Search dblp for Publications

export results for "toc:db/conf/csiirw/csiirw2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csiirw/Adam10,
  author       = {Nabil R. Adam},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Cyber physical systems R{\&}D at {DHS} Science and Technology
                  Directorate},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852671},
  doi          = {10.1145/1852666.1852671},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Adam10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AissaASM10,
  author       = {Anis Ben Aissa and
                  Robert K. Abercrombie and
                  Frederick T. Sheldon and
                  Ali Mili},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Modeling stakeholder/value dependency through mean failure cost},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {55},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852727},
  doi          = {10.1145/1852666.1852727},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AissaASM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AissaASM10a,
  author       = {Anis Ben Aissa and
                  Robert K. Abercrombie and
                  Frederick T. Sheldon and
                  Ali Mili},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Software requirements for a system to compute mean failure cost},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {73},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852750},
  doi          = {10.1145/1852666.1852750},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AissaASM10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Alexander10,
  author       = {Susan Alexander},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Change the game or win the war: the metaphor matters},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852668},
  doi          = {10.1145/1852666.1852668},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Alexander10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AllenLMM10,
  author       = {Josef D. Allen and
                  Xiuwen Liu and
                  Liam M. Mayron and
                  Washington Mio},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {On generalization of performance of classifiers for steganalysis},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {69},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852744},
  doi          = {10.1145/1852666.1852744},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AllenLMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Augenbaum10,
  author       = {Scott Augenbaum},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A break down in trust, the emerging threat of cyber crime in connection
                  with our dependence on web 2.0 technologies},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852676},
  doi          = {10.1145/1852666.1852676},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Augenbaum10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BairdG10,
  author       = {Robert Baird and
                  Rose F. Gamble},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Reasoning about policy noncompliance},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {63},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852736},
  doi          = {10.1145/1852666.1852736},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BairdG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Bartell10,
  author       = {Michael E. Bartell},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{CIO/CTO} perspectives panel},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {16},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852683},
  doi          = {10.1145/1852666.1852683},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Bartell10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Blackwell10,
  author       = {Clive Blackwell},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A security ontology for incident analysis},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {46},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852717},
  doi          = {10.1145/1852666.1852717},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Blackwell10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BornG10,
  author       = {Kenton Born and
                  David Gustafson},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {NgViz: detecting {DNS} tunnels through n-gram visualization and quantitative
                  analysis},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {47},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852718},
  doi          = {10.1145/1852666.1852718},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BornG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BowieLS10,
  author       = {Stan L. Bowie and
                  Brenda S. Lenard and
                  Craig A. Shue},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards an empirical measure for assessing public attitudes regarding
                  government cybercrime countermeasures},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {31},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852701},
  doi          = {10.1145/1852666.1852701},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BowieLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BrooksD10,
  author       = {Richard R. Brooks and
                  Juan Deng},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Lies and the lying liars that tell them: a fair and balanced look
                  at {TLS}},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {59},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852732},
  doi          = {10.1145/1852666.1852732},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/BrooksD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BulusuAADB10,
  author       = {Srinivasa Anuradha Bulusu and
                  Benjamin Arazi and
                  Itamar Arel and
                  Andrew S. Davis and
                  George Bitar},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A data security protocol for the Trusted Truck{\textregistered} system},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {37},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852707},
  doi          = {10.1145/1852666.1852707},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BulusuAADB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Cappelli10,
  author       = {Dawn M. Cappelli},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Risk mitigation strategies: lessons learned from actual insider attacks},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {13},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852680},
  doi          = {10.1145/1852666.1852680},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Cappelli10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CaseyKV10,
  author       = {Timothy Casey and
                  Patrick Koeberl and
                  Claire Vishik},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Threat agents: a necessary component of threat analysis},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {56},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852728},
  doi          = {10.1145/1852666.1852728},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/CaseyKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ChandolaBK10,
  author       = {Varun Chandola and
                  Shyam Boriah and
                  Vipin Kumar},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A reference based analysis framework for analyzing system call traces},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {33},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852703},
  doi          = {10.1145/1852666.1852703},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ChandolaBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CravenABDB10,
  author       = {Ryan Craven and
                  Christopher Abbott and
                  Harikrishnan Bhanu and
                  Juan Deng and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Orwell was an optimist},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {57},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852729},
  doi          = {10.1145/1852666.1852729},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/CravenABDB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DalyB10,
  author       = {Timothy Daly and
                  Luanne Burns},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Concordia: a Google for malware},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {30},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852700},
  doi          = {10.1145/1852666.1852700},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DalyB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DasguptaBG10,
  author       = {Dipankar Dasgupta and
                  Harkeerat Bedi and
                  Deon Garrett},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A conceptual model of self-monitoring multi-core systems},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {83},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852760},
  doi          = {10.1145/1852666.1852760},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DasguptaBG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DasireddyGCY10,
  author       = {Swetha Dasireddy and
                  Wade Gasior and
                  Xiaohui Cui and
                  Li Yang},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Alerts visualization and clustering in network-based intrusion detection},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {41},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852712},
  doi          = {10.1145/1852666.1852712},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DasireddyGCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DistefanoGLI10,
  author       = {Alessandro Distefano and
                  Antonio Grillo and
                  Alessandro Lentini and
                  Giuseppe F. Italiano},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {SecureMyDroid: enforcing security in the mobile devices lifecycle},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {27},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852696},
  doi          = {10.1145/1852666.1852696},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/DistefanoGLI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/EltarrasEOC10,
  author       = {Ramy Eltarras and
                  Mohamed Eltoweissy and
                  Stephan Olariu and
                  Ing{-}Ray Chen},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards trustworthy shared networked sensor-actuator systems},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {43},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852714},
  doi          = {10.1145/1852666.1852714},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/EltarrasEOC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ErskinePMG10,
  author       = {Joseph R. Erskine and
                  Gilbert L. Peterson and
                  Barry E. Mullins and
                  Michael R. Grimaila},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Developing cyberspace data understanding: using {CRISP-DM} for host-based
                  {IDS} feature mining},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {74},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852751},
  doi          = {10.1145/1852666.1852751},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/ErskinePMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/FairbanksLO10,
  author       = {Kevin D. Fairbanks and
                  Christopher P. Lee and
                  Henry L. Owen III},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Forensic implications of Ext4},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {22},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852691},
  doi          = {10.1145/1852666.1852691},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/FairbanksLO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Gittins10,
  author       = {Benjamin Gittins},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Overview of SLL's proposal in response to NIST's call for new global
                  IdM/CKM designs without public keys},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {60},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852733},
  doi          = {10.1145/1852666.1852733},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Gittins10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GomathisankaranMN10,
  author       = {Mahadevan Gomathisankaran and
                  Gayatri Mehta and
                  Kamesh Namuduri},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Power, performance and security optimized hardware design for {H.264}},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {62},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852735},
  doi          = {10.1145/1852666.1852735},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/GomathisankaranMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Grimaila10,
  author       = {Michael R. Grimaila},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Mission assurance: challenges and opportunities},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {14},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852681},
  doi          = {10.1145/1852666.1852681},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Grimaila10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GroatDMT10,
  author       = {Stephen Groat and
                  Matthew Dunlop and
                  Randy C. Marchany and
                  Joseph G. Tront},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {The privacy implications of stateless IPv6 addressing},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {52},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852723},
  doi          = {10.1145/1852666.1852723},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GroatDMT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GutesmanW10,
  author       = {Ezequiel Gutesman and
                  Ariel Waissbein},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {The impact of predicting attacker tools in security risk assessments},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {75},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852752},
  doi          = {10.1145/1852666.1852752},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GutesmanW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HahnKGFASH10,
  author       = {Adam Hahn and
                  Benjamin Kregel and
                  Manimaran Govindarasu and
                  Justin Fitzpatrick and
                  Rafi Adnan and
                  Siddharth Sridhar and
                  Michael Higdon},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Development of the PowerCyber {SCADA} security testbed},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {21},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852690},
  doi          = {10.1145/1852666.1852690},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/HahnKGFASH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HarrisH10,
  author       = {Jack Harris and
                  Raquel L. Hill},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Building a trusted image for embedded systems},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {65},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852739},
  doi          = {10.1145/1852666.1852739},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HarrisH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HassanBE10,
  author       = {Riham Hassan and
                  Shawn A. Bohner and
                  Mohamed Eltoweissy},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards safe and productive development of secure software: {FADES}
                  and model-based software engineering},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {20},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852689},
  doi          = {10.1145/1852666.1852689},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HassanBE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Hathaway10,
  author       = {Melissa Hathaway},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Cyberspace policy review and blueprint for research priorities},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {11},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852678},
  doi          = {10.1145/1852666.1852678},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Hathaway10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HathawayMOPRSB10,
  author       = {Melissa Hathaway and
                  Garet J. Moravec and
                  Thomas M. Overman and
                  Rich Pethia and
                  Hart Rossman and
                  Jim Stikeleather and
                  Michael E. Bartell},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {"Keynote {CIO/CTO} perspectives panel" with panelists},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {17},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852685},
  doi          = {10.1145/1852666.1852685},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HathawayMOPRSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HoseyG10,
  author       = {J. Hosey and
                  Robert Gamble},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Extracting security control requirements},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {44},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852715},
  doi          = {10.1145/1852666.1852715},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HoseyG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ImM10,
  author       = {Tacksoo Im and
                  John D. McGregor},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Evaluating confidence levels for security scenarios in attribute architectures},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {76},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852753},
  doi          = {10.1145/1852666.1852753},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ImM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/JacksonWF10,
  author       = {Todd Jackson and
                  Christian Wimmer and
                  Michael Franz},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Multi-variant program execution for vulnerability detection and analysis},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {38},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852708},
  doi          = {10.1145/1852666.1852708},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/JacksonWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KatipallyGCY10,
  author       = {Rajeshwar Katipally and
                  Wade Gasior and
                  Xiaohui Cui and
                  Li Yang},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Multistage attack detection system for network administrators using
                  data mining},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {51},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852722},
  doi          = {10.1145/1852666.1852722},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KatipallyGCY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KirkpatrickBK10,
  author       = {Michael S. Kirkpatrick and
                  Elisa Bertino and
                  Sam Kerr},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{PUF} ROKs: generating read-once keys from physically unclonable functions},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {19},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852688},
  doi          = {10.1145/1852666.1852688},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KirkpatrickBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KorneckiZ10,
  author       = {Andrew J. Kornecki and
                  Janusz Zalewski},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Safety and security in industrial control},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {77},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852754},
  doi          = {10.1145/1852666.1852754},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KorneckiZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KringsM10,
  author       = {Axel W. Krings and
                  Stephan Muehlbacher{-}Karrer},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Neighborhood monitoring in ad hoc networks},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {40},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852711},
  doi          = {10.1145/1852666.1852711},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KringsM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LagesseKVL10,
  author       = {Brent Lagesse and
                  Mohan Kumar and
                  Svetha Venkatesh and
                  Mihai M. Lazarescu},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Augmenting trust establishment in dynamic systems with social networks},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {72},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852748},
  doi          = {10.1145/1852666.1852748},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/LagesseKVL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LeeSB10,
  author       = {Wonjun Lee and
                  Anna Cinzia Squicciarini and
                  Elisa Bertino},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Vulnerabilities leading to denial of services attacks in grid computing
                  systems: a survey},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {54},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852725},
  doi          = {10.1145/1852666.1852725},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LeeSB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LingerPSD10,
  author       = {Richard C. Linger and
                  Mark G. Pleszkoch and
                  Kirk Sayre and
                  Tim Daly},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Computing the behavior of malware},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {36},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852706},
  doi          = {10.1145/1852666.1852706},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LingerPSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Longstaff10,
  author       = {Tom Longstaff},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Cyber science: moving from the toes to the shoulders of giants},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852677},
  doi          = {10.1145/1852666.1852677},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Longstaff10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LosavioSK10,
  author       = {Michael Losavio and
                  J. Eagle Shutt and
                  Deborah W. Keeling},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Positing social and justice models for cyber security},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {78},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852755},
  doi          = {10.1145/1852666.1852755},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LosavioSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MaSK10,
  author       = {Zhanshan (Sam) Ma and
                  Frederick T. Sheldon and
                  Axel W. Krings},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {The handicap principle, strategic information warfare and the paradox
                  of asymmetry},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {35},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852705},
  doi          = {10.1145/1852666.1852705},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MaSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ManivannanWF10,
  author       = {Karthikeyan Manivannan and
                  Christian Wimmer and
                  Michael Franz},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Decentralized information flow control on a bare-metal {JVM}},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {64},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852738},
  doi          = {10.1145/1852666.1852738},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ManivannanWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MaroufPS10,
  author       = {Said Marouf and
                  Doan Minh Phuong and
                  Mohamed Shehab},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A learning-based approach for SELinux policy optimization with type
                  mining},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {70},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852746},
  doi          = {10.1145/1852666.1852746},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/MaroufPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McCuskerGGBB10,
  author       = {Owen McCusker and
                  Benjamin Gittins and
                  Joel Glanfield and
                  Scott Brunza and
                  Stephen Brooks},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {The need to consider both object identity and behavior in establishing
                  the trustworthiness of network devices within a Smart Grid},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {53},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852724},
  doi          = {10.1145/1852666.1852724},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McCuskerGGBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McDanielS10,
  author       = {Joseph L. McDaniel and
                  Ambareen Siraj},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards a secure Frequency Monitoring NETwork {(FNET)} system},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852713},
  doi          = {10.1145/1852666.1852713},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McDanielS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McDermottF10,
  author       = {John P. McDermott and
                  Leo Freitas},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Using formal methods for security in the Xenon project},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {67},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852742},
  doi          = {10.1145/1852666.1852742},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McDermottF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McGurk10,
  author       = {Sean McGurk},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Coordinating and guiding federal, state and private sector cybersecurity
                  initiatives},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852670},
  doi          = {10.1145/1852666.1852670},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McGurk10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McHughTJ10,
  author       = {John McHugh and
                  Teryl Taylor and
                  Jeff Janies},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Cuckoo bags for exploring multikey data},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {18},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852687},
  doi          = {10.1145/1852666.1852687},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McHughTJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Moravec10,
  author       = {Garet J. Moravec},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Holistic cyber approach},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852673},
  doi          = {10.1145/1852666.1852673},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Moravec10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MunsonMH10,
  author       = {John C. Munson and
                  Jack L. Meador and
                  Rick P. Hoover},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Software process control for secure program execution},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {24},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852693},
  doi          = {10.1145/1852666.1852693},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MunsonMH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MyersGM10,
  author       = {Justin Myers and
                  Michael R. Grimaila and
                  Robert F. Mills},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Adding value to log event correlation using distributed techniques},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {32},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852702},
  doi          = {10.1145/1852666.1852702},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MyersGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Nicol10,
  author       = {David M. Nicol},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Securing the perimeter: challenges in enforcing global access control},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852674},
  doi          = {10.1145/1852666.1852674},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Nicol10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/OehmenPD10,
  author       = {Christopher S. Oehmen and
                  Elena S. Peterson and
                  Scott Dowson},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {An organic model for detecting cyber-events},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {66},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852740},
  doi          = {10.1145/1852666.1852740},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/OehmenPD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/OkhraviS10,
  author       = {Hamed Okhravi and
                  Frederick T. Sheldon},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Data diodes in support of trustworthy cyber infrastructure},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852692},
  doi          = {10.1145/1852666.1852692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/OkhraviS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Overman10,
  author       = {Thomas M. Overman},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{CIO/CTO} perspectives panel},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852682},
  doi          = {10.1145/1852666.1852682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Overman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/OvermanDS10,
  author       = {Thomas M. Overman and
                  Terry Davis and
                  Ronald W. Sackman},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {High assurance smart grid},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {61},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852734},
  doi          = {10.1145/1852666.1852734},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/OvermanDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ParhamMGK10,
  author       = {James D. Parham and
                  Jeffrey Todd McDonald and
                  Michael R. Grimaila and
                  Yong C. Kim},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A Java based component identification tool for measuring the strength
                  of circuit protections},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {26},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852695},
  doi          = {10.1145/1852666.1852695},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ParhamMGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ParkRMS10,
  author       = {Young Hee Park and
                  Douglas S. Reeves and
                  Vikram Mulukutla and
                  Balaji Sundaravel},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Fast malware classification by automated behavioral graph matching},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {45},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852716},
  doi          = {10.1145/1852666.1852716},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ParkRMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Pethia10,
  author       = {Rich Pethia},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {20+years of cyber (in)security: what have we seen? what have we learned?
                  what might we do?},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {12},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852679},
  doi          = {10.1145/1852666.1852679},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Pethia10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/QuinlanC10,
  author       = {Daniel J. Quinlan and
                  Cory Cohen},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Discovery of {C++} data structures from binaries},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {68},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852743},
  doi          = {10.1145/1852666.1852743},
  timestamp    = {Sun, 14 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/QuinlanC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Ravindran10,
  author       = {Kaliappa Ravindran},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Managing Robustness of Distributed Applications Under Uncertainties:
                  An Information Assurance Perspective},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1945022},
  doi          = {10.1145/1852666.1945022},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Ravindran10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/RengamaniURK10,
  author       = {Haricharan Rengamani and
                  Shambhu J. Upadhyaya and
                  H. Raghav Rao and
                  Ponnurangam Kumaraguru},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Protecting senior citizens from cyber security attacks in the e-health
                  scenario: an international perspective},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {82},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852759},
  doi          = {10.1145/1852666.1852759},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/RengamaniURK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Ricciulli10,
  author       = {Livio Ricciulli},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A service model for network security applications},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {50},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852721},
  doi          = {10.1145/1852666.1852721},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Ricciulli10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Rossman10,
  author       = {Hart Rossman},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Gov 2.0 and collaborative security models: security platforms and
                  architectures of participation are the foundations of a winning strategy},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852669},
  doi          = {10.1145/1852666.1852669},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Rossman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/RoyKT10,
  author       = {Arpan Roy and
                  Dong Seong Kim and
                  Kishor S. Trivedi},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Cyber security analysis using attack countermeasure trees},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {28},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852698},
  doi          = {10.1145/1852666.1852698},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/RoyKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ShivaRD10,
  author       = {Sajjan G. Shiva and
                  Sankardas Roy and
                  Dipankar Dasgupta},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Game theory for cyber security},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {34},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852704},
  doi          = {10.1145/1852666.1852704},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ShivaRD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SinghalW10,
  author       = {Anoop Singhal and
                  Duminda Wijesekera},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Ontologies for modeling enterprise level security metrics},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {58},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852731},
  doi          = {10.1145/1852666.1852731},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SinghalW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Stikeleather10,
  author       = {Jim Stikeleather},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Next generation computing: the rise of the utility in a future that
                  is cloudy with scattered security},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852672},
  doi          = {10.1145/1852666.1852672},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Stikeleather10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/TakahashiFK10,
  author       = {Takeshi Takahashi and
                  Hiroyuki Fujiwara and
                  Youki Kadobayashi},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Building ontology of cybersecurity operational information},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {79},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852756},
  doi          = {10.1145/1852666.1852756},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/TakahashiFK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ToutonjiYP10,
  author       = {Ossama Toutonji and
                  Seong{-}Moo Yoo and
                  Moongyu Park},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Propagation modeling and analysis of network worm attack},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {48},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852719},
  doi          = {10.1145/1852666.1852719},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ToutonjiYP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VishikF10,
  author       = {Claire Vishik and
                  Giusella Finocchiaro},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Degrees of anonymity in today's computing environments: decomposing
                  complex processes for anonymity analysis},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {80},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852757},
  doi          = {10.1145/1852666.1852757},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/VishikF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WangG10,
  author       = {Ju An Wang and
                  Minzhe Guo},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Vulnerability categorization using Bayesian networks},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {29},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852699},
  doi          = {10.1145/1852666.1852699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WangG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WeiHZ10,
  author       = {Qian Wei and
                  Jingsha He and
                  Xing Zhang},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Behavioral model for secure group communication in wireless mesh networks},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {81},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852758},
  doi          = {10.1145/1852666.1852758},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WeiHZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Whittaker10,
  author       = {James A. Whittaker},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {How Google tests software},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {8},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852675},
  doi          = {10.1145/1852666.1852675},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Whittaker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WrightKKD10,
  author       = {Matthew K. Wright and
                  Apu Kapadia and
                  Mohan Kumar and
                  Apurv Dhadphale},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {ReDS: reputation for directory services in {P2P} systems},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {71},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852747},
  doi          = {10.1145/1852666.1852747},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WrightKKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZhangCH10,
  author       = {Yang Zhang and
                  Taolun Chai and
                  Chih{-}Cheng Hung},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Local binary patterns for face recognition under varying variations},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {39},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852709},
  doi          = {10.1145/1852666.1852709},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZhangCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZhangRV010,
  author       = {Dana Zhang and
                  Kotagiri Ramamohanarao and
                  Steven Versteeg and
                  Rui Zhang},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Graph based strategies to role engineering},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {25},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852694},
  doi          = {10.1145/1852666.1852694},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZhangRV010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZieglerAH10,
  author       = {Uta Ziegler and
                  Youssif B. Al{-}Nashif and
                  Salim Hariri},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Plug {\&} execute framework for network traffic generation},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {49},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852720},
  doi          = {10.1145/1852666.1852720},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZieglerAH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2010,
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1852666},
  isbn         = {978-1-4503-0017-9},
  timestamp    = {Thu, 10 Jan 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics