A BIRD’S EYE VIEW OF KNOWLEDGE NEEDS RELATED TO PENETRATION TESTING
Akond Rahman and Laurie Williams
North Carolina State University
A FORMAL VERIFICATION OF MUTATION-BASED MOVING TARGET DEFENSE
Muhammad Abdul Basit Ur Rahim, Qi Duan, and Ehab Al-Shaer
University of North Carolina at Charlotte
A NEW METRIC TO COMPARE ANOMALY DETECTION ALGORITHMS IN CYBER-PHYSICAL SYSTEMS
*Jairo Giraldo and †Alvaro A. Cardenas
*University of Texas at Dallas, †University of California Santa Cruz
A SYNOPSIS OF STATIC ANALYSIS ALERTS ON OPEN SOURCE SOFTWARE
Nasif Imtiaz and Laurie Williams
North Carolina State University
CLIPS/ActiveSDN FOR AUTOMATED AND SAFE CYBERSECURITY COURSE-OF-ACTIONS ORCHESTRATION
Md Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, and Mohammed Noraden Alsaleh
University of North Carolina at Charlotte
CYBER DEFENSE MATRIX– A NEW MODEL FOR OPTIMAL COMPOSITION OF CYBERSECURITY CONTROLS FOR CONSTRUCTING RESILIENT RISK MITIGATION
Ashutosh Dutta and Ehab Al-Shaer
University of North Carolina at Charlotte
DESIGN AND SIMULATION PLATFORM FOR EVALUATION OF GRID DISTRIBUTION SYSTEM AND TRANSACTIVE ENERGY
Himanshu Neema, Harsh Vardhan, Carlos Barreto, and Xenofon Koutsoukos
Vanderbilt University
DESIGN FOR AN EDUCATIONAL CYBER RANGE
*Ryan Brunner, *Sang Keun Oh, *Jesse Ramirez, *Paul Houck, *Nathaniel Stickney, and †Raymond Blaine
*United State Military Academy, †Cyber Research Center
DESIGNING A RASPBERRY PI SENSOR NETWORK FOR REMOTE OBSERVATION OF WILDLIFE
Brian Curtin, Rachelle H. David, Emmet D. Dunham, Cullen D. Johnson, Nikhil Shyamkumar, Thomas A. Babbitt, Suzanne J. Matthews
United State Military Academy
EXPLORING RNNs FOR ANALYZING ZEEK HTTP DATA
*Daniel Andrews, *Jennifer Behn, *Danielle Jaksha, *Jinwon Seo, *Madeleine Schneider, *James Yoon, *Suzanne J. Matthews, †Rajeev Agrawal, *Alexander S. Mentis
*United States Military Academy, †U.S. Army E.R.D.C.
LEARNING APT CHAINS FROM CYBER THREAT INTELLIGENCE
Ghaith Husari, Ehab Al-Shaer, Ruhani Faiheem Rahman, and Bill Chu
University of North Carolina at Charlotte
LOAD FORECASTING WITH ADVERSARIAL ATTACKS IN POWER SYSTEMS USING DEEPFORGE
*Xingyu Zhou, *Yi Li, *Carlos Barreto, †Peter Volgyesi, †Xenofon Koutsoukos
*Vanderbilt University, †Vanderbilt University, Institute for Software Integrated Systems
MEASURES AND METRICS FOR THE ENFORCEMENT OF CRITICAL SECURITY CONTROLS: A CASE STUDY OF BOUNDARY DEFENSE
Mohiuddin Ahmed and Ehab Al-Shaer
University of North Carolina at Charlotte
SIMULATION BASED EVALUATION OF SECURITY AND RESILIENCE IN RAILWAY INFRASTRUCTURE
Bradley Potteiger, Hamzah Abdel-Aziz, Himanshu Neema, Xenofon Koutsoukos
Vanderbilt University
TAMING WEB VIEWS IN THE DETECTION OF ANDROID PRIVACY LEAKS
*Xue Qin, *Robert Neuhaus, *Diego Gonzales, *Xiaoyin Wang, †Travis Breaux, *Jianwei Niu
*The University of Texas at San Antonio, †Carnegie Mellon University
THREATZOOM: NEURAL NETWORK FOR AUTOMATED VULNERABILITY MITIGATION
Ehsan Aghaei and Ehab Al-shaer
University of North Carolina-Charlotte
TOWARD A RELIABILITY MEASUREMENT FRAMEWORK AUTOMATED USING DEEP LEARNING
*John Heaps, *Xiaoyin Wang, †Travis Breaux, *Jianwei Niu
*The University of Texas at San Antonio, †Carnegie Mellon University
TOWARDS AN UNDERSTANDING OF RESILIENCE WITH COMPLEX NETWORKS
Francisco Pipa and John Symons
University of Kansas
TRACTION: AN INFRASTRUCTURE FOR TRUSTED ALERT SHARING AND COLLABORATIVE MITIGATION
*Keywhan Chung, *Phuong Cao, *Yuming Wu, *Zbigniew T. Kalbarczyk, *Ravishankar K. Iyer, †Alexander Withers
*University of Illinois at Urbana-Champaign, †National Center for Supercomputing Applications