| Competitive Cyber-Insurance and Network Security |
|
| Science of Security, TRUST Review and Coordinating Meeting Agenda |
|
| Summer '19 SoS Quarterly Meeting |
|
| Papers.zip |
|
| Tutorial.zip |
|
| A Bird's Eye View of Knowledge Needs Related to Penetration Testing |
|
| A Change Would Do You Good: Ga-based Approach For Hiding Data In Program Executables |
|
| A Synopsis Of Static Analysis Alerts On Open Source Software |
|
| Design and Simulation Platform for Evaluation of Grid Distribution System and Transactive Energy |
|
| ThreatZOOM: Neural Network For Automated Vulnerability Mitigation |
|
| Measures And Metrics For The Enforcement Of Critical Security Controls: A Case Study Of Boundary Defense |
|
| Exploring RNNs For Analyzing Zeek HTTP Data |
|
| Design For An Educational Cyber Range |
|
| TRACTION: An Infrastructure For TRusted Alert Sharing And Collaborative MitigaTION |
|
| Designing A Raspberry Pi Sensor Network For Remote Observation Of Wildlife |
|
| Toward A Reliability Measurement Framework Automated Using Deep Learning |
|
| Learning APT Chains From Cyber Threat Intelligence |
|
| Towards An Understanding Of Resilience With Complex Networks |
|
| Simulation Based Evaluation Of Security And Resilience In Railway Infrastructure |
|
| Taming Web Views In The Detection Of Android Privacy Leaks |
|
| Load Forecasting With Adversarial Attacks In Power Systems Using DeepForge |
|
| A Formal Verification Of Mutation-based Moving Target Defense |
|
| A New Metric to Compare Anomaly Detection Algorithms In Cyber-Physical Systems |
|