Search dblp for Publications

export results for "toc:db/conf/csiirw/csiirw2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csiirw/AbercrombieSADRBKN11,
  author       = {Robert K. Abercrombie and
                  Frederick T. Sheldon and
                  Hal Aldridge and
                  Michael Duren and
                  Tracy Ricci and
                  Elisa Bertino and
                  N. Athula Kulatunga and
                  Uditha Navaratne},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Secure cryptographic key management system {(CKMS)} considerations
                  for smart grid devices},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {59},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179364},
  doi          = {10.1145/2179298.2179364},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AbercrombieSADRBKN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Akers11,
  author       = {Gregory Neal Akers},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Plenary Speaker: Gregory Neal Akers, {CISCO}},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179308},
  doi          = {10.1145/2179298.2179308},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Akers11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Allen11,
  author       = {George J. Allen},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Plenary keynote Speaker: Major General George J. Allen, J5, {US} Cyber
                  Command},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179309},
  doi          = {10.1145/2179298.2179309},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Allen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AllenTLL11,
  author       = {Josef D. Allen and
                  Sereyvathana Ty and
                  Xiuwen Liu and
                  Ivan Lozano},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Preventing cascading event: a distributed cyber-physical approach},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {54},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179358},
  doi          = {10.1145/2179298.2179358},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AllenTLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AshokHG11,
  author       = {Aditya Ashok and
                  Adam Hahn and
                  Manimaran Govindarasu},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A cyber-physical security testbed for smart grid: system architecture
                  and studies},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {20},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179320},
  doi          = {10.1145/2179298.2179320},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AshokHG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/AzabE11,
  author       = {Mohamed Azab and
                  Mohamed Eltoweissy},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards a cooperative autonomous resilient defense platform for cyber-physical
                  systems},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {56},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179360},
  doi          = {10.1145/2179298.2179360},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/AzabE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BentonJK11,
  author       = {Kevin Benton and
                  Ju{-}Yeon Jo and
                  Yoohwan Kim},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {SignatureCheck: a protocol to detect man-in-the-middle attack in {SSL}},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {60},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179365},
  doi          = {10.1145/2179298.2179365},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/BentonJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BilarSH11,
  author       = {Daniel Bilar and
                  James Solderitsch and
                  Elvis Hovor},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Monitoring smart grid operations and maintaining mission assurance
                  through adaptive computer network defenses},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {17},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179317},
  doi          = {10.1145/2179298.2179317},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/BilarSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Blackwell11,
  author       = {Clive Blackwell},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Formally modeling the electricity grid with bigraphs},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {23},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179323},
  doi          = {10.1145/2179298.2179323},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Blackwell11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Brown11,
  author       = {Michael A. Brown},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Plenary Keynote Speaker: Rear Admiral Michael A. Brown, DoD/DHS},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179306},
  doi          = {10.1145/2179298.2179306},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Brown11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Bumgarner11,
  author       = {John Bumgarner},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Plenary Speaker: John Bumgarner, {U.S.} Cyber Consequences Unit},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {11},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179310},
  doi          = {10.1145/2179298.2179310},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Bumgarner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BurnsSL11,
  author       = {Luanne Burns and
                  Christina Selby and
                  Thomas A. Longstaff},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{DART3:} {DHS} assistant for R{\&}D tracking and technology transfer},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {70},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179379},
  doi          = {10.1145/2179298.2179379},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/BurnsSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ButlerHH11,
  author       = {Matthew Butler and
                  Peter J. Hawrylak and
                  John Hale},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Graceful privilege reduction in {RFID} security},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {47},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179349},
  doi          = {10.1145/2179298.2179349},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ButlerHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CalverGH11,
  author       = {Timothy Calver and
                  Michael R. Grimaila and
                  Jeffrey W. Humphries},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {An empirical analysis of the cascade error reconciliation protocol
                  for quantum key distribution},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {58},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179363},
  doi          = {10.1145/2179298.2179363},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/CalverGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Carter11,
  author       = {Jason Carter},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {An architecture for Concordia},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {50},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179353},
  doi          = {10.1145/2179298.2179353},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Carter11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CarvalhoP11,
  author       = {Marco M. Carvalho and
                  Carlos Perez},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {An evolutionary multi-agent approach to anomaly detection and cyber
                  defense},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {28},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179329},
  doi          = {10.1145/2179298.2179329},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/CarvalhoP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ChenQZHZ11,
  author       = {Zhi Chen and
                  Meikang Qiu and
                  Lei Zhang and
                  Fei Hu and
                  Senlin Zhang},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{ILP} security optimization method for embedded systems with timing
                  constraints},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {38},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179340},
  doi          = {10.1145/2179298.2179340},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/ChenQZHZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CreagerM11,
  author       = {Douglas A. Creager and
                  John McHugh},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Verified workflow-based software development for infrastructure sensing
                  and control applications},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {18},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179318},
  doi          = {10.1145/2179298.2179318},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/CreagerM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DasguptaAASSC11,
  author       = {Dipankar Dasgupta and
                  Mohd. Hassan Ali and
                  Robert K. Abercrombie and
                  Bob G. Schlicher and
                  Frederick T. Sheldon and
                  Marco Carvalho},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Secure {VM} for monitoring industrial process controllers},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {39},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179341},
  doi          = {10.1145/2179298.2179341},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DasguptaAASSC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DasguptaR11,
  author       = {Dipankar Dasgupta and
                  Md. Moshiur Rahman},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A framework for estimating security coverage for cloud service insurance},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179342},
  doi          = {10.1145/2179298.2179342},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/DasguptaR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/EdgarMC11,
  author       = {Thomas W. Edgar and
                  David O. Manz and
                  Thomas E. Carroll},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards an experimental testbed facility for cyber-physical security
                  research},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {53},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179357},
  doi          = {10.1145/2179298.2179357},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/EdgarMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ErbacherBC11,
  author       = {Robert F. Erbacher and
                  Anupama Biswas and
                  Trent Cameron},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A novel data reduction technique},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {35},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179336},
  doi          = {10.1145/2179298.2179336},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ErbacherBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ErbacherHE11,
  author       = {Robert F. Erbacher and
                  Steve E. Hutchinson and
                  Joshua Edwards},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Web traffic profiling and characterization},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {71},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179380},
  doi          = {10.1145/2179298.2179380},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ErbacherHE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/FerragutB11,
  author       = {Erik M. Ferragut and
                  Nicole Braden},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {System log summarization via semi-Markov models of inter-arrival times},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {44},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179346},
  doi          = {10.1145/2179298.2179346},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/FerragutB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Frincke11,
  author       = {Debra Frincke},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {National Laboratory panel},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179314},
  doi          = {10.1145/2179298.2179314},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Frincke11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GamageARM11,
  author       = {Thoshitha T. Gamage and
                  Ravi Akella and
                  Thomas P. Roth and
                  Bruce M. McMillin},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Information flow security in cyber-physical systems},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {52},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179356},
  doi          = {10.1145/2179298.2179356},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GamageARM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GasiorY11,
  author       = {Wade Gasior and
                  Li Yang},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Network covert channels on the Android platform},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {61},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179367},
  doi          = {10.1145/2179298.2179367},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/GasiorY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Guo11,
  author       = {Terry N. Guo},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Distributed radio relay for communication and control with physical-layer
                  security in smart grid},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {72},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179381},
  doi          = {10.1145/2179298.2179381},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Guo11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GuoTJ11,
  author       = {Yonghe Guo and
                  Chee{-}Wooi Ten and
                  Panida Jirutitijaroen},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Data integrity validation framework for distribution system operations},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {73},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179382},
  doi          = {10.1145/2179298.2179382},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/GuoTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HamlenLKTY11,
  author       = {Kevin W. Hamlen and
                  Peng Liu and
                  Murat Kantarcioglu and
                  Bhavani Thuraisingham and
                  Ting Yu},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Identity management for cloud computing: developments and directions},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {32},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179333},
  doi          = {10.1145/2179298.2179333},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/HamlenLKTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HarbortLH11,
  author       = {Zach Harbort and
                  George Louthan and
                  John Hale},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Techniques for attack graph visualization and interaction},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {74},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179383},
  doi          = {10.1145/2179298.2179383},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HarbortLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HaririEA11,
  author       = {Salim Hariri and
                  Mohamed Eltoweissy and
                  Youssif B. Al{-}Nashif},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {BioRAC: biologically inspired resilient autonomic cloud},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {80},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179389},
  doi          = {10.1145/2179298.2179389},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/HaririEA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Hawk11,
  author       = {Carol Hawk},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Working to achieve cybersecurity in the energy sector},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179301},
  doi          = {10.1145/2179298.2179301},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Hawk11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Hawk11a,
  author       = {Carol Hawk},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Key questions for the day on cryptographic key management},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {14},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179313},
  doi          = {10.1145/2179298.2179313},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Hawk11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/HeckmanSR11,
  author       = {Mark R. Heckman and
                  Roger R. Schell and
                  Edwards E. Reed},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Using a high assurance {TCB} for infrastructure security},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {55},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179359},
  doi          = {10.1145/2179298.2179359},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/HeckmanSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Hoffman11,
  author       = {Patricia Hoffman},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Energy infrastructure cyber protection: protecting our critical infrastructure},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179300},
  doi          = {10.1145/2179298.2179300},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Hoffman11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Jarzombeck11,
  author       = {Joe Jarzombeck},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Software assurance: mitigating risk of zero-day attacks and enabling
                  resilience of cyber infrastructure},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179304},
  doi          = {10.1145/2179298.2179304},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Jarzombeck11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/JaskolkaKS11,
  author       = {Jason Jaskolka and
                  Ridha Kh{\'{e}}dri and
                  Khair Eddin Sabri},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A formal test for detecting information leakage via covert channels},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {41},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179343},
  doi          = {10.1145/2179298.2179343},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/JaskolkaKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KatipallyYL11,
  author       = {Rajeshwar Katipally and
                  Li Yang and
                  Anyi Liu},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Attacker behavior analysis in multi-stage attack detection system},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {63},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179369},
  doi          = {10.1145/2179298.2179369},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/KatipallyYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KhatuaMC11,
  author       = {Sunirmal Khatua and
                  Nandini Mukherjee and
                  Nabendu Chaki},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A new agent based security framework for collaborative cloud environment},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {76},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179385},
  doi          = {10.1145/2179298.2179385},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/KhatuaMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KimS11,
  author       = {Yoohwan Kim and
                  Frederick T. Sheldon},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Anomaly detection in multiple scale for insider threat analysis},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {77},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179386},
  doi          = {10.1145/2179298.2179386},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KimS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KirschGAS11,
  author       = {Jonathan Kirsch and
                  Stuart Goose and
                  Yair Amir and
                  Paul M. Skare},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Toward survivable {SCADA}},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {21},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179321},
  doi          = {10.1145/2179298.2179321},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KirschGAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/KringsBAAD11,
  author       = {Axel W. Krings and
                  Victor Balogun and
                  Saad Alshomrani and
                  Ahmed Abdel{-}Rahim and
                  Mike Dixon},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A measurement-based design and evaluation methodology for embedded
                  control systems},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {34},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179335},
  doi          = {10.1145/2179298.2179335},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/KringsBAAD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LiZQZS11,
  author       = {Jiayin Li and
                  Daigu Zhang and
                  Meikang Qiu and
                  Yongxin Zhu and
                  Ju Shen},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Security protection on {FPGA} against differential power analysis
                  attacks},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {67},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179375},
  doi          = {10.1145/2179298.2179375},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LiZQZS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LingerPPS11,
  author       = {Richard C. Linger and
                  Mark G. Pleszkoch and
                  Stacy J. Prowell and
                  Kirk Sayre},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Behavior computation for smart grid software analysis},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {51},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179354},
  doi          = {10.1145/2179298.2179354},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LingerPPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LiuFKZB11,
  author       = {Shan Liu and
                  Xianyong Feng and
                  Deepa Kundur and
                  Takis Zourntos and
                  Karen L. Butler{-}Purry},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A class of cyber-physical switching attacks for power system disruption},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {16},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179316},
  doi          = {10.1145/2179298.2179316},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LiuFKZB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LouthanHHH11,
  author       = {George Louthan and
                  Phoebe Hardwicke and
                  Peter J. Hawrylak and
                  John Hale},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Toward hybrid attack dependency graphs},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {62},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179368},
  doi          = {10.1145/2179298.2179368},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/LouthanHHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LuB11,
  author       = {Chen Lu and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Botnet traffic detection using hidden Markov models},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {31},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179332},
  doi          = {10.1145/2179298.2179332},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/LuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LuDPGGH11,
  author       = {Ning Lu and
                  Pengwei Du and
                  Patrick R. Paulson and
                  Frank L. Greitzer and
                  Xinxin Guo and
                  Mark Hadley},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A predictive defense system for the smart grid},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {29},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179330},
  doi          = {10.1145/2179298.2179330},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/LuDPGGH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MaCZKS11,
  author       = {Zhanshan (Sam) Ma and
                  Hongju (Daisy) Chen and
                  Jiajin Zhang and
                  Axel W. Krings and
                  Frederick T. Sheldon},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Has the cyber warfare threat been overstated?: a cheap talk game-theoretic
                  analysis on the Google-hacking claim?},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {42},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179344},
  doi          = {10.1145/2179298.2179344},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MaCZKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MathewosCH11,
  author       = {Bereket Mathewos Hambebo and
                  Marco M. Carvalho and
                  Fredric M. Ham},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Network traffic classification using a parallel neural network classifier
                  architecture},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {33},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179334},
  doi          = {10.1145/2179298.2179334},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MathewosCH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Maughan11,
  author       = {Doug Maughan},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Federal R{\&}D landscape and {DHS} S{\&}T overview},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179303},
  doi          = {10.1145/2179298.2179303},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Maughan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MayoA11,
  author       = {Jackson R. Mayo and
                  Robert C. Armstrong},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Tradeoffs in targeted fuzzing of cyber systems by defenders and attackers},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {37},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179339},
  doi          = {10.1145/2179298.2179339},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MayoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McDonaldKK11,
  author       = {Jeffrey Todd McDonald and
                  Yong C. Kim and
                  Daniel J. Koranek},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Deterministic circuit variation for anti-tamper applications},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {68},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179376},
  doi          = {10.1145/2179298.2179376},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/McDonaldKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McDuffie11,
  author       = {Ernest McDuffie},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{NICE:} National Initiative for Cybersecurity Education},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {12},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179311},
  doi          = {10.1145/2179298.2179311},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McDuffie11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/McMinnBRR11,
  author       = {Lucille McMinn and
                  Jonathan Butts and
                  David Robinson and
                  Billy Rios},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Exploiting the critical infrastructure via nontraditional system inputs},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {57},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179361},
  doi          = {10.1145/2179298.2179361},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/McMinnBRR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MichaelsA11,
  author       = {Alan Michaels and
                  Josef Allen},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Physical-layer encryption for enhanced cyber-physical security},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {45},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179347},
  doi          = {10.1145/2179298.2179347},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MichaelsA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MihaljevicIDKW11,
  author       = {Miodrag J. Mihaljevic and
                  Hideki Imai and
                  Michael W. David and
                  Kazukuni Kobara and
                  Hajime Watanabe},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {On advanced cryptographic techniques for information security of smart
                  grid {AMI}},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {64},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179371},
  doi          = {10.1145/2179298.2179371},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MihaljevicIDKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MishtalSK11,
  author       = {Aaron Mishtal and
                  Craig A. Shue and
                  Stephen Kelley},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A system for intelligent substitution of named entities with applications
                  to the automatic generation of honey tokens},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {43},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179345},
  doi          = {10.1145/2179298.2179345},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MishtalSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MorrisPLMYKFM11,
  author       = {Thomas H. Morris and
                  Shengyi Pan and
                  Jeremy Lewis and
                  Jonathan Moorhead and
                  Nicolas H. Younan and
                  Roger L. King and
                  Mark Freund and
                  Vahid Madani},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Cybersecurity risk testing of substation phasor measurement units
                  and phasor data concentrators},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {24},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179324},
  doi          = {10.1145/2179298.2179324},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MorrisPLMYKFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MorrisVD11,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A testbed for {SCADA} control system cybersecurity research and pedagogy},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {27},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179327},
  doi          = {10.1145/2179298.2179327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MorrisVD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/NolanC11,
  author       = {Rich Nolan and
                  Peter P. Chen},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Supporting velocity of investigation with behavior analysis of malware},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {49},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179352},
  doi          = {10.1145/2179298.2179352},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/NolanC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/OlmsteadSA11,
  author       = {Summer{-}Mistine Olmstead and
                  Joseph Stites and
                  Ferrol Aderholdt},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A layer cyber security defense strategy for smart grid programmable
                  logic controllers},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {78},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179387},
  doi          = {10.1145/2179298.2179387},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/OlmsteadSA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Osborn11,
  author       = {Robert Osborn},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Transforming {NNSA} information, collaboration and security},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179302},
  doi          = {10.1145/2179298.2179302},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Osborn11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/OzcelikB11,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Security experimentation using operational systems},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {79},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179388},
  doi          = {10.1145/2179298.2179388},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/OzcelikB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Piotrowski11,
  author       = {Victor Piotrowski},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{NSF} investments in cybersecurity research and education},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {13},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179312},
  doi          = {10.1145/2179298.2179312},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Piotrowski11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/PolveriniP11,
  author       = {Becker Polverini and
                  William M. Pottenger},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Using clustering to detect Chinese censorware},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {30},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179331},
  doi          = {10.1145/2179298.2179331},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/PolveriniP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/RanjanZ11,
  author       = {Gyan Ranjan and
                  Zhi{-}Li Zhang},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {How to glue a robust smart-grid?: a "finite-network" theory for interdependent
                  network robustness},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {22},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179322},
  doi          = {10.1145/2179298.2179322},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/RanjanZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/RodriguesBP11,
  author       = {Aniket Rodrigues and
                  Tish Best and
                  Ravi Pendse},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {{SCADA} security device: design and implementation},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {25},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179325},
  doi          = {10.1145/2179298.2179325},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/RodriguesBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Sastry11,
  author       = {Shankar Sastry},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Towards a theory of high confidence networked control systems: action
                  webs},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {8},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179307},
  doi          = {10.1145/2179298.2179307},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/Sastry11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SilkL11,
  author       = {Jennifer Silk and
                  Matthew E. Luallen},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Plenary Speakers: Jennifer Silk, White House and Matthew E. Luallen,
                  {SANS}},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179305},
  doi          = {10.1145/2179298.2179305},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SilkL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SousanGZM11,
  author       = {William L. Sousan and
                  Robin A. Gandhi and
                  Qiuming Zhu and
                  William R. Mahoney},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Using anomalous event patterns in control systems for tamper detection},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {26},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179326},
  doi          = {10.1145/2179298.2179326},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SousanGZM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SuQCLQ11,
  author       = {Hai Su and
                  Meikang Qiu and
                  Huimin Chen and
                  Zhonghai Lu and
                  Xiao Qin},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Jamming-resilient multi-radio multi-channel multihop wireless network
                  for smart grid},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {65},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179372},
  doi          = {10.1145/2179298.2179372},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SuQCLQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SubramanianSBK11,
  author       = {Vimalathithan Subramanian and
                  Remzi Seker and
                  Jiang Bian and
                  Nitin Kanaskar},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Collaborations, mergers, acquisitions, and security policy conflict
                  analysis},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {36},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179337},
  doi          = {10.1145/2179298.2179337},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/SubramanianSBK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/TaylorS11,
  author       = {Curtis Taylor and
                  Craug Shue},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Implementing a "moving target" system to protect servers},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {48},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179350},
  doi          = {10.1145/2179298.2179350},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/TaylorS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/TaylorS11a,
  author       = {Curtis R. Taylor and
                  Craig A. Shue},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Implementing a "moving target" system to protect servers},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {81},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179390},
  doi          = {10.1145/2179298.2179390},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/TaylorS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VelagapalliR11,
  author       = {Arun Velagapalli and
                  Mahalingam Ramkumar},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Minimizing the {TCB} for securing {SCADA} systems},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {19},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179319},
  doi          = {10.1145/2179298.2179319},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/VelagapalliR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VishikRRGW11,
  author       = {Claire Vishik and
                  Anand Rajan and
                  Chris Ramming and
                  David Grawrock and
                  Jesse Walker},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Defining trust evidence: research directions},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {66},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179373},
  doi          = {10.1145/2179298.2179373},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/VishikRRGW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WeiPC11,
  author       = {Jinpeng Wei and
                  Calton Pu and
                  Keke Chen},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Flying under the radar: maintaining control of kernel without changing
                  kernel code or persistent data structures},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {69},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179377},
  doi          = {10.1145/2179298.2179377},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WeiPC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YangSM11,
  author       = {Li Yang and
                  Mina Sartipi and
                  Matt McNeely},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Usable protection to healthcare application},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {82},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179391},
  doi          = {10.1145/2179298.2179391},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/YangSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YasinsacA11,
  author       = {Alec Yasinsac and
                  Jonathan Alawine},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Insider-free systems},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {75},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179384},
  doi          = {10.1145/2179298.2179384},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/YasinsacA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YuB11,
  author       = {Lu Yu and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Observable subspace solution for irreducible POMDPs with infinite
                  horizon},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {83},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179392},
  doi          = {10.1145/2179298.2179392},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/YuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZalewskiDMK11,
  author       = {Janusz Zalewski and
                  Steven Drager and
                  William McKeever and
                  Andrew J. Kornecki},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Can we measure security and how?},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {46},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179348},
  doi          = {10.1145/2179298.2179348},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZalewskiDMK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2011,
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {http://dl.acm.org/citation.cfm?id=2179298},
  isbn         = {978-1-4503-0945-5},
  timestamp    = {Thu, 10 Jan 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics