Directions in Security Metrics Research
More than 100 years ago, Lord Kelvin insightfully observed that measurement is vital to deep knowledge and understanding in physical science. During the last few decades, researchers have made various...
View ArticleThe Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords
Abstract Joseph Bonneau License: Creative Commons 2.5 read more
View ArticleA Global Perspective on Cyber Attacks
Kathleen M. Carley Ghita Mezzour License: Creative Commons 2.5
View Article13th Annual Workshop on the Economics of Information Security
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security and privacy, combining expertise from the fields of...
View Article2014 TCIPG Industry Workshop
The 2014 Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Workshop will be held November 12-13, 2014 at the University of Illinois at Urbana-Champaign, with a welcome reception on the...
View Article2014 Cool Careers in Cybersecurity for Girls Workshop
The Maryland Cybersecurity Center is excited to partner with the National CyberWatch Center K-12 Division to host the Annual Cool Careers in Cyber Security Workshop for Girls. Throughout the day,...
View ArticleArchitecture-based Self-protection: Composing and Reasoning About...
Schmerl, Bradley, Cámara, Javier, Gennari, Jeffrey, Garlan, David, Casanova, Paulo, Moreno, Gabriel A., Glazier, Thomas J., Barnes, Jeffrey M.. 2014. Architecture-based Self-protection: Composing and...
View ArticleLog Your CRUD: Design Principles for Software Logging Mechanisms
King, Jason, Williams, Laurie. 2014. Log Your CRUD: Design Principles for Software Logging Mechanisms. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :5:1–5:10.
View ArticleA New Approach to Modeling and Analyzing Security of Networked Systems
Da, Gaofeng, Xu, Maochao, Xu, Shouhuai. 2014. A New Approach to Modeling and Analyzing Security of Networked Systems. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security....
View ArticleLess is More?: Investigating the Role of Examples in Security Studies Using...
Rao, Ashwini, Hibshi, Hanan, Breaux, Travis, Lehker, Jean-Michel, Niu, Jianwei. 2014. Less is More?: Investigating the Role of Examples in Security Studies Using Analogical TransferProceedings of the...
View ArticleEmergent Behavior in Cybersecurity
Xu, Shouhuai. 2014. Emergent Behavior in Cybersecurity. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :13:1–13:2.
View ArticleCybersecurity Dynamics
Xu, Shouhuai. 2014. Cybersecurity Dynamics. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :14:1–14:2.
View ArticleInViz: Instant Visualization of Security Attacks
Layman, Lucas, Zazworka, Nico. 2014. InViz: Instant Visualization of Security Attacks. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :15:1–15:2.
View ArticleAn Analysis Method for Medical Device Security
Ray, Arnab, Cleaveland, Rance. 2014. An Analysis Method for Medical Device Security. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :16:1–16:2.
View ArticlePreemptive Intrusion Detection
Cao, Phuong, Chung, Key-whan, Kalbarczyk, Zbigniew, Iyer, Ravishankar, Slagell, Adam J.. 2014. Preemptive Intrusion Detection. Proceedings of the 2014 Symposium and Bootcamp on the Science of...
View ArticlePersonalized Password Guessing: A New Security Threat
Cao, Phuong, Li, Hongyang, Nahrstedt, Klara, Kalbarczyk, Zbigniew, Iyer, Ravishankar, Slagell, Adam J.. 2014. Personalized Password Guessing: A New Security Threat. Proceedings of the 2014 Symposium...
View ArticleLimiting Recertification in Highly Configurable Systems: Analyzing...
Kästner, Christian, Pfeffer, Jürgen. 2014. Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options. Proceedings of the 2014 Symposium...
View ArticleBuilding the Security Behavior Observatory: An Infrastructure for Long-term...
Forget, Alain, Komanduri, Saranga, Acquisti, Alessandro, Christin, Nicolas, Cranor, Lorrie Faith, Telang, Rahul. 2014. Building the Security Behavior Observatory: An Infrastructure for Long-term...
View ArticleChannel Correlation Modeling for Link Signature Security Assessment
He, Xiaofan, Dai, Huaiyu, Shen, Wenbo, Ning, Peng. 2014. Channel Correlation Modeling for Link Signature Security Assessment. Proceedings of the 2014 Symposium and Bootcamp on the Science of...
View ArticleSecuring Hadoop in Cloud
Yu, Xianqing, Ning, Peng, Vouk, Mladen A.. 2014. Securing Hadoop in Cloud. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :26:1–26:2.
View ArticleDiversity-based Detection of Security Anomalies
Venkatakrishnan, Roopak, Vouk, Mladen A.. 2014. Diversity-based Detection of Security Anomalies. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :29:1–29:2.
View ArticleIs There Value in Reasoning About Security at the Architectural Level: A...
Khalaj, Ebrahim, Vanciu, Radu, Abi-Antoun, Marwan. 2014. Is There Value in Reasoning About Security at the Architectural Level: A Comparative Evaluation. Proceedings of the 2014 Symposium and...
View ArticleModeling and Sensing Risky User Behavior on Mobile Devices
Liu, Qian, Bae, Juhee, Watson, Benjamin, McLaughhlin, Anne, Enck, William. 2014. Modeling and Sensing Risky User Behavior on Mobile Devices. Proceedings of the 2014 Symposium and Bootcamp on the...
View ArticleAn Analysis of Fedora Security Profile
Subramani, Shweta, Vouk, Mladen, Williams, Laurie. 2014. An Analysis of Fedora Security Profile. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :35:1–35:2.
View ArticleGraduate Summer School: Games and Contracts for Cyber-Physical Security
This summer school will provide a rare opportunity for researchers in mathematics, computer science, engineering, and related sciences to learn about recent research directions and future challenges in...
View ArticleSpearphishing Defense Through Improved Usability
The information environment consists of three interrelated dimensions which are the physical, the informational and the cognitive. The most important of these is the cognitive dimension which...
View ArticleCTISRM2016
The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016) Islamic Azad University, Academic City, Dubai, UAE March 3-5,...
View ArticleImproving Cybersecurity Through Human Systems Integration 29 June 2016
Advanced Persistent Threat (APT) attackers accomplish their attack objectives by co-opting users' credentials. Traditional cyber defenses leave users vulnerable to APT attacks which employ...
View ArticleImproving Cybersecurity Through Human Systems Integration
John Zager Robert Zager License: Creative Commons 2.5
View Article
More Pages to Explore .....