A Security Recommender System for Composable Cloud Solutions
Douglas Millward1, Martin Reed1, and Nkaepe Olaniyi2
University Of Essex1, Kaplan Open Learning2
A Study of Security Weaknesses in Android Payment Service Provider SDKs
Samin Yaseer Mahmud and William Enck
North Carolina State University
Applying Software Security Growth Model to Web Browser Software
Saikath Bhattacharya, Munindar P. Singh, and Laurie Williams
North Carolina State University
Are Your Dependencies Code Reviewed? Measuring Code Review Coverage In Dependency Updates
Nasif Imtiaz and Laurie Williams
North Carolina State University
Cyber-Physical Systems Undergraduate Education
Brian Gonzalez Villa, Joseph L. Heyman, and Raymond W. Blaine
United States Military Academy
DREAD: Dark web Retreival, Examination, and Detection
Kyle Krage, Nicholas Schultz, Michael Kapralos,Ryan Hogan, David Ryan, Stonewall Sisk, Luke Whitman, and Raymond Blaine
United States Military Academy
Guidelines for Improving Cyber Security Reporting with External Validation
Matthew Armstrong and Jeffrey Carver
University of Alabama
Identifying Online Misbehavior
Sanjana Cheerla, Vaibhav Garg, and Munindar P. Singh
North Carolina State University
Securing Automotive Zonal Architectures with Named Data Networking (Demo)
Zachariah Threet1, Susmit Shannigrahi1, and Christos Papadopoulos2
Tennessee Tech1, University of Memphis2
Threat-related Document Clustering for Continuous Monitoring of Threat Intelligence
Md Rayhanur Rahman and Laurie Williams
North Carolina State University
Toward Automatic Detection of Cloud Server Security Vulnerabilities
Olufogorehan Tunde-Onadele1, Yuhang Lin, Helen Gu1, and Jingzhu He2
North Carolina State University1, ShanghaiTech University2