Search dblp for Publications

export results for "toc:db/conf/csiirw/csiirw2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csiirw/Abeles08,
  author       = {John M. Abeles},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Abstract for {NIST} {PRISMA} enhancement},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {31:1--31:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413176},
  doi          = {10.1145/1413140.1413176},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Abeles08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Al-ShaerKA08,
  author       = {Ehab Al{-}Shaer and
                  Latifur Khan and
                  Mohammad Salim Ahmed},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {A comprehensive objective network security metric framework for proactive
                  security configuration},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {42:1--42:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413189},
  doi          = {10.1145/1413140.1413189},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Al-ShaerKA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AliE08,
  author       = {Yomna Ali and
                  Sherif El{-}Kassas},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {A rigorous methodology for security architecture modeling and verification},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {13:1--13:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413155},
  doi          = {10.1145/1413140.1413155},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AliE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Arazi08,
  author       = {Benjamin Arazi},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Mobile components security},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {34:1--34:2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413179},
  doi          = {10.1145/1413140.1413179},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Arazi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Arnold08,
  author       = {Patrick Arnold},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {End to end trust},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {2:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413143},
  doi          = {10.1145/1413140.1413143},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Arnold08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Bennink08,
  author       = {Ryan S. Bennink},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Quantum information: opportunities and challenges or "What's this
                  quantum stuff and what does it have to do with cyber security?"},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {27:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413171},
  doi          = {10.1145/1413140.1413171},
  timestamp    = {Sat, 11 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Bennink08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BertinoLST08,
  author       = {Elisa Bertino and
                  Wonjun Lee and
                  Anna Cinzia Squicciarini and
                  Bhavani Thuraisingham},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {End-to-end accountability in grid computing systems for coalition
                  information sharing},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {29:1--29:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413173},
  doi          = {10.1145/1413140.1413173},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/BertinoLST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Bilar08,
  author       = {Daniel Bilar},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Noisy defenses: subverting malware's {OODA} loop},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {9:1--9:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413151},
  doi          = {10.1145/1413140.1413151},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Bilar08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BishopG08,
  author       = {Matt Bishop and
                  Carrie Gates},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Defining the insider threat},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {15:1--15:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413158},
  doi          = {10.1145/1413140.1413158},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BishopG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Blackwell08,
  author       = {Clive Blackwell},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {A multi-layered security architecture for modelling complex systems},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {35:1--35:4},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413180},
  doi          = {10.1145/1413140.1413180},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Blackwell08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BradfordR08,
  author       = {Phillip G. Bradford and
                  Daniel A. Ray},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Semantics for a domain-specific language for the digital forensics
                  domain},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {11:1--11:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413153},
  doi          = {10.1145/1413140.1413153},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BradfordR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BrooksSDT08,
  author       = {R. R. Brooks and
                  S. Sander and
                  J. Deng and
                  Joachim Taiber},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Automotive system security: challenges and state-of-the-art},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {26:1--26:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413170},
  doi          = {10.1145/1413140.1413170},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BrooksSDT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DaiGL08,
  author       = {Jianyong Dai and
                  Ratan Guha and
                  Joohan Lee},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Dynamic instruction sequences monitor for virus detection},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {18:1--18:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413161},
  doi          = {10.1145/1413140.1413161},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DaiGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Franz08,
  author       = {Michael Franz},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Eliminating the insider threat in software development by combining
                  parallelism, randomization and checkpointing},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {4:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413145},
  doi          = {10.1145/1413140.1413145},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Franz08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GrimailaMF08,
  author       = {Michael R. Grimaila and
                  Robert F. Mills and
                  Larry W. Fortson},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Improving the cyber incident mission impact assessment {(CIMIA)} process},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {32:1--32:2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413177},
  doi          = {10.1145/1413140.1413177},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GrimailaMF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HaighH08,
  author       = {Karen Zita Haigh and
                  Steven A. Harp},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Improving self defense by learning from limited experience},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {40:1--40:4},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413186},
  doi          = {10.1145/1413140.1413186},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HaighH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HassanBE08,
  author       = {Riham Hassan and
                  Shawn A. Bohner and
                  Sherif El{-}Kassas},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Formal derivation of security design specifications from security
                  requirements},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {10:1--10:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413152},
  doi          = {10.1145/1413140.1413152},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HassanBE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Kemmerer08,
  author       = {Richard M. (Dick) Kemmerer},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Electronic voting systems: are your votes really counted},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {1:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413142},
  doi          = {10.1145/1413140.1413142},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Kemmerer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Krings08,
  author       = {Axel Krings},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Design for survivability: a tradeoff space},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {12:1--12:4},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413154},
  doi          = {10.1145/1413140.1413154},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Krings08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LarsonN08,
  author       = {Ulf E. Larson and
                  Dennis K. Nilsson},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Securing vehicles against cyber attacks},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {30:1--30:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413174},
  doi          = {10.1145/1413140.1413174},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LarsonN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Lines08,
  author       = {Steve Lines},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Best practices on information sharing of threats and warnings between
                  the {USG} and industry},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {3:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413144},
  doi          = {10.1145/1413140.1413144},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Lines08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LiuCCAMG08,
  author       = {Yali Liu and
                  Cherita L. Corbett and
                  Ken Chiang and
                  Rennie Archibald and
                  Biswanath Mukherjee and
                  Dipak Ghosal},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Detecting sensitive data exfiltration by an insider attack},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {16:1--16:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413159},
  doi          = {10.1145/1413140.1413159},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LiuCCAMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MartinB08,
  author       = {Robert A. Martin and
                  Sean Barnum},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Creating the secure software testing target list},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {33:1--33:2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413178},
  doi          = {10.1145/1413140.1413178},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MartinB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Masud0K0T08,
  author       = {Mohammad M. Masud and
                  Jing Gao and
                  Latifur Khan and
                  Jiawei Han and
                  Bhavani Thuraisingham},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Peer to peer botnet detection for cyber-security: a data mining approach},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {39:1--39:2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413185},
  doi          = {10.1145/1413140.1413185},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Masud0K0T08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Mazeroff08,
  author       = {Geoffrey Mazeroff},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Markov models for application behavior analysis},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {38:1--38:2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413184},
  doi          = {10.1145/1413140.1413184},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Mazeroff08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McDuffie08,
  author       = {Mike McDuffie},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Computing and the future},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {5:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413146},
  doi          = {10.1145/1413140.1413146},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McDuffie08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/PolychronakisAM08,
  author       = {Michalis Polychronakis and
                  Kostas G. Anagnostakis and
                  Evangelos P. Markatos},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Real-world polymorphic attack detection using network-level emulation},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {21:1--21:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413164},
  doi          = {10.1145/1413140.1413164},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/PolychronakisAM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/RaskinBKHT08,
  author       = {Victor Raskin and
                  Brian Buck and
                  Arthur Keen and
                  Christian F. Hempelmann and
                  Katrina E. Triezenberg},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Accessing and manipulating meaning of textual and data information
                  for information assurance and security and intelligence information},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {25:1--25:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413169},
  doi          = {10.1145/1413140.1413169},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/RaskinBKHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/RayM08,
  author       = {Baishakhi Ray and
                  Shivakant Mishra},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Secure and reliable covert channel},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {8:1--8:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413150},
  doi          = {10.1145/1413140.1413150},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/RayM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SailhanB08,
  author       = {Fran{\c{c}}oise Sailhan and
                  Julien Bourgeois},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Log-based distributed intrusion detection for hybrid networks},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {17:1--17:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413160},
  doi          = {10.1145/1413140.1413160},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/SailhanB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Sapienza08,
  author       = {Thomas J. Sapienza},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Optimizing quality of service of wireless mobile ad-hoc networks using
                  evolutionary computation},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {36:1--36:5},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413182},
  doi          = {10.1145/1413140.1413182},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Sapienza08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Schlicher08,
  author       = {Bob G. Schlicher},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Emergence of cyber anti-forensics impacting cyber security},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {22:1--22:12},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413166},
  doi          = {10.1145/1413140.1413166},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Schlicher08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SharpPY08,
  author       = {Brian L. Sharp and
                  Gregory D. Peterson and
                  Lok{-}Kwong Yan},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Extending hardware based mandatory access controls for memory to multicore
                  architectures},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {23:1--23:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413167},
  doi          = {10.1145/1413140.1413167},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SharpPY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SheldonAM08,
  author       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Ali Mili},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Evaluating security controls based on key performance indicators and
                  stakeholder mission},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {41:1--41:11},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413188},
  doi          = {10.1145/1413140.1413188},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SheldonAM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/TenLG08,
  author       = {Chee{-}Wooi Ten and
                  Chen{-}Ching Liu and
                  Manimaran Govindarasu},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Cyber-vulnerability of power grid monitoring and control systems},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {43:1--43:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413190},
  doi          = {10.1145/1413140.1413190},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/TenLG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/TrienAS08,
  author       = {Joseph P. Trien and
                  Robert K. Abercrombie and
                  Frederick T. Sheldon},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {4\({}^{\mbox{th}}\) annual cyber security and information intelligence
                  research workshop},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {14:1--14:5},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413157},
  doi          = {10.1145/1413140.1413157},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/TrienAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Voas08,
  author       = {Jeffrey M. Voas},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Thirteen rules for trust},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {7:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413148},
  doi          = {10.1145/1413140.1413148},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Voas08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WangZX08,
  author       = {Ju An Wang and
                  Fengwei Zhang and
                  Min Xia},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Temporal metrics for software vulnerabilities},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {44:1--44:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413191},
  doi          = {10.1145/1413140.1413191},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WangZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WebberPRA08,
  author       = {Franklin Webber and
                  Partha P. Pal and
                  Paul Rubel and
                  Michael Atighetchi},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {An abstract interface for cyber-defense mechanisms},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {37:1--37:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413183},
  doi          = {10.1145/1413140.1413183},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WebberPRA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Witten08,
  author       = {Brian Witten},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Internet security threat landscape: current changes in targets {\&}
                  methods},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {6:1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413147},
  doi          = {10.1145/1413140.1413147},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Witten08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/XiaoYB08,
  author       = {Liangliang Xiao and
                  I{-}Ling Yen and
                  Farokh B. Bastani},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Security in a peer-to-peer data grid storage system},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {28:1--28:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413172},
  doi          = {10.1145/1413140.1413172},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/XiaoYB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YodaikenD08,
  author       = {Victor Yodaiken and
                  Cort Dougan},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Active semantically aware hard real-time security hypervisors},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {24:1--24:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413168},
  doi          = {10.1145/1413140.1413168},
  timestamp    = {Thu, 17 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/YodaikenD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Zanero08,
  author       = {Stefano Zanero},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {ULISSE, a network intrusion detection system},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {20:1--20:4},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413163},
  doi          = {10.1145/1413140.1413163},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Zanero08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Zhao08,
  author       = {Wenbing Zhao},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Towards practical intrusion tolerant systems: a blueprint},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {19:1--19:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413162},
  doi          = {10.1145/1413140.1413162},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Zhao08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2008,
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140},
  doi          = {10.1145/1413140},
  isbn         = {978-1-60558-098-2},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics