2nd Workshop on Cyber Security Experimentation and Test (CSET '09) |
|
Accurately Measuring Denial of Service in Simulation and Testbed Experiments |
|
Barriers to Science in Security |
|
DARPA Research Announcement: Cyber Fast Track |
|
Advanced Cyber Analytics with GreenPlum Database |
|
Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware |
|
Implementing Mental Models |
|
A Research Agenda for Scientific Foundations in Security |
|
Partitioning Network Testbed Experiments |
|
TRUST 2011-2012 Annual Report--PUBLIC |
|
Very Large Scale Cooperative Experiments in Emulab-Derived Systems |
|
Automating Network Monitoring on Experimental Testbeds |
|
Toward a Standard Benchmark for Computer Security Research |
|
The Science of Cyber Security Experimentation: The DETER Project |
|
Current Developments in DETER Cybersecurity Testbed Technology |
|
Challenges in Experimenting with Botnet Detection Systems |
|
Automating DDoS Experimentation |
|
Making Security Measurable and Managable |
|
Methodically Modeling the Tor Network |
|
SEER: A Security Experimentation EnviRonment for DETER |
|
Should Security Researchers Experiment More and Draw More Inferences? |
|
Teaching Security With Network Testbeds |
|
Adversarial Examples that Fool both Computer Vision and Time-Limited Humans |
|
Adversarial Label Tampering in Machine Learning |
|
Machine Learning and Security: The Good, the Bad, and the Hopeful |
|