Competitive Cyber-Insurance and Network Security |
|
Science of Security, TRUST Review and Coordinating Meeting Agenda |
|
Summer '19 SoS Quarterly Meeting |
|
Papers.zip |
|
Tutorial.zip |
|
A Bird's Eye View of Knowledge Needs Related to Penetration Testing |
|
A Change Would Do You Good: Ga-based Approach For Hiding Data In Program Executables |
|
A Synopsis Of Static Analysis Alerts On Open Source Software |
|
Design and Simulation Platform for Evaluation of Grid Distribution System and Transactive Energy |
|
ThreatZOOM: Neural Network For Automated Vulnerability Mitigation |
|
Measures And Metrics For The Enforcement Of Critical Security Controls: A Case Study Of Boundary Defense |
|
Exploring RNNs For Analyzing Zeek HTTP Data |
|
Design For An Educational Cyber Range |
|
TRACTION: An Infrastructure For TRusted Alert Sharing And Collaborative MitigaTION |
|
Designing A Raspberry Pi Sensor Network For Remote Observation Of Wildlife |
|
Toward A Reliability Measurement Framework Automated Using Deep Learning |
|
Learning APT Chains From Cyber Threat Intelligence |
|
Towards An Understanding Of Resilience With Complex Networks |
|
Simulation Based Evaluation Of Security And Resilience In Railway Infrastructure |
|
Taming Web Views In The Detection Of Android Privacy Leaks |
|
Load Forecasting With Adversarial Attacks In Power Systems Using DeepForge |
|
A Formal Verification Of Mutation-based Moving Target Defense |
|
A New Metric to Compare Anomaly Detection Algorithms In Cyber-Physical Systems |
|