|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 51 publication records. Showing 51 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Hani Alturkostani, Anup Chitrakar, Robert Rinker, Axel W. Krings |
On the Design of Jamming-Aware Safety Applications in VANETs. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xingsi Zhong, Paranietharan Arunagirinathan, Afshin Ahmadi, Richard R. Brooks, Ganesh Kumar Venayagamoorthy |
Side-Channels in Electric Power Synchrophasor Network Data Traffic. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael D. Iannacone, Shawn Bohn, Grant Nakamura, John Gerth, Kelly M. T. Huffer, Robert A. Bridges, Erik M. Ferragut, John R. Goodall |
Developing an Ontology for Cyber Security Knowledge Graphs. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald |
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Robinson-Mallett, Sebastian Hansack |
A Model of an Automotive Security Concept Phase. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Corinne L. Jones, Robert A. Bridges, Kelly M. T. Huffer, John R. Goodall |
Towards a Relation Extraction Framework for Cyber-Security Concepts. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dan Du, Lu Yu 0001, Richard R. Brooks |
Semantic Similarity Detection For Data Leak Prevention. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Susan M. Bridges, Ken Keiser, Nathan Sissom, Sara J. Graves |
Cyber Security for Additive Manufacturing. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lu Yu 0001, Juan Deng, Richard R. Brooks, SeokBae Yun |
Automobile ECU Design to Avoid Data Tampering. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yu Fu 0005, Benafsh Husain, Richard R. Brooks |
Analysis of Botnet Counter-Counter-Measures. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joseph P. Trien, Stacy J. Prowell, Robert A. Bridges, John R. Goodall (eds.) |
Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR '15, Oak Ridge, TN, USA, April 7-9, 2015 |
CISR |
2015 |
DBLP BibTeX RDF |
|
1 | Zoleikha Abdollahi Biron, Pierluigi Pisu, Baisravan HomChaudhuri |
Observer Design Based Cyber Security for Cyber Physical Systems. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mark G. Pleszkoch, Rick Linger |
Controlling Combinatorial Complexity in Software and Malware Behavior Computation. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Frederick T. Sheldon, Bob G. Schlicher |
Risk and Vulnerability Assessment Using Cybernomic Computational Models: Tailored for Industrial Control Systems. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Grandgenett, William R. Mahoney, Robin A. Gandhi |
Authentication Bypass and Remote Escalated I/O Command Attacks. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jarilyn M. Hernández, Aaron E. Ferber, Stacy J. Prowell, Lee M. Hively |
Phase-Space Detection of Cyber Events. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Ashraf Hossain Sadi, Mohd. Hassan Ali, Dipankar Dasgupta, Robert K. Abercrombie |
OPNET/Simulink Based Testbed for Disturbance Detection in the Smart Grid. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Suzanna Schmeelk, Junfeng Yang, Alfred V. Aho |
Android Malware Static Analysis Techniques. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaewon Yang, Xiuwen Liu, Shamik Bose |
Preventing Cyber-induced Irreversible Physical Damage to Cyber-Physical Systems. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shaun-Inn Wu, Hieu Trong Ho |
Image enhanced CAPTCHA for web security. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lahiru S. Gallege, Dimuthu U. Gamage, James H. Hill, Rajeev R. Raje |
Towards trust-based recommender systems for online software services. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qian Chen 0019, Sherif Abdelwahed |
Towards realizing self-protecting SCADA systems. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sun-il Kim, William Edmonds, Nnamdi Nwanze |
On GPU accelerated tuning for a payload anomaly-based network intrusion detection scheme. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | George Louthan, Michael Haney, Phoebe Hardwicke, Peter J. Hawrylak, John Hale |
Hybrid extensions for stateful attack graphs. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | George Chin Jr., Sutanay Choudhury, John Feo, Lawrence B. Holder |
Predicting and detecting emerging cyberattack patterns using StreamWorks. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Ponomarev, Nathan Wallace, Travis Atkison |
Detection of SSH host spoofing in control systems through network telemetry analysis. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alaa Darabseh, Akbar Siami Namin |
The accuracy of user authentication through keystroke features using the most frequent words. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lakshmi Manohar Rao Velicheti, Dennis C. Feiock, Manjula Peiris, Rajeev R. Raje, James H. Hill |
Towards modeling the behavior of static code analysis tools. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiaohong Yuan, Emmanuel Borkor Nuakoh, Jodria S. Beal, Huiming Yu |
Retrieving relevant CAPEC attack patterns for secure software development. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brian Lucas, Errin W. Fulp, David J. John, Daniel A. Cañas |
An initial framework for evolving computer configurations as a moving target defense. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Steven Noel, Sushil Jajodia |
Metrics suite for network attack graph analytics. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Robinson-Mallett |
Coordinating security and safety engineering processes in automotive electronics development. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili 0001, Frederick T. Sheldon |
Quantifying availability in SCADA environments using the cyber security metric MFC. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Sherburne, Randy C. Marchany, Joseph G. Tront |
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Minzhe Guo, Prabir Bhattacharya |
Diverse virtual replicas for improving intrusion tolerance in cloud. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Haney, Mauricio Papa |
A framework for the design and deployment of a SCADA honeynet. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abhijit Kumar Nag, Dipankar Dasgupta |
An adaptive approach for continuous multi-factor authentication in an identity eco-system. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Fazeen, Garima Bajwa, Ram Dantu |
Context-aware multimedia encryption in mobile platforms. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhuang, Scott A. DeLoach, Xinming Ou |
A model for analyzing the effect of moving target defenses on enterprise networks. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liang Kong 0002, Gavin Bauer, John Hale |
Location-based device grouping for function restriction. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bader Alwasel, Stephen D. Wolthusen |
Reconstruction of structural controllability over Erdős-Rényi graphs via power dominating sets. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lindsey N. Whitehurst, Todd R. Andel, Jeffrey Todd McDonald |
Exploring security in ZigBee networks. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Robert K. Abercrombie, Jeffrey Todd McDonald (eds.) |
Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014 |
CISR |
2014 |
DBLP BibTeX RDF |
|
1 | Ed Goff, Cliff Glantz, Rebecca Massello |
Cybersecurity procurement language for energy delivery systems. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nathan Wallace, Stanislav Ponomarev, Travis Atkison |
A dimensional transformation scheme for power grid cyber event detection. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan D. Czejdo, Michael D. Iannacone, Robert A. Bridges, Erik M. Ferragut, John R. Goodall |
Integration of external data sources with cyber security data warehouse. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeyasingam Nivethan, Mauricio Papa, Peter J. Hawrylak |
Modeling and simulation of electric power substation employing an IEC 61850 network. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Darrell M. Kienzle, Nathan S. Evans, Matthew C. Elder |
NICE: endpoint-based topology discovery. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin |
Cyber-security analysis of smart grid SCADA systems with game models. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jacob Torrey |
MoRE: measurement of running executables. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jin Dong, Seddik M. Djouadi, James J. Nutaro, Phani Teja Kuruganti |
Secure control systems with application to cyber-physical systems. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #51 of 51 (100 per page; Change: )
|
|