| 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) |
|
| Accurately Measuring Denial of Service in Simulation and Testbed Experiments |
|
| Barriers to Science in Security |
|
| DARPA Research Announcement: Cyber Fast Track |
|
| Advanced Cyber Analytics with GreenPlum Database |
|
| Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware |
|
| Implementing Mental Models |
|
| A Research Agenda for Scientific Foundations in Security |
|
| Partitioning Network Testbed Experiments |
|
| TRUST 2011-2012 Annual Report--PUBLIC |
|
| Very Large Scale Cooperative Experiments in Emulab-Derived Systems |
|
| Automating Network Monitoring on Experimental Testbeds |
|
| Toward a Standard Benchmark for Computer Security Research |
|
| The Science of Cyber Security Experimentation: The DETER Project |
|
| Current Developments in DETER Cybersecurity Testbed Technology |
|
| Challenges in Experimenting with Botnet Detection Systems |
|
| Automating DDoS Experimentation |
|
| Making Security Measurable and Managable |
|
| Methodically Modeling the Tor Network |
|
| SEER: A Security Experimentation EnviRonment for DETER |
|
| Should Security Researchers Experiment More and Draw More Inferences? |
|
| Teaching Security With Network Testbeds |
|
| Adversarial Examples that Fool both Computer Vision and Time-Limited Humans |
|
| Adversarial Label Tampering in Machine Learning |
|
| Machine Learning and Security: The Good, the Bad, and the Hopeful |
|