Enhanced Attribution |
|
Creating Clarity with Big Data |
|
Tackling Big Data |
|
Linked Data: Connecting and Exploiting Big Data |
|
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Recognition |
|
Strategic Placement of Security Monitors in Industrial Control Systems |
|
HoTSoS2018 Travel Reimbursement Form |
|
HCSS-2017[3].pdf |
|
Cyber Security for Aviation Weapon Systems |
|
Combinatorial Security Testing Course |
|
Microarchitectural Attacks: From the Basics to Arbitrary Read and Write Primitives without any Software Bugs |
|
You’ve Got a Vuln, I’ve Got a Vuln, Everybody’s Got a Vuln |
|
SecureMR: Secure MapReduce Computation Using Homomorphic Encryption and Program Partitioning |
|
Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-Physical Systems |
|
Challenges and Approaches of Performing Canonical Action Research in Software Security |
|
Reinventing the Privilege Drop: How Principled Preservation of Programmer Intent Would Prevent Security Bugs |
|
Robustness of Deep Autoencoder in Intrusion Detection under Adversarial Contamination |
|
Quantifying the Security Effectiveness of Firewalls and DMZs |
|
Application of Capability-Based Cyber Risk Assessment Methodology to a Space System |
|
Building a Virtually Air-gapped Secure Environment in AWS |
|
You Get Where You're Looking for: The Impact of Information Sources on Code Security |
|
On the Emerging Trend of Computer-Aided Cryptology and the Technology Transition Gap it Presents |
|