| Enhanced Attribution |
|
| Creating Clarity with Big Data |
|
| Tackling Big Data |
|
| Linked Data: Connecting and Exploiting Big Data |
|
| Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Recognition |
|
| Strategic Placement of Security Monitors in Industrial Control Systems |
|
| HoTSoS2018 Travel Reimbursement Form |
|
| HCSS-2017[3].pdf |
|
| Cyber Security for Aviation Weapon Systems |
|
| Combinatorial Security Testing Course |
|
| Microarchitectural Attacks: From the Basics to Arbitrary Read and Write Primitives without any Software Bugs |
|
| You’ve Got a Vuln, I’ve Got a Vuln, Everybody’s Got a Vuln |
|
| SecureMR: Secure MapReduce Computation Using Homomorphic Encryption and Program Partitioning |
|
| Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-Physical Systems |
|
| Challenges and Approaches of Performing Canonical Action Research in Software Security |
|
| Reinventing the Privilege Drop: How Principled Preservation of Programmer Intent Would Prevent Security Bugs |
|
| Robustness of Deep Autoencoder in Intrusion Detection under Adversarial Contamination |
|
| Quantifying the Security Effectiveness of Firewalls and DMZs |
|
| Application of Capability-Based Cyber Risk Assessment Methodology to a Space System |
|
| Building a Virtually Air-gapped Secure Environment in AWS |
|
| You Get Where You're Looking for: The Impact of Information Sources on Code Security |
|
| On the Emerging Trend of Computer-Aided Cryptology and the Technology Transition Gap it Presents |
|