


default search action
HotSoS 2019: Nashville, TN, USA
- Xenofon D. Koutsoukos, Alvaro A. Cárdenas, Ehab Al-Shaer:

Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019. ACM 2019, ISBN 978-1-4503-7147-6 - Avesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A. Gunter:

BEEER: distributed record and replay for medical devices in hospital operating rooms. 1:1-1:10 - Suresh K. Damodaran, Paul D. Rowe:

Limitations on observability of effects in cyber-physical systems. 2:1-2:10 - Bradley Potteiger

, Zhenkai Zhang
, Xenofon D. Koutsoukos:
Integrated data space randomization and control reconfiguration for securing cyber-physical systems. 3:1-3:10 - Kimberly Ferguson-Walter, Sunny Fugate

, Justin Mauger, Maxine Major:
Game theory for adaptive defensive cyber deception. 4:1-4:8 - Sebastian Benthall

:
Situated information flow theory. 5:1-5:10 - Adam Petz, Perry Alexander:

A copland attestation manager. 6:1-6:10 - Bernhard Garn, Dimitris E. Simos, Stefan Zauner, Rick Kuhn, Raghu Kacker:

Browser fingerprinting using combinatorial sequence testing. 7:1-7:9 - Quanyan Zhu:

Game theory for cyber deception: a tutorial. 8:1-8:3 - Akond Rahman

, Laurie A. Williams:
A bird's eye view of knowledge needs related to penetration testing. 9:1-9:2 - Muhammad Abdul Basit Ur Rahim

, Qi Duan, Ehab Al-Shaer:
A formal verification of mutation-based moving target defense. 10:1-10:2 - Jairo Giraldo, Alvaro A. Cárdenas

:
A new metric to compare anomaly detection algorithms in cyber-physical systems. 11:1-11:2 - Nasif Imtiaz, Laurie A. Williams:

A synopsis of static analysis alerts on open source software. 12:1-12:3 - Md. Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, Mohammed Noraden Alsaleh:

CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration. 13:1-13:3 - Ashutosh Dutta, Ehab Al-Shaer:

Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation. 14:1-14:2 - Himanshu Neema, Harsh Vardhan

, Carlos A. Barreto, Xenofon D. Koutsoukos:
Design and simulation platform for evaluation of grid distribution system and transactive energy. 15:1-15:2 - Ryan Brunner, Sang-Keun Oh, Jesse Ramirez, Paul Houck, Nathaniel Stickney, Raymond W. Blaine:

Design for an educational cyber range. 16:1-16:2 - Brian H. Curtin, Rachelle H. David, Emmet D. Dunham, Cullen D. Johnson, Nikhil Shyamkumar, Thomas A. Babbitt, Suzanne J. Matthews

:
Designing a Raspberry Pi sensor network for remote observation of wildlife. 17:1-17:2 - Daniel Andrews, Jennifer Behn, Danielle Jaksha, Jinwon Seo, Madeleine Schneider, James Yoon, Suzanne J. Matthews

, Rajeev Agrawal, Alexander S. Mentis:
Exploring RNNs for analyzing Zeek HTTP data. 18:1-18:2 - Ghaith Husari, Ehab Al-Shaer, Bill Chu, Ruhani Faiheem Rahman

:
Learning APT chains from cyber threat intelligence. 19:1-19:2 - Xingyu Zhou, Yi Li, Carlos A. Barreto, Péter Völgyesi, Xenofon D. Koutsoukos:

Load forecasting with adversarial attacks in power systems using DeepForge. 20:1-20:2 - Mohiuddin Ahmed

, Ehab Al-Shaer:
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense. 21:1-21:3 - Bradley Potteiger

, Hamzah Abdel-Aziz, Himanshu Neema, Xenofon D. Koutsoukos:
Simulation based evaluation of security and resilience in railway infrastructure. 22:1-22:2 - Xue Qin

, Robert Neuhaus, Diego Gonzales, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Taming web views in the detection of Android privacy leaks. 23:1-23:2 - Ehsan Aghaei, Ehab Al-Shaer:

ThreatZoom: neural network for automated vulnerability mitigation. 24:1-24:3 - John Heaps, Xueling Zhang, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:

Toward a reliability measurement framework automated using deep learning. 25:1-25:2 - Francisco Pipa, John Symons:

Towards an understanding of resilience with complex networks. 26:1 - Key-whan Chung

, Phuong Cao
, Yuming Wu, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers:
TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation. 27:1-27:2

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














