
Defining the insider threat. 15:1-15:3 - Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal:
Detecting sensitive data exfiltration by an insider attack. 16:1-16:3 - Françoise Sailhan, Julien Bourgeois:
Log-based distributed intrusion detection for hybrid networks. 17:1-17:3 - Jianyong Dai, Ratan Guha, Joohan Lee:
Dynamic instruction sequences monitor for virus detection. 18:1-18:3 - Wenbing Zhao:
Towards practical intrusion tolerant systems: a blueprint. 19:1-19:3 - Stefano Zanero:
ULISSE, a network intrusion detection system. 20:1-20:4 - Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Real-world polymorphic attack detection using network-level emulation. 21:1-21:3
Track: next generation security
- Bob G. Schlicher:
Emergence of cyber anti-forensics impacting cyber security. 22:1-22:12 - Brian L. Sharp, Gregory D. Peterson, Lok-Kwong Yan:
Extending hardware based mandatory access controls for memory to multicore architectures. 23:1-23:3 - Victor Yodaiken, Cort Dougan:
Active semantically aware hard real-time security hypervisors. 24:1-24:3 - Victor Raskin, Brian Buck, Arthur Keen, Christian F. Hempelmann, Katrina E. Triezenberg:
Accessing and manipulating meaning of textual and data information for information assurance and security and intelligence information. 25:1-25:3 - R. R. Brooks, S. Sander, J. Deng, Joachim Taiber:
Automotive system security: challenges and state-of-the-art. 26:1-26:3 - Ryan S. Bennink:
Quantum information: opportunities and challenges or "What's this quantum stuff and what does it have to do with cyber security?". 27:1 - Liangliang Xiao, I-Ling Yen, Farokh B. Bastani:
Security in a peer-to-peer data grid storage system. 28:1-28:3 - Elisa Bertino, Wonjun Lee, Anna Cinzia Squicciarini, Bhavani Thuraisingham:
End-to-end accountability in grid computing systems for coalition information sharing. 29:1-29:3 - Ulf E. Larson, Dennis K. Nilsson:
Securing vehicles against cyber attacks. 30:1-30:3
Track: security frameworks
- John M. Abeles:
Abstract for NIST PRISMA enhancement. 31:1-31:3 - Michael R. Grimaila, Robert F. Mills, Larry W. Fortson:
Improving the cyber incident mission impact assessment (CIMIA) process. 32:1-32:2 - Robert A. Martin, Sean Barnum:
Creating the secure software testing target list. 33:1-33:2 - Benjamin Arazi:
Mobile components security. 34:1-34:2 - Clive Blackwell:
A multi-layered security architecture for modelling complex systems. 35:1-35:4
Track: learning/optimization
- Thomas J. Sapienza:
Optimizing quality of service of wireless mobile ad-hoc networks using evolutionary computation. 36:1-36:5 - Franklin Webber, Partha P. Pal, Paul Rubel, Michael Atighetchi:
An abstract interface for cyber-defense mechanisms. 37:1-37:3 - Geoffrey Mazeroff:
Markov models for application behavior analysis. 38:1-38:2 - Mohammad M. Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham:
Peer to peer botnet detection for cyber-security: a data mining approach. 39:1-39:2 - Karen Zita Haigh, Steven A. Harp:
Improving self defense by learning from limited experience. 40:1-40:4
Track: metrics
- Frederick T. Sheldon, Robert K. Abercrombie, Ali Mili:
Evaluating security controls based on key performance indicators and stakeholder mission. 41:1-41:11 - Ehab Al-Shaer, Latifur Khan, Mohammad Salim Ahmed:
A comprehensive objective network security metric framework for proactive security configuration. 42:1-42:3 - Chee-Wooi Ten, Chen-Ching Liu, Manimaran Govindarasu:
Cyber-vulnerability of power grid monitoring and control systems. 43:1-43:3 - Ju An Wang, Fengwei Zhang, Min Xia:
Temporal metrics for software vulnerabilities. 44:1-44:3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.