Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csiirw/csiirw2010.bht:"
@inproceedings{DBLP:conf/csiirw/Adam10, author = {Nabil R. Adam}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Cyber physical systems R{\&}D at {DHS} Science and Technology Directorate}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {4}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852671}, doi = {10.1145/1852666.1852671}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Adam10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AissaASM10, author = {Anis Ben Aissa and Robert K. Abercrombie and Frederick T. Sheldon and Ali Mili}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Modeling stakeholder/value dependency through mean failure cost}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {55}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852727}, doi = {10.1145/1852666.1852727}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AissaASM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AissaASM10a, author = {Anis Ben Aissa and Robert K. Abercrombie and Frederick T. Sheldon and Ali Mili}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Software requirements for a system to compute mean failure cost}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {73}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852750}, doi = {10.1145/1852666.1852750}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AissaASM10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Alexander10, author = {Susan Alexander}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Change the game or win the war: the metaphor matters}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {1}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852668}, doi = {10.1145/1852666.1852668}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Alexander10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AllenLMM10, author = {Josef D. Allen and Xiuwen Liu and Liam M. Mayron and Washington Mio}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {On generalization of performance of classifiers for steganalysis}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {69}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852744}, doi = {10.1145/1852666.1852744}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AllenLMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Augenbaum10, author = {Scott Augenbaum}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A break down in trust, the emerging threat of cyber crime in connection with our dependence on web 2.0 technologies}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {9}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852676}, doi = {10.1145/1852666.1852676}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Augenbaum10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BairdG10, author = {Robert Baird and Rose F. Gamble}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Reasoning about policy noncompliance}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {63}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852736}, doi = {10.1145/1852666.1852736}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BairdG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Bartell10, author = {Michael E. Bartell}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {{CIO/CTO} perspectives panel}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {16}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852683}, doi = {10.1145/1852666.1852683}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Bartell10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Blackwell10, author = {Clive Blackwell}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A security ontology for incident analysis}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {46}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852717}, doi = {10.1145/1852666.1852717}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Blackwell10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BornG10, author = {Kenton Born and David Gustafson}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {NgViz: detecting {DNS} tunnels through n-gram visualization and quantitative analysis}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {47}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852718}, doi = {10.1145/1852666.1852718}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BornG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BowieLS10, author = {Stan L. Bowie and Brenda S. Lenard and Craig A. Shue}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {31}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852701}, doi = {10.1145/1852666.1852701}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BowieLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BrooksD10, author = {Richard R. Brooks and Juan Deng}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Lies and the lying liars that tell them: a fair and balanced look at {TLS}}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {59}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852732}, doi = {10.1145/1852666.1852732}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/BrooksD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BulusuAADB10, author = {Srinivasa Anuradha Bulusu and Benjamin Arazi and Itamar Arel and Andrew S. Davis and George Bitar}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A data security protocol for the Trusted Truck{\textregistered} system}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {37}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852707}, doi = {10.1145/1852666.1852707}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BulusuAADB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Cappelli10, author = {Dawn M. Cappelli}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Risk mitigation strategies: lessons learned from actual insider attacks}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {13}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852680}, doi = {10.1145/1852666.1852680}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Cappelli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CaseyKV10, author = {Timothy Casey and Patrick Koeberl and Claire Vishik}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Threat agents: a necessary component of threat analysis}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {56}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852728}, doi = {10.1145/1852666.1852728}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/CaseyKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ChandolaBK10, author = {Varun Chandola and Shyam Boriah and Vipin Kumar}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A reference based analysis framework for analyzing system call traces}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {33}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852703}, doi = {10.1145/1852666.1852703}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ChandolaBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CravenABDB10, author = {Ryan Craven and Christopher Abbott and Harikrishnan Bhanu and Juan Deng and Richard R. Brooks}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Orwell was an optimist}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {57}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852729}, doi = {10.1145/1852666.1852729}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/CravenABDB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DalyB10, author = {Timothy Daly and Luanne Burns}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Concordia: a Google for malware}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {30}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852700}, doi = {10.1145/1852666.1852700}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DalyB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DasguptaBG10, author = {Dipankar Dasgupta and Harkeerat Bedi and Deon Garrett}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A conceptual model of self-monitoring multi-core systems}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {83}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852760}, doi = {10.1145/1852666.1852760}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DasguptaBG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DasireddyGCY10, author = {Swetha Dasireddy and Wade Gasior and Xiaohui Cui and Li Yang}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Alerts visualization and clustering in network-based intrusion detection}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {41}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852712}, doi = {10.1145/1852666.1852712}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DasireddyGCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DistefanoGLI10, author = {Alessandro Distefano and Antonio Grillo and Alessandro Lentini and Giuseppe F. Italiano}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {SecureMyDroid: enforcing security in the mobile devices lifecycle}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {27}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852696}, doi = {10.1145/1852666.1852696}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/DistefanoGLI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/EltarrasEOC10, author = {Ramy Eltarras and Mohamed Eltoweissy and Stephan Olariu and Ing{-}Ray Chen}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Towards trustworthy shared networked sensor-actuator systems}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {43}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852714}, doi = {10.1145/1852666.1852714}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/EltarrasEOC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ErskinePMG10, author = {Joseph R. Erskine and Gilbert L. Peterson and Barry E. Mullins and Michael R. Grimaila}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Developing cyberspace data understanding: using {CRISP-DM} for host-based {IDS} feature mining}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {74}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852751}, doi = {10.1145/1852666.1852751}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/ErskinePMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/FairbanksLO10, author = {Kevin D. Fairbanks and Christopher P. Lee and Henry L. Owen III}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Forensic implications of Ext4}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {22}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852691}, doi = {10.1145/1852666.1852691}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/FairbanksLO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Gittins10, author = {Benjamin Gittins}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Overview of SLL's proposal in response to NIST's call for new global IdM/CKM designs without public keys}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {60}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852733}, doi = {10.1145/1852666.1852733}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Gittins10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GomathisankaranMN10, author = {Mahadevan Gomathisankaran and Gayatri Mehta and Kamesh Namuduri}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Power, performance and security optimized hardware design for {H.264}}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {62}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852735}, doi = {10.1145/1852666.1852735}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/GomathisankaranMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Grimaila10, author = {Michael R. Grimaila}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Mission assurance: challenges and opportunities}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {14}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852681}, doi = {10.1145/1852666.1852681}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Grimaila10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GroatDMT10, author = {Stephen Groat and Matthew Dunlop and Randy C. Marchany and Joseph G. Tront}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {The privacy implications of stateless IPv6 addressing}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {52}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852723}, doi = {10.1145/1852666.1852723}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GroatDMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GutesmanW10, author = {Ezequiel Gutesman and Ariel Waissbein}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {The impact of predicting attacker tools in security risk assessments}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {75}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852752}, doi = {10.1145/1852666.1852752}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GutesmanW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HahnKGFASH10, author = {Adam Hahn and Benjamin Kregel and Manimaran Govindarasu and Justin Fitzpatrick and Rafi Adnan and Siddharth Sridhar and Michael Higdon}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Development of the PowerCyber {SCADA} security testbed}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {21}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852690}, doi = {10.1145/1852666.1852690}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/HahnKGFASH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HarrisH10, author = {Jack Harris and Raquel L. Hill}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Building a trusted image for embedded systems}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {65}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852739}, doi = {10.1145/1852666.1852739}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HarrisH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HassanBE10, author = {Riham Hassan and Shawn A. Bohner and Mohamed Eltoweissy}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Towards safe and productive development of secure software: {FADES} and model-based software engineering}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {20}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852689}, doi = {10.1145/1852666.1852689}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HassanBE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Hathaway10, author = {Melissa Hathaway}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Cyberspace policy review and blueprint for research priorities}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {11}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852678}, doi = {10.1145/1852666.1852678}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Hathaway10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HathawayMOPRSB10, author = {Melissa Hathaway and Garet J. Moravec and Thomas M. Overman and Rich Pethia and Hart Rossman and Jim Stikeleather and Michael E. Bartell}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {"Keynote {CIO/CTO} perspectives panel" with panelists}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {17}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852685}, doi = {10.1145/1852666.1852685}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HathawayMOPRSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HoseyG10, author = {J. Hosey and Robert Gamble}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Extracting security control requirements}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {44}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852715}, doi = {10.1145/1852666.1852715}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HoseyG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ImM10, author = {Tacksoo Im and John D. McGregor}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Evaluating confidence levels for security scenarios in attribute architectures}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {76}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852753}, doi = {10.1145/1852666.1852753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ImM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/JacksonWF10, author = {Todd Jackson and Christian Wimmer and Michael Franz}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Multi-variant program execution for vulnerability detection and analysis}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {38}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852708}, doi = {10.1145/1852666.1852708}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/JacksonWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KatipallyGCY10, author = {Rajeshwar Katipally and Wade Gasior and Xiaohui Cui and Li Yang}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Multistage attack detection system for network administrators using data mining}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {51}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852722}, doi = {10.1145/1852666.1852722}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KatipallyGCY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KirkpatrickBK10, author = {Michael S. Kirkpatrick and Elisa Bertino and Sam Kerr}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {{PUF} ROKs: generating read-once keys from physically unclonable functions}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {19}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852688}, doi = {10.1145/1852666.1852688}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KirkpatrickBK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KorneckiZ10, author = {Andrew J. Kornecki and Janusz Zalewski}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Safety and security in industrial control}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {77}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852754}, doi = {10.1145/1852666.1852754}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KorneckiZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KringsM10, author = {Axel W. Krings and Stephan Muehlbacher{-}Karrer}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Neighborhood monitoring in ad hoc networks}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {40}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852711}, doi = {10.1145/1852666.1852711}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KringsM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LagesseKVL10, author = {Brent Lagesse and Mohan Kumar and Svetha Venkatesh and Mihai M. Lazarescu}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Augmenting trust establishment in dynamic systems with social networks}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {72}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852748}, doi = {10.1145/1852666.1852748}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/LagesseKVL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LeeSB10, author = {Wonjun Lee and Anna Cinzia Squicciarini and Elisa Bertino}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Vulnerabilities leading to denial of services attacks in grid computing systems: a survey}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {54}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852725}, doi = {10.1145/1852666.1852725}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LeeSB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LingerPSD10, author = {Richard C. Linger and Mark G. Pleszkoch and Kirk Sayre and Tim Daly}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Computing the behavior of malware}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {36}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852706}, doi = {10.1145/1852666.1852706}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LingerPSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Longstaff10, author = {Tom Longstaff}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Cyber science: moving from the toes to the shoulders of giants}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {10}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852677}, doi = {10.1145/1852666.1852677}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Longstaff10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LosavioSK10, author = {Michael Losavio and J. Eagle Shutt and Deborah W. Keeling}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Positing social and justice models for cyber security}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {78}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852755}, doi = {10.1145/1852666.1852755}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LosavioSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MaSK10, author = {Zhanshan (Sam) Ma and Frederick T. Sheldon and Axel W. Krings}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {The handicap principle, strategic information warfare and the paradox of asymmetry}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {35}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852705}, doi = {10.1145/1852666.1852705}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MaSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ManivannanWF10, author = {Karthikeyan Manivannan and Christian Wimmer and Michael Franz}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Decentralized information flow control on a bare-metal {JVM}}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {64}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852738}, doi = {10.1145/1852666.1852738}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ManivannanWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MaroufPS10, author = {Said Marouf and Doan Minh Phuong and Mohamed Shehab}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A learning-based approach for SELinux policy optimization with type mining}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {70}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852746}, doi = {10.1145/1852666.1852746}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/MaroufPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McCuskerGGBB10, author = {Owen McCusker and Benjamin Gittins and Joel Glanfield and Scott Brunza and Stephen Brooks}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {The need to consider both object identity and behavior in establishing the trustworthiness of network devices within a Smart Grid}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {53}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852724}, doi = {10.1145/1852666.1852724}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McCuskerGGBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McDanielS10, author = {Joseph L. McDaniel and Ambareen Siraj}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Towards a secure Frequency Monitoring NETwork {(FNET)} system}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {42}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852713}, doi = {10.1145/1852666.1852713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McDanielS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McDermottF10, author = {John P. McDermott and Leo Freitas}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Using formal methods for security in the Xenon project}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {67}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852742}, doi = {10.1145/1852666.1852742}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McDermottF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McGurk10, author = {Sean McGurk}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Coordinating and guiding federal, state and private sector cybersecurity initiatives}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {3}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852670}, doi = {10.1145/1852666.1852670}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McGurk10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McHughTJ10, author = {John McHugh and Teryl Taylor and Jeff Janies}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Cuckoo bags for exploring multikey data}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {18}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852687}, doi = {10.1145/1852666.1852687}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McHughTJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Moravec10, author = {Garet J. Moravec}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Holistic cyber approach}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852673}, doi = {10.1145/1852666.1852673}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Moravec10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MunsonMH10, author = {John C. Munson and Jack L. Meador and Rick P. Hoover}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Software process control for secure program execution}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {24}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852693}, doi = {10.1145/1852666.1852693}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MunsonMH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MyersGM10, author = {Justin Myers and Michael R. Grimaila and Robert F. Mills}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Adding value to log event correlation using distributed techniques}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {32}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852702}, doi = {10.1145/1852666.1852702}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MyersGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Nicol10, author = {David M. Nicol}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Securing the perimeter: challenges in enforcing global access control}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852674}, doi = {10.1145/1852666.1852674}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Nicol10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/OehmenPD10, author = {Christopher S. Oehmen and Elena S. Peterson and Scott Dowson}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {An organic model for detecting cyber-events}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {66}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852740}, doi = {10.1145/1852666.1852740}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/OehmenPD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/OkhraviS10, author = {Hamed Okhravi and Frederick T. Sheldon}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Data diodes in support of trustworthy cyber infrastructure}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {23}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852692}, doi = {10.1145/1852666.1852692}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/OkhraviS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Overman10, author = {Thomas M. Overman}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {{CIO/CTO} perspectives panel}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {15}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852682}, doi = {10.1145/1852666.1852682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Overman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/OvermanDS10, author = {Thomas M. Overman and Terry Davis and Ronald W. Sackman}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {High assurance smart grid}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {61}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852734}, doi = {10.1145/1852666.1852734}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/OvermanDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ParhamMGK10, author = {James D. Parham and Jeffrey Todd McDonald and Michael R. Grimaila and Yong C. Kim}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A Java based component identification tool for measuring the strength of circuit protections}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {26}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852695}, doi = {10.1145/1852666.1852695}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ParhamMGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ParkRMS10, author = {Young Hee Park and Douglas S. Reeves and Vikram Mulukutla and Balaji Sundaravel}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Fast malware classification by automated behavioral graph matching}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {45}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852716}, doi = {10.1145/1852666.1852716}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ParkRMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Pethia10, author = {Rich Pethia}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {20+years of cyber (in)security: what have we seen? what have we learned? what might we do?}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {12}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852679}, doi = {10.1145/1852666.1852679}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Pethia10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/QuinlanC10, author = {Daniel J. Quinlan and Cory Cohen}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Discovery of {C++} data structures from binaries}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {68}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852743}, doi = {10.1145/1852666.1852743}, timestamp = {Sun, 14 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/QuinlanC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Ravindran10, author = {Kaliappa Ravindran}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Managing Robustness of Distributed Applications Under Uncertainties: An Information Assurance Perspective}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1945022}, doi = {10.1145/1852666.1945022}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Ravindran10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/RengamaniURK10, author = {Haricharan Rengamani and Shambhu J. Upadhyaya and H. Raghav Rao and Ponnurangam Kumaraguru}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {82}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852759}, doi = {10.1145/1852666.1852759}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/RengamaniURK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Ricciulli10, author = {Livio Ricciulli}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A service model for network security applications}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {50}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852721}, doi = {10.1145/1852666.1852721}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Ricciulli10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Rossman10, author = {Hart Rossman}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Gov 2.0 and collaborative security models: security platforms and architectures of participation are the foundations of a winning strategy}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852669}, doi = {10.1145/1852666.1852669}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Rossman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/RoyKT10, author = {Arpan Roy and Dong Seong Kim and Kishor S. Trivedi}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Cyber security analysis using attack countermeasure trees}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {28}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852698}, doi = {10.1145/1852666.1852698}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/RoyKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ShivaRD10, author = {Sajjan G. Shiva and Sankardas Roy and Dipankar Dasgupta}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Game theory for cyber security}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {34}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852704}, doi = {10.1145/1852666.1852704}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ShivaRD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SinghalW10, author = {Anoop Singhal and Duminda Wijesekera}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Ontologies for modeling enterprise level security metrics}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {58}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852731}, doi = {10.1145/1852666.1852731}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SinghalW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Stikeleather10, author = {Jim Stikeleather}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Next generation computing: the rise of the utility in a future that is cloudy with scattered security}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {5}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852672}, doi = {10.1145/1852666.1852672}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Stikeleather10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/TakahashiFK10, author = {Takeshi Takahashi and Hiroyuki Fujiwara and Youki Kadobayashi}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Building ontology of cybersecurity operational information}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {79}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852756}, doi = {10.1145/1852666.1852756}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/TakahashiFK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ToutonjiYP10, author = {Ossama Toutonji and Seong{-}Moo Yoo and Moongyu Park}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Propagation modeling and analysis of network worm attack}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {48}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852719}, doi = {10.1145/1852666.1852719}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ToutonjiYP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/VishikF10, author = {Claire Vishik and Giusella Finocchiaro}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Degrees of anonymity in today's computing environments: decomposing complex processes for anonymity analysis}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {80}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852757}, doi = {10.1145/1852666.1852757}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/VishikF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WangG10, author = {Ju An Wang and Minzhe Guo}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Vulnerability categorization using Bayesian networks}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {29}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852699}, doi = {10.1145/1852666.1852699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WangG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WeiHZ10, author = {Qian Wei and Jingsha He and Xing Zhang}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Behavioral model for secure group communication in wireless mesh networks}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {81}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852758}, doi = {10.1145/1852666.1852758}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WeiHZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Whittaker10, author = {James A. Whittaker}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {How Google tests software}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {8}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852675}, doi = {10.1145/1852666.1852675}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Whittaker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WrightKKD10, author = {Matthew K. Wright and Apu Kapadia and Mohan Kumar and Apurv Dhadphale}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {ReDS: reputation for directory services in {P2P} systems}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {71}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852747}, doi = {10.1145/1852666.1852747}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WrightKKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZhangCH10, author = {Yang Zhang and Taolun Chai and Chih{-}Cheng Hung}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Local binary patterns for face recognition under varying variations}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {39}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852709}, doi = {10.1145/1852666.1852709}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ZhangCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZhangRV010, author = {Dana Zhang and Kotagiri Ramamohanarao and Steven Versteeg and Rui Zhang}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Graph based strategies to role engineering}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {25}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852694}, doi = {10.1145/1852666.1852694}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ZhangRV010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZieglerAH10, author = {Uta Ziegler and Youssif B. Al{-}Nashif and Salim Hariri}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Plug {\&} execute framework for network traffic generation}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {49}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852720}, doi = {10.1145/1852666.1852720}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ZieglerAH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csiirw/2010, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1852666}, isbn = {978-1-4503-0017-9}, timestamp = {Thu, 10 Jan 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.