Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csiirw/csiirw2008.bht:"
@inproceedings{DBLP:conf/csiirw/Abeles08, author = {John M. Abeles}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Abstract for {NIST} {PRISMA} enhancement}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {31:1--31:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413176}, doi = {10.1145/1413140.1413176}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Abeles08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Al-ShaerKA08, author = {Ehab Al{-}Shaer and Latifur Khan and Mohammad Salim Ahmed}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {A comprehensive objective network security metric framework for proactive security configuration}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {42:1--42:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413189}, doi = {10.1145/1413140.1413189}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Al-ShaerKA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AliE08, author = {Yomna Ali and Sherif El{-}Kassas}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {A rigorous methodology for security architecture modeling and verification}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {13:1--13:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413155}, doi = {10.1145/1413140.1413155}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AliE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Arazi08, author = {Benjamin Arazi}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Mobile components security}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {34:1--34:2}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413179}, doi = {10.1145/1413140.1413179}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Arazi08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Arnold08, author = {Patrick Arnold}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {End to end trust}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {2:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413143}, doi = {10.1145/1413140.1413143}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Arnold08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Bennink08, author = {Ryan S. Bennink}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Quantum information: opportunities and challenges or "What's this quantum stuff and what does it have to do with cyber security?"}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {27:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413171}, doi = {10.1145/1413140.1413171}, timestamp = {Sat, 11 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Bennink08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BertinoLST08, author = {Elisa Bertino and Wonjun Lee and Anna Cinzia Squicciarini and Bhavani Thuraisingham}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {End-to-end accountability in grid computing systems for coalition information sharing}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {29:1--29:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413173}, doi = {10.1145/1413140.1413173}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/BertinoLST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Bilar08, author = {Daniel Bilar}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Noisy defenses: subverting malware's {OODA} loop}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {9:1--9:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413151}, doi = {10.1145/1413140.1413151}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Bilar08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BishopG08, author = {Matt Bishop and Carrie Gates}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Defining the insider threat}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {15:1--15:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413158}, doi = {10.1145/1413140.1413158}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BishopG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Blackwell08, author = {Clive Blackwell}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {A multi-layered security architecture for modelling complex systems}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {35:1--35:4}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413180}, doi = {10.1145/1413140.1413180}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Blackwell08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BradfordR08, author = {Phillip G. Bradford and Daniel A. Ray}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Semantics for a domain-specific language for the digital forensics domain}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {11:1--11:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413153}, doi = {10.1145/1413140.1413153}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BradfordR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BrooksSDT08, author = {R. R. Brooks and S. Sander and J. Deng and Joachim Taiber}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Automotive system security: challenges and state-of-the-art}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {26:1--26:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413170}, doi = {10.1145/1413140.1413170}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BrooksSDT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DaiGL08, author = {Jianyong Dai and Ratan Guha and Joohan Lee}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Dynamic instruction sequences monitor for virus detection}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {18:1--18:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413161}, doi = {10.1145/1413140.1413161}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DaiGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Franz08, author = {Michael Franz}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Eliminating the insider threat in software development by combining parallelism, randomization and checkpointing}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {4:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413145}, doi = {10.1145/1413140.1413145}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Franz08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GrimailaMF08, author = {Michael R. Grimaila and Robert F. Mills and Larry W. Fortson}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Improving the cyber incident mission impact assessment {(CIMIA)} process}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {32:1--32:2}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413177}, doi = {10.1145/1413140.1413177}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GrimailaMF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HaighH08, author = {Karen Zita Haigh and Steven A. Harp}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Improving self defense by learning from limited experience}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {40:1--40:4}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413186}, doi = {10.1145/1413140.1413186}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HaighH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HassanBE08, author = {Riham Hassan and Shawn A. Bohner and Sherif El{-}Kassas}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Formal derivation of security design specifications from security requirements}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {10:1--10:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413152}, doi = {10.1145/1413140.1413152}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HassanBE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Kemmerer08, author = {Richard M. (Dick) Kemmerer}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Electronic voting systems: are your votes really counted}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {1:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413142}, doi = {10.1145/1413140.1413142}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Kemmerer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Krings08, author = {Axel Krings}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Design for survivability: a tradeoff space}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {12:1--12:4}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413154}, doi = {10.1145/1413140.1413154}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Krings08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LarsonN08, author = {Ulf E. Larson and Dennis K. Nilsson}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Securing vehicles against cyber attacks}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {30:1--30:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413174}, doi = {10.1145/1413140.1413174}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LarsonN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Lines08, author = {Steve Lines}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Best practices on information sharing of threats and warnings between the {USG} and industry}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {3:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413144}, doi = {10.1145/1413140.1413144}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Lines08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LiuCCAMG08, author = {Yali Liu and Cherita L. Corbett and Ken Chiang and Rennie Archibald and Biswanath Mukherjee and Dipak Ghosal}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Detecting sensitive data exfiltration by an insider attack}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {16:1--16:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413159}, doi = {10.1145/1413140.1413159}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LiuCCAMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MartinB08, author = {Robert A. Martin and Sean Barnum}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Creating the secure software testing target list}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {33:1--33:2}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413178}, doi = {10.1145/1413140.1413178}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MartinB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Masud0K0T08, author = {Mohammad M. Masud and Jing Gao and Latifur Khan and Jiawei Han and Bhavani Thuraisingham}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Peer to peer botnet detection for cyber-security: a data mining approach}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {39:1--39:2}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413185}, doi = {10.1145/1413140.1413185}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Masud0K0T08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Mazeroff08, author = {Geoffrey Mazeroff}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Markov models for application behavior analysis}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {38:1--38:2}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413184}, doi = {10.1145/1413140.1413184}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Mazeroff08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McDuffie08, author = {Mike McDuffie}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Computing and the future}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {5:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413146}, doi = {10.1145/1413140.1413146}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McDuffie08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/PolychronakisAM08, author = {Michalis Polychronakis and Kostas G. Anagnostakis and Evangelos P. Markatos}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Real-world polymorphic attack detection using network-level emulation}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {21:1--21:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413164}, doi = {10.1145/1413140.1413164}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/PolychronakisAM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/RaskinBKHT08, author = {Victor Raskin and Brian Buck and Arthur Keen and Christian F. Hempelmann and Katrina E. Triezenberg}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Accessing and manipulating meaning of textual and data information for information assurance and security and intelligence information}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {25:1--25:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413169}, doi = {10.1145/1413140.1413169}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/RaskinBKHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/RayM08, author = {Baishakhi Ray and Shivakant Mishra}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Secure and reliable covert channel}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {8:1--8:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413150}, doi = {10.1145/1413140.1413150}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/RayM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SailhanB08, author = {Fran{\c{c}}oise Sailhan and Julien Bourgeois}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Log-based distributed intrusion detection for hybrid networks}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {17:1--17:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413160}, doi = {10.1145/1413140.1413160}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/SailhanB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Sapienza08, author = {Thomas J. Sapienza}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Optimizing quality of service of wireless mobile ad-hoc networks using evolutionary computation}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {36:1--36:5}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413182}, doi = {10.1145/1413140.1413182}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Sapienza08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Schlicher08, author = {Bob G. Schlicher}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Emergence of cyber anti-forensics impacting cyber security}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {22:1--22:12}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413166}, doi = {10.1145/1413140.1413166}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Schlicher08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SharpPY08, author = {Brian L. Sharp and Gregory D. Peterson and Lok{-}Kwong Yan}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Extending hardware based mandatory access controls for memory to multicore architectures}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {23:1--23:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413167}, doi = {10.1145/1413140.1413167}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SharpPY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SheldonAM08, author = {Frederick T. Sheldon and Robert K. Abercrombie and Ali Mili}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Evaluating security controls based on key performance indicators and stakeholder mission}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {41:1--41:11}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413188}, doi = {10.1145/1413140.1413188}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SheldonAM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/TenLG08, author = {Chee{-}Wooi Ten and Chen{-}Ching Liu and Manimaran Govindarasu}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Cyber-vulnerability of power grid monitoring and control systems}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {43:1--43:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413190}, doi = {10.1145/1413140.1413190}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/TenLG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/TrienAS08, author = {Joseph P. Trien and Robert K. Abercrombie and Frederick T. Sheldon}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {4\({}^{\mbox{th}}\) annual cyber security and information intelligence research workshop}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {14:1--14:5}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413157}, doi = {10.1145/1413140.1413157}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/TrienAS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Voas08, author = {Jeffrey M. Voas}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Thirteen rules for trust}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {7:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413148}, doi = {10.1145/1413140.1413148}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Voas08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WangZX08, author = {Ju An Wang and Fengwei Zhang and Min Xia}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Temporal metrics for software vulnerabilities}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {44:1--44:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413191}, doi = {10.1145/1413140.1413191}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WangZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WebberPRA08, author = {Franklin Webber and Partha P. Pal and Paul Rubel and Michael Atighetchi}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {An abstract interface for cyber-defense mechanisms}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {37:1--37:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413183}, doi = {10.1145/1413140.1413183}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WebberPRA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Witten08, author = {Brian Witten}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Internet security threat landscape: current changes in targets {\&} methods}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {6:1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413147}, doi = {10.1145/1413140.1413147}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Witten08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/XiaoYB08, author = {Liangliang Xiao and I{-}Ling Yen and Farokh B. Bastani}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Security in a peer-to-peer data grid storage system}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {28:1--28:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413172}, doi = {10.1145/1413140.1413172}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/XiaoYB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YodaikenD08, author = {Victor Yodaiken and Cort Dougan}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Active semantically aware hard real-time security hypervisors}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {24:1--24:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413168}, doi = {10.1145/1413140.1413168}, timestamp = {Thu, 17 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/YodaikenD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Zanero08, author = {Stefano Zanero}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {ULISSE, a network intrusion detection system}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {20:1--20:4}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413163}, doi = {10.1145/1413140.1413163}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Zanero08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Zhao08, author = {Wenbing Zhao}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Towards practical intrusion tolerant systems: a blueprint}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {19:1--19:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413162}, doi = {10.1145/1413140.1413162}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Zhao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csiirw/2008, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140}, doi = {10.1145/1413140}, isbn = {978-1-60558-098-2}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.