HotSoS 2019 Posters

A BIRD’S EYE VIEW OF KNOWLEDGE NEEDS RELATED TO PENETRATION TESTING

Akond Rahman and Laurie Williams

North Carolina State University

A FORMAL VERIFICATION OF MUTATION-BASED MOVING TARGET DEFENSE

Muhammad Abdul Basit Ur Rahim, Qi Duan, and Ehab Al-Shaer

University of North Carolina at Charlotte

A NEW METRIC TO COMPARE ANOMALY DETECTION ALGORITHMS IN CYBER-PHYSICAL SYSTEMS

*Jairo Giraldo and Alvaro A. Cardenas

*University of Texas at Dallas, University of California Santa Cruz



A SYNOPSIS OF STATIC ANALYSIS ALERTS ON OPEN SOURCE SOFTWARE

Nasif Imtiaz and Laurie Williams

North Carolina State University

CLIPS/ActiveSDN FOR AUTOMATED AND SAFE CYBERSECURITY COURSE-OF-ACTIONS ORCHESTRATION

Md Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, and Mohammed Noraden Alsaleh

University of North Carolina at Charlotte

CYBER DEFENSE MATRIX– A NEW MODEL FOR OPTIMAL COMPOSITION OF CYBERSECURITY CONTROLS FOR CONSTRUCTING RESILIENT RISK MITIGATION

Ashutosh Dutta and Ehab Al-Shaer

University of North Carolina at Charlotte

DESIGN AND SIMULATION PLATFORM FOR EVALUATION OF GRID DISTRIBUTION SYSTEM AND TRANSACTIVE ENERGY

Himanshu Neema, Harsh Vardhan, Carlos Barreto, and Xenofon Koutsoukos

Vanderbilt University

DESIGN FOR AN EDUCATIONAL CYBER RANGE

*Ryan Brunner, *Sang Keun Oh, *Jesse Ramirez, *Paul Houck, *Nathaniel Stickney, and Raymond Blaine

*United State Military Academy, Cyber Research Center

DESIGNING A RASPBERRY PI SENSOR NETWORK FOR REMOTE OBSERVATION OF WILDLIFE

Brian Curtin, Rachelle H. David, Emmet D. Dunham, Cullen D. Johnson, Nikhil Shyamkumar, Thomas A. Babbitt, Suzanne J. Matthews

United State Military Academy

EXPLORING RNNs FOR ANALYZING ZEEK HTTP DATA

*Daniel Andrews, *Jennifer Behn, *Danielle Jaksha, *Jinwon Seo, *Madeleine Schneider, *James Yoon, *Suzanne J. Matthews, Rajeev Agrawal, *Alexander S. Mentis

*United States Military Academy, U.S. Army E.R.D.C.

LEARNING APT CHAINS FROM CYBER THREAT INTELLIGENCE

Ghaith Husari, Ehab Al-Shaer, Ruhani Faiheem Rahman, and Bill Chu

University of North Carolina at Charlotte

LOAD FORECASTING WITH ADVERSARIAL ATTACKS IN POWER SYSTEMS USING DEEPFORGE

*Xingyu Zhou, *Yi Li, *Carlos Barreto, Peter Volgyesi, Xenofon Koutsoukos

*Vanderbilt University, Vanderbilt University, Institute for Software Integrated Systems

MEASURES AND METRICS FOR THE ENFORCEMENT OF CRITICAL SECURITY CONTROLS: A CASE STUDY OF BOUNDARY DEFENSE

Mohiuddin Ahmed and Ehab Al-Shaer

University of North Carolina at Charlotte

SIMULATION BASED EVALUATION OF SECURITY AND RESILIENCE IN RAILWAY INFRASTRUCTURE

Bradley Potteiger, Hamzah Abdel-Aziz, Himanshu Neema, Xenofon Koutsoukos

Vanderbilt University

TAMING WEB VIEWS IN THE DETECTION OF ANDROID PRIVACY LEAKS

*Xue Qin, *Robert Neuhaus, *Diego Gonzales, *Xiaoyin Wang, Travis Breaux, *Jianwei Niu

*The University of Texas at San Antonio, Carnegie Mellon University

THREATZOOM: NEURAL NETWORK FOR AUTOMATED VULNERABILITY MITIGATION

Ehsan Aghaei and Ehab Al-shaer

University of North Carolina-Charlotte

TOWARD A RELIABILITY MEASUREMENT FRAMEWORK AUTOMATED USING DEEP LEARNING

*John Heaps, *Xiaoyin Wang, Travis Breaux, *Jianwei Niu

*The University of Texas at San Antonio, Carnegie Mellon University

TOWARDS AN UNDERSTANDING OF RESILIENCE WITH COMPLEX NETWORKS

Francisco Pipa and John Symons

University of Kansas

TRACTION: AN INFRASTRUCTURE FOR TRUSTED ALERT SHARING AND COLLABORATIVE MITIGATION

*Keywhan Chung, *Phuong Cao, *Yuming Wu, *Zbigniew T. Kalbarczyk, *Ravishankar K. Iyer, Alexander Withers

*University of Illinois at Urbana-Champaign, National Center for Supercomputing Applications