The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CISR"( http://dblp.L3S.de/Venues/CISR )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csiirw

Publication years (Num. hits)
2014 (32) 2015 (19)
Publication types (Num. hits)
inproceedings(49) proceedings(2)
Venues (Conferences, Journals, ...)
CISR(51)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 51 publication records. Showing 51 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hani Alturkostani, Anup Chitrakar, Robert Rinker, Axel W. Krings On the Design of Jamming-Aware Safety Applications in VANETs. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xingsi Zhong, Paranietharan Arunagirinathan, Afshin Ahmadi, Richard R. Brooks, Ganesh Kumar Venayagamoorthy Side-Channels in Electric Power Synchrophasor Network Data Traffic. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael D. Iannacone, Shawn Bohn, Grant Nakamura, John Gerth, Kelly M. T. Huffer, Robert A. Bridges, Erik M. Ferragut, John R. Goodall Developing an Ontology for Cyber Security Knowledge Graphs. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christopher Robinson-Mallett, Sebastian Hansack A Model of an Automotive Security Concept Phase. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Corinne L. Jones, Robert A. Bridges, Kelly M. T. Huffer, John R. Goodall Towards a Relation Extraction Framework for Cyber-Security Concepts. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dan Du, Lu Yu 0001, Richard R. Brooks Semantic Similarity Detection For Data Leak Prevention. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Susan M. Bridges, Ken Keiser, Nathan Sissom, Sara J. Graves Cyber Security for Additive Manufacturing. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lu Yu 0001, Juan Deng, Richard R. Brooks, SeokBae Yun Automobile ECU Design to Avoid Data Tampering. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yu Fu 0005, Benafsh Husain, Richard R. Brooks Analysis of Botnet Counter-Counter-Measures. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joseph P. Trien, Stacy J. Prowell, Robert A. Bridges, John R. Goodall (eds.) Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015 Search on Bibsonomy CISR The full citation details ... 2015 DBLP  BibTeX  RDF
1Zoleikha Abdollahi Biron, Pierluigi Pisu, Baisravan HomChaudhuri Observer Design Based Cyber Security for Cyber Physical Systems. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mark G. Pleszkoch, Rick Linger Controlling Combinatorial Complexity in Software and Malware Behavior Computation. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Robert K. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryan Grandgenett, William R. Mahoney, Robin A. Gandhi Authentication Bypass and Remote Escalated I/O Command Attacks. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jarilyn M. Hernández, Aaron E. Ferber, Stacy J. Prowell, Lee M. Hively Phase-Space Detection of Cyber Events. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Ashraf Hossain Sadi, Mohd. Hassan Ali, Dipankar Dasgupta, Robert K. Abercrombie OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Suzanna Schmeelk, Junfeng Yang, Alfred V. Aho Android Malware Static Analysis Techniques. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jaewon Yang, Xiuwen Liu, Shamik Bose Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems. Search on Bibsonomy CISR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shaun-Inn Wu, Hieu Trong Ho Image enhanced CAPTCHA for web security. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje Towards trust-based recommender systems for online software services. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qian Chen 0019, Sherif Abdelwahed Towards realizing self-protecting SCADA systems. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sun-il Kim, William Edmonds, Nnamdi Nwanze On GPU accelerated tuning for a payload anomaly-based network intrusion detection scheme. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1George Louthan, Michael Haney, Phoebe Hardwicke, Peter J. Hawrylak, John Hale Hybrid extensions for stateful attack graphs. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1George Chin Jr., Sutanay Choudhury, John Feo, Lawrence B. Holder Predicting and detecting emerging cyberattack patterns using StreamWorks. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Stanislav Ponomarev, Nathan Wallace, Travis Atkison Detection of SSH host spoofing in control systems through network telemetry analysis. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alaa Darabseh, Akbar Siami Namin The accuracy of user authentication through keystroke features using the most frequent words. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lakshmi Manohar Rao Velicheti, Dennis C. Feiock, Manjula Peiris, Rajeev R. Raje, James H. Hill Towards modeling the behavior of static code analysis tools. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiaohong Yuan, Emmanuel Borkor Nuakoh, Jodria S. Beal, Huiming Yu Retrieving relevant CAPEC attack patterns for secure software development. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Brian Lucas, Errin W. Fulp, David J. John, Daniel A. Cañas An initial framework for evolving computer configurations as a moving target defense. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Steven Noel, Sushil Jajodia Metrics suite for network attack graph analytics. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christopher Robinson-Mallett Coordinating security and safety engineering processes in automotive electronics development. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili 0001, Frederick T. Sheldon Quantifying availability in SCADA environments using the cyber security metric MFC. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Matthew Sherburne, Randy C. Marchany, Joseph G. Tront Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Minzhe Guo, Prabir Bhattacharya Diverse virtual replicas for improving intrusion tolerance in cloud. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Haney, Mauricio Papa A framework for the design and deployment of a SCADA honeynet. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abhijit Kumar Nag, Dipankar Dasgupta An adaptive approach for continuous multi-factor authentication in an identity eco-system. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohamed Fazeen, Garima Bajwa, Ram Dantu Context-aware multimedia encryption in mobile platforms. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rui Zhuang, Scott A. DeLoach, Xinming Ou A model for analyzing the effect of moving target defenses on enterprise networks. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liang Kong 0002, Gavin Bauer, John Hale Location-based device grouping for function restriction. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bader Alwasel, Stephen D. Wolthusen Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lindsey N. Whitehurst, Todd R. Andel, Jeffrey Todd McDonald Exploring security in ZigBee networks. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Robert K. Abercrombie, Jeffrey Todd McDonald (eds.) Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014 Search on Bibsonomy CISR The full citation details ... 2014 DBLP  BibTeX  RDF
1Ed Goff, Cliff Glantz, Rebecca Massello Cybersecurity procurement language for energy delivery systems. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nathan Wallace, Stanislav Ponomarev, Travis Atkison A dimensional transformation scheme for power grid cyber event detection. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall Integration of external data sources with cyber security data warehouse. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak Modeling and simulation of electric power substation employing an IEC 61850 network. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder NICE: endpoint-based topology discovery. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin Cyber-security analysis of smart grid SCADA systems with game models. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jacob Torrey MoRE: measurement of running executables. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jin Dong, Seddik M. Djouadi, James J. Nutaro, Phani Teja Kuruganti Secure control systems with application to cyber-physical systems. Search on Bibsonomy CISR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #51 of 51 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license