Quantcast
Channel: CPS-VO - Cyber Security
Browsing latest articles
Browse All 62 View Live

Directions in Security Metrics Research

More than 100 years ago, Lord Kelvin insightfully observed that measurement is vital to deep knowledge and understanding in physical science. During the last few decades, researchers have made various...

View Article



The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords

Abstract Joseph Bonneau License:  Creative Commons 2.5 read more

View Article

A Global Perspective on Cyber Attacks

Kathleen M. Carley Ghita Mezzour License:  Creative Commons 2.5

View Article

13th Annual Workshop on the Economics of Information Security

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security and privacy, combining expertise from the fields of...

View Article

2014 TCIPG Industry Workshop

The 2014 Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Workshop will be held November 12-13, 2014 at the University of Illinois at Urbana-Champaign, with a welcome reception on the...

View Article


Emergent Behavior in Cybersecurity (poster)

Shouhuai Xu License:  Creative Commons 2.5

View Article

2014 Cool Careers in Cybersecurity for Girls Workshop

The Maryland Cybersecurity Center is excited to partner with the National CyberWatch Center K-12 Division to host the Annual Cool Careers in Cyber Security Workshop for Girls. Throughout the day,...

View Article

Architecture-based Self-protection: Composing and Reasoning About...

Schmerl, Bradley, Cámara, Javier, Gennari, Jeffrey, Garlan, David, Casanova, Paulo, Moreno, Gabriel A., Glazier, Thomas J., Barnes, Jeffrey M..  2014.  Architecture-based Self-protection: Composing and...

View Article


Log Your CRUD: Design Principles for Software Logging Mechanisms

King, Jason, Williams, Laurie.  2014.  Log Your CRUD: Design Principles for Software Logging Mechanisms. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :5:1–5:10.

View Article


A New Approach to Modeling and Analyzing Security of Networked Systems

Da, Gaofeng, Xu, Maochao, Xu, Shouhuai.  2014.  A New Approach to Modeling and Analyzing Security of Networked Systems. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security....

View Article

Less is More?: Investigating the Role of Examples in Security Studies Using...

Rao, Ashwini, Hibshi, Hanan, Breaux, Travis, Lehker, Jean-Michel, Niu, Jianwei.  2014.  Less is More?: Investigating the Role of Examples in Security Studies Using Analogical TransferProceedings of the...

View Article

Emergent Behavior in Cybersecurity

Xu, Shouhuai.  2014.  Emergent Behavior in Cybersecurity. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :13:1–13:2.

View Article

Cybersecurity Dynamics

Xu, Shouhuai.  2014.  Cybersecurity Dynamics. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :14:1–14:2.

View Article


InViz: Instant Visualization of Security Attacks

Layman, Lucas, Zazworka, Nico.  2014.  InViz: Instant Visualization of Security Attacks. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :15:1–15:2.

View Article

An Analysis Method for Medical Device Security

Ray, Arnab, Cleaveland, Rance.  2014.  An Analysis Method for Medical Device Security. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :16:1–16:2.

View Article


Preemptive Intrusion Detection

Cao, Phuong, Chung, Key-whan, Kalbarczyk, Zbigniew, Iyer, Ravishankar, Slagell, Adam J..  2014.  Preemptive Intrusion Detection. Proceedings of the 2014 Symposium and Bootcamp on the Science of...

View Article

Personalized Password Guessing: A New Security Threat

Cao, Phuong, Li, Hongyang, Nahrstedt, Klara, Kalbarczyk, Zbigniew, Iyer, Ravishankar, Slagell, Adam J..  2014.  Personalized Password Guessing: A New Security Threat. Proceedings of the 2014 Symposium...

View Article


Limiting Recertification in Highly Configurable Systems: Analyzing...

Kästner, Christian, Pfeffer, Jürgen.  2014.  Limiting Recertification in Highly Configurable Systems: Analyzing Interactions and Isolation Among Configuration Options. Proceedings of the 2014 Symposium...

View Article

Building the Security Behavior Observatory: An Infrastructure for Long-term...

Forget, Alain, Komanduri, Saranga, Acquisti, Alessandro, Christin, Nicolas, Cranor, Lorrie Faith, Telang, Rahul.  2014.  Building the Security Behavior Observatory: An Infrastructure for Long-term...

View Article

Channel Correlation Modeling for Link Signature Security Assessment

He, Xiaofan, Dai, Huaiyu, Shen, Wenbo, Ning, Peng.  2014.  Channel Correlation Modeling for Link Signature Security Assessment. Proceedings of the 2014 Symposium and Bootcamp on the Science of...

View Article

Securing Hadoop in Cloud

Yu, Xianqing, Ning, Peng, Vouk, Mladen A..  2014.  Securing Hadoop in Cloud. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :26:1–26:2.

View Article


Diversity-based Detection of Security Anomalies

Venkatakrishnan, Roopak, Vouk, Mladen A..  2014.  Diversity-based Detection of Security Anomalies. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :29:1–29:2.

View Article


Is There Value in Reasoning About Security at the Architectural Level: A...

Khalaj, Ebrahim, Vanciu, Radu, Abi-Antoun, Marwan.  2014.  Is There Value in Reasoning About Security at the Architectural Level: A Comparative Evaluation. Proceedings of the 2014 Symposium and...

View Article

Modeling and Sensing Risky User Behavior on Mobile Devices

Liu, Qian, Bae, Juhee, Watson, Benjamin, McLaughhlin, Anne, Enck, William.  2014.  Modeling and Sensing Risky User Behavior on Mobile Devices. Proceedings of the 2014 Symposium and Bootcamp on the...

View Article

An Analysis of Fedora Security Profile

Subramani, Shweta, Vouk, Mladen, Williams, Laurie.  2014.  An Analysis of Fedora Security Profile. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security. :35:1–35:2.

View Article


Image may be NSFW.
Clik here to view.

Graduate Summer School: Games and Contracts for Cyber-Physical Security

This summer school will provide a rare opportunity for researchers in mathematics, computer science, engineering, and related sciences to learn about recent research directions and future challenges in...

View Article

Spearphishing Defense Through Improved Usability

The information environment consists of three interrelated dimensions which are the physical, the informational and the cognitive. The most important of these is the cognitive dimension which...

View Article

CTISRM2016

The International Conference on Computing Technology, Information Security and Risk Management (CTISRM2016) Islamic Azad University, Academic City, Dubai, UAE March 3-5,...

View Article

Improving Cybersecurity Through Human Systems Integration 29 June 2016

Advanced Persistent Threat (APT) attackers accomplish their attack objectives by co-opting users' credentials. Traditional cyber defenses leave users vulnerable to APT attacks which employ...

View Article



Improving Cybersecurity Through Human Systems Integration

John Zager Robert Zager License:  Creative Commons 2.5

View Article
Browsing latest articles
Browse All 62 View Live




Latest Images