Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csiirw/csiirw2011.bht:"
@inproceedings{DBLP:conf/csiirw/AbercrombieSADRBKN11, author = {Robert K. Abercrombie and Frederick T. Sheldon and Hal Aldridge and Michael Duren and Tracy Ricci and Elisa Bertino and N. Athula Kulatunga and Uditha Navaratne}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Secure cryptographic key management system {(CKMS)} considerations for smart grid devices}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {59}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179364}, doi = {10.1145/2179298.2179364}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AbercrombieSADRBKN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Akers11, author = {Gregory Neal Akers}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Plenary Speaker: Gregory Neal Akers, {CISCO}}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {9}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179308}, doi = {10.1145/2179298.2179308}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Akers11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Allen11, author = {George J. Allen}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Plenary keynote Speaker: Major General George J. Allen, J5, {US} Cyber Command}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {10}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179309}, doi = {10.1145/2179298.2179309}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Allen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AllenTLL11, author = {Josef D. Allen and Sereyvathana Ty and Xiuwen Liu and Ivan Lozano}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Preventing cascading event: a distributed cyber-physical approach}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {54}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179358}, doi = {10.1145/2179298.2179358}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AllenTLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AshokHG11, author = {Aditya Ashok and Adam Hahn and Manimaran Govindarasu}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A cyber-physical security testbed for smart grid: system architecture and studies}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {20}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179320}, doi = {10.1145/2179298.2179320}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AshokHG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/AzabE11, author = {Mohamed Azab and Mohamed Eltoweissy}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Towards a cooperative autonomous resilient defense platform for cyber-physical systems}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {56}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179360}, doi = {10.1145/2179298.2179360}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/AzabE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BentonJK11, author = {Kevin Benton and Ju{-}Yeon Jo and Yoohwan Kim}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {SignatureCheck: a protocol to detect man-in-the-middle attack in {SSL}}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {60}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179365}, doi = {10.1145/2179298.2179365}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/BentonJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BilarSH11, author = {Daniel Bilar and James Solderitsch and Elvis Hovor}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Monitoring smart grid operations and maintaining mission assurance through adaptive computer network defenses}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {17}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179317}, doi = {10.1145/2179298.2179317}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/BilarSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Blackwell11, author = {Clive Blackwell}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Formally modeling the electricity grid with bigraphs}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {23}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179323}, doi = {10.1145/2179298.2179323}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Blackwell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Brown11, author = {Michael A. Brown}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Plenary Keynote Speaker: Rear Admiral Michael A. Brown, DoD/DHS}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {7}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179306}, doi = {10.1145/2179298.2179306}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Brown11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Bumgarner11, author = {John Bumgarner}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Plenary Speaker: John Bumgarner, {U.S.} Cyber Consequences Unit}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {11}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179310}, doi = {10.1145/2179298.2179310}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Bumgarner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BurnsSL11, author = {Luanne Burns and Christina Selby and Thomas A. Longstaff}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {{DART3:} {DHS} assistant for R{\&}D tracking and technology transfer}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {70}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179379}, doi = {10.1145/2179298.2179379}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/BurnsSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ButlerHH11, author = {Matthew Butler and Peter J. Hawrylak and John Hale}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Graceful privilege reduction in {RFID} security}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {47}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179349}, doi = {10.1145/2179298.2179349}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ButlerHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CalverGH11, author = {Timothy Calver and Michael R. Grimaila and Jeffrey W. Humphries}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {An empirical analysis of the cascade error reconciliation protocol for quantum key distribution}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {58}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179363}, doi = {10.1145/2179298.2179363}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/CalverGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Carter11, author = {Jason Carter}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {An architecture for Concordia}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {50}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179353}, doi = {10.1145/2179298.2179353}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Carter11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CarvalhoP11, author = {Marco M. Carvalho and Carlos Perez}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {An evolutionary multi-agent approach to anomaly detection and cyber defense}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {28}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179329}, doi = {10.1145/2179298.2179329}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/CarvalhoP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ChenQZHZ11, author = {Zhi Chen and Meikang Qiu and Lei Zhang and Fei Hu and Senlin Zhang}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {{ILP} security optimization method for embedded systems with timing constraints}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {38}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179340}, doi = {10.1145/2179298.2179340}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/ChenQZHZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CreagerM11, author = {Douglas A. Creager and John McHugh}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Verified workflow-based software development for infrastructure sensing and control applications}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {18}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179318}, doi = {10.1145/2179298.2179318}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/CreagerM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DasguptaAASSC11, author = {Dipankar Dasgupta and Mohd. Hassan Ali and Robert K. Abercrombie and Bob G. Schlicher and Frederick T. Sheldon and Marco Carvalho}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Secure {VM} for monitoring industrial process controllers}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {39}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179341}, doi = {10.1145/2179298.2179341}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DasguptaAASSC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DasguptaR11, author = {Dipankar Dasgupta and Md. Moshiur Rahman}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A framework for estimating security coverage for cloud service insurance}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {40}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179342}, doi = {10.1145/2179298.2179342}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/DasguptaR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/EdgarMC11, author = {Thomas W. Edgar and David O. Manz and Thomas E. Carroll}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Towards an experimental testbed facility for cyber-physical security research}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {53}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179357}, doi = {10.1145/2179298.2179357}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/EdgarMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ErbacherBC11, author = {Robert F. Erbacher and Anupama Biswas and Trent Cameron}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A novel data reduction technique}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {35}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179336}, doi = {10.1145/2179298.2179336}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ErbacherBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ErbacherHE11, author = {Robert F. Erbacher and Steve E. Hutchinson and Joshua Edwards}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Web traffic profiling and characterization}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {71}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179380}, doi = {10.1145/2179298.2179380}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ErbacherHE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/FerragutB11, author = {Erik M. Ferragut and Nicole Braden}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {System log summarization via semi-Markov models of inter-arrival times}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {44}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179346}, doi = {10.1145/2179298.2179346}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/FerragutB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Frincke11, author = {Debra Frincke}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {National Laboratory panel}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {15}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179314}, doi = {10.1145/2179298.2179314}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Frincke11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GamageARM11, author = {Thoshitha T. Gamage and Ravi Akella and Thomas P. Roth and Bruce M. McMillin}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Information flow security in cyber-physical systems}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {52}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179356}, doi = {10.1145/2179298.2179356}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GamageARM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GasiorY11, author = {Wade Gasior and Li Yang}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Network covert channels on the Android platform}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {61}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179367}, doi = {10.1145/2179298.2179367}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/GasiorY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Guo11, author = {Terry N. Guo}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Distributed radio relay for communication and control with physical-layer security in smart grid}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {72}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179381}, doi = {10.1145/2179298.2179381}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Guo11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GuoTJ11, author = {Yonghe Guo and Chee{-}Wooi Ten and Panida Jirutitijaroen}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Data integrity validation framework for distribution system operations}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {73}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179382}, doi = {10.1145/2179298.2179382}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/GuoTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HamlenLKTY11, author = {Kevin W. Hamlen and Peng Liu and Murat Kantarcioglu and Bhavani Thuraisingham and Ting Yu}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Identity management for cloud computing: developments and directions}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {32}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179333}, doi = {10.1145/2179298.2179333}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/HamlenLKTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HarbortLH11, author = {Zach Harbort and George Louthan and John Hale}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Techniques for attack graph visualization and interaction}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {74}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179383}, doi = {10.1145/2179298.2179383}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HarbortLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HaririEA11, author = {Salim Hariri and Mohamed Eltoweissy and Youssif B. Al{-}Nashif}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {BioRAC: biologically inspired resilient autonomic cloud}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {80}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179389}, doi = {10.1145/2179298.2179389}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/HaririEA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Hawk11, author = {Carol Hawk}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Working to achieve cybersecurity in the energy sector}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {2}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179301}, doi = {10.1145/2179298.2179301}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Hawk11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Hawk11a, author = {Carol Hawk}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Key questions for the day on cryptographic key management}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {14}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179313}, doi = {10.1145/2179298.2179313}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Hawk11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/HeckmanSR11, author = {Mark R. Heckman and Roger R. Schell and Edwards E. Reed}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Using a high assurance {TCB} for infrastructure security}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {55}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179359}, doi = {10.1145/2179298.2179359}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/HeckmanSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Hoffman11, author = {Patricia Hoffman}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Energy infrastructure cyber protection: protecting our critical infrastructure}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {1}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179300}, doi = {10.1145/2179298.2179300}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Hoffman11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Jarzombeck11, author = {Joe Jarzombeck}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Software assurance: mitigating risk of zero-day attacks and enabling resilience of cyber infrastructure}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {5}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179304}, doi = {10.1145/2179298.2179304}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Jarzombeck11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/JaskolkaKS11, author = {Jason Jaskolka and Ridha Kh{\'{e}}dri and Khair Eddin Sabri}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A formal test for detecting information leakage via covert channels}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {41}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179343}, doi = {10.1145/2179298.2179343}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/JaskolkaKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KatipallyYL11, author = {Rajeshwar Katipally and Li Yang and Anyi Liu}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Attacker behavior analysis in multi-stage attack detection system}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {63}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179369}, doi = {10.1145/2179298.2179369}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/KatipallyYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KhatuaMC11, author = {Sunirmal Khatua and Nandini Mukherjee and Nabendu Chaki}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A new agent based security framework for collaborative cloud environment}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {76}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179385}, doi = {10.1145/2179298.2179385}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/KhatuaMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KimS11, author = {Yoohwan Kim and Frederick T. Sheldon}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Anomaly detection in multiple scale for insider threat analysis}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {77}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179386}, doi = {10.1145/2179298.2179386}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KimS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KirschGAS11, author = {Jonathan Kirsch and Stuart Goose and Yair Amir and Paul M. Skare}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Toward survivable {SCADA}}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {21}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179321}, doi = {10.1145/2179298.2179321}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KirschGAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/KringsBAAD11, author = {Axel W. Krings and Victor Balogun and Saad Alshomrani and Ahmed Abdel{-}Rahim and Mike Dixon}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A measurement-based design and evaluation methodology for embedded control systems}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {34}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179335}, doi = {10.1145/2179298.2179335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/KringsBAAD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LiZQZS11, author = {Jiayin Li and Daigu Zhang and Meikang Qiu and Yongxin Zhu and Ju Shen}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Security protection on {FPGA} against differential power analysis attacks}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {67}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179375}, doi = {10.1145/2179298.2179375}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LiZQZS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LingerPPS11, author = {Richard C. Linger and Mark G. Pleszkoch and Stacy J. Prowell and Kirk Sayre}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Behavior computation for smart grid software analysis}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {51}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179354}, doi = {10.1145/2179298.2179354}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LingerPPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LiuFKZB11, author = {Shan Liu and Xianyong Feng and Deepa Kundur and Takis Zourntos and Karen L. Butler{-}Purry}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A class of cyber-physical switching attacks for power system disruption}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {16}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179316}, doi = {10.1145/2179298.2179316}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LiuFKZB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LouthanHHH11, author = {George Louthan and Phoebe Hardwicke and Peter J. Hawrylak and John Hale}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Toward hybrid attack dependency graphs}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {62}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179368}, doi = {10.1145/2179298.2179368}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/LouthanHHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LuB11, author = {Chen Lu and Richard R. Brooks}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Botnet traffic detection using hidden Markov models}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {31}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179332}, doi = {10.1145/2179298.2179332}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/LuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LuDPGGH11, author = {Ning Lu and Pengwei Du and Patrick R. Paulson and Frank L. Greitzer and Xinxin Guo and Mark Hadley}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A predictive defense system for the smart grid}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {29}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179330}, doi = {10.1145/2179298.2179330}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/LuDPGGH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MaCZKS11, author = {Zhanshan (Sam) Ma and Hongju (Daisy) Chen and Jiajin Zhang and Axel W. Krings and Frederick T. Sheldon}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {42}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179344}, doi = {10.1145/2179298.2179344}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MaCZKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MathewosCH11, author = {Bereket Mathewos Hambebo and Marco M. Carvalho and Fredric M. Ham}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Network traffic classification using a parallel neural network classifier architecture}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {33}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179334}, doi = {10.1145/2179298.2179334}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MathewosCH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Maughan11, author = {Doug Maughan}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Federal R{\&}D landscape and {DHS} S{\&}T overview}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {4}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179303}, doi = {10.1145/2179298.2179303}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Maughan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MayoA11, author = {Jackson R. Mayo and Robert C. Armstrong}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Tradeoffs in targeted fuzzing of cyber systems by defenders and attackers}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {37}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179339}, doi = {10.1145/2179298.2179339}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MayoA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McDonaldKK11, author = {Jeffrey Todd McDonald and Yong C. Kim and Daniel J. Koranek}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Deterministic circuit variation for anti-tamper applications}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {68}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179376}, doi = {10.1145/2179298.2179376}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/McDonaldKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McDuffie11, author = {Ernest McDuffie}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {{NICE:} National Initiative for Cybersecurity Education}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {12}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179311}, doi = {10.1145/2179298.2179311}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McDuffie11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/McMinnBRR11, author = {Lucille McMinn and Jonathan Butts and David Robinson and Billy Rios}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Exploiting the critical infrastructure via nontraditional system inputs}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {57}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179361}, doi = {10.1145/2179298.2179361}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/McMinnBRR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MichaelsA11, author = {Alan Michaels and Josef Allen}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Physical-layer encryption for enhanced cyber-physical security}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {45}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179347}, doi = {10.1145/2179298.2179347}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MichaelsA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MihaljevicIDKW11, author = {Miodrag J. Mihaljevic and Hideki Imai and Michael W. David and Kazukuni Kobara and Hajime Watanabe}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {On advanced cryptographic techniques for information security of smart grid {AMI}}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {64}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179371}, doi = {10.1145/2179298.2179371}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MihaljevicIDKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MishtalSK11, author = {Aaron Mishtal and Craig A. Shue and Stephen Kelley}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A system for intelligent substitution of named entities with applications to the automatic generation of honey tokens}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {43}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179345}, doi = {10.1145/2179298.2179345}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MishtalSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MorrisPLMYKFM11, author = {Thomas H. Morris and Shengyi Pan and Jeremy Lewis and Jonathan Moorhead and Nicolas H. Younan and Roger L. King and Mark Freund and Vahid Madani}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {24}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179324}, doi = {10.1145/2179298.2179324}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MorrisPLMYKFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MorrisVD11, author = {Thomas H. Morris and Rayford B. Vaughn and Yoginder S. Dandass}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A testbed for {SCADA} control system cybersecurity research and pedagogy}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {27}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179327}, doi = {10.1145/2179298.2179327}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/MorrisVD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/NolanC11, author = {Rich Nolan and Peter P. Chen}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Supporting velocity of investigation with behavior analysis of malware}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {49}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179352}, doi = {10.1145/2179298.2179352}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/NolanC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/OlmsteadSA11, author = {Summer{-}Mistine Olmstead and Joseph Stites and Ferrol Aderholdt}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {A layer cyber security defense strategy for smart grid programmable logic controllers}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {78}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179387}, doi = {10.1145/2179298.2179387}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/OlmsteadSA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Osborn11, author = {Robert Osborn}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Transforming {NNSA} information, collaboration and security}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {3}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179302}, doi = {10.1145/2179298.2179302}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Osborn11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/OzcelikB11, author = {Ilker {\"{O}}z{\c{c}}elik and Richard R. Brooks}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Security experimentation using operational systems}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {79}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179388}, doi = {10.1145/2179298.2179388}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/OzcelikB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Piotrowski11, author = {Victor Piotrowski}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {{NSF} investments in cybersecurity research and education}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {13}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179312}, doi = {10.1145/2179298.2179312}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Piotrowski11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/PolveriniP11, author = {Becker Polverini and William M. Pottenger}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Using clustering to detect Chinese censorware}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {30}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179331}, doi = {10.1145/2179298.2179331}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/PolveriniP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/RanjanZ11, author = {Gyan Ranjan and Zhi{-}Li Zhang}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {How to glue a robust smart-grid?: a "finite-network" theory for interdependent network robustness}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {22}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179322}, doi = {10.1145/2179298.2179322}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/RanjanZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/RodriguesBP11, author = {Aniket Rodrigues and Tish Best and Ravi Pendse}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {{SCADA} security device: design and implementation}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {25}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179325}, doi = {10.1145/2179298.2179325}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/RodriguesBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Sastry11, author = {Shankar Sastry}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Towards a theory of high confidence networked control systems: action webs}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {8}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179307}, doi = {10.1145/2179298.2179307}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/Sastry11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SilkL11, author = {Jennifer Silk and Matthew E. Luallen}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Plenary Speakers: Jennifer Silk, White House and Matthew E. Luallen, {SANS}}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {6}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179305}, doi = {10.1145/2179298.2179305}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SilkL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SousanGZM11, author = {William L. Sousan and Robin A. Gandhi and Qiuming Zhu and William R. Mahoney}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Using anomalous event patterns in control systems for tamper detection}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {26}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179326}, doi = {10.1145/2179298.2179326}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SousanGZM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SuQCLQ11, author = {Hai Su and Meikang Qiu and Huimin Chen and Zhonghai Lu and Xiao Qin}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Jamming-resilient multi-radio multi-channel multihop wireless network for smart grid}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {65}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179372}, doi = {10.1145/2179298.2179372}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SuQCLQ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SubramanianSBK11, author = {Vimalathithan Subramanian and Remzi Seker and Jiang Bian and Nitin Kanaskar}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Collaborations, mergers, acquisitions, and security policy conflict analysis}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {36}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179337}, doi = {10.1145/2179298.2179337}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/SubramanianSBK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/TaylorS11, author = {Curtis Taylor and Craug Shue}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Implementing a "moving target" system to protect servers}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {48}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179350}, doi = {10.1145/2179298.2179350}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/TaylorS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/TaylorS11a, author = {Curtis R. Taylor and Craig A. Shue}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Implementing a "moving target" system to protect servers}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {81}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179390}, doi = {10.1145/2179298.2179390}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/TaylorS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/VelagapalliR11, author = {Arun Velagapalli and Mahalingam Ramkumar}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Minimizing the {TCB} for securing {SCADA} systems}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {19}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179319}, doi = {10.1145/2179298.2179319}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/VelagapalliR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/VishikRRGW11, author = {Claire Vishik and Anand Rajan and Chris Ramming and David Grawrock and Jesse Walker}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Defining trust evidence: research directions}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {66}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179373}, doi = {10.1145/2179298.2179373}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/VishikRRGW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WeiPC11, author = {Jinpeng Wei and Calton Pu and Keke Chen}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {69}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179377}, doi = {10.1145/2179298.2179377}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WeiPC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YangSM11, author = {Li Yang and Mina Sartipi and Matt McNeely}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Usable protection to healthcare application}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {82}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179391}, doi = {10.1145/2179298.2179391}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/YangSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YasinsacA11, author = {Alec Yasinsac and Jonathan Alawine}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Insider-free systems}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {75}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179384}, doi = {10.1145/2179298.2179384}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/YasinsacA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YuB11, author = {Lu Yu and Richard R. Brooks}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Observable subspace solution for irreducible POMDPs with infinite horizon}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {83}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179392}, doi = {10.1145/2179298.2179392}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/YuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZalewskiDMK11, author = {Janusz Zalewski and Steven Drager and William McKeever and Andrew J. Kornecki}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Can we measure security and how?}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {46}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179348}, doi = {10.1145/2179298.2179348}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/ZalewskiDMK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csiirw/2011, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, publisher = {{ACM}}, year = {2011}, url = {http://dl.acm.org/citation.cfm?id=2179298}, isbn = {978-1-4503-0945-5}, timestamp = {Thu, 10 Jan 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.