default search action
HotSoS 2014: Raleigh, NC, USA
- Laurie A. Williams, David M. Nicol, Munindar P. Singh:
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014. ACM 2014, ISBN 978-1-4503-2907-1 - Michael Maass, William L. Scherlis, Jonathan Aldrich:
In-nimbo sandboxing. 1 - Bradley R. Schmerl, Javier Cámara, Jeffrey Gennari, David Garlan, Paulo Casanova, Gabriel A. Moreno, Thomas J. Glazier, Jeffrey M. Barnes:
Architecture-based self-protection: composing and reasoning about denial-of-service mitigations. 2 - Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
A rewriting-based forwards semantics for Maude-NPA. 3 - Joan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright:
Open vs. closed systems for accountability. 4 - Jason Tyler King, Laurie A. Williams:
Log your CRUD: design principles for software logging mechanisms. 5 - Gaofeng Da, Maochao Xu, Shouhuai Xu:
A new approach to modeling and analyzing security of networked systems. 6 - Ashwini Rao, Hanan Hibshi, Travis D. Breaux, Jean-Michel Lehker, Jianwei Niu:
Less is more?: investigating the role of examples in security studies using analogical transfer. 7 - Rucha Tembe, Olga A. Zielinska, Yuqi Liu, Kyung Wha Hong, Emerson R. Murphy-Hill, Christopher B. Mayhorn, Xi Ge:
Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples. 8 - Lucas Layman, Sylvain David Diffo, Nico Zazworka:
Human factors in webserver log file analysis: a controlled experiment on investigating malicious activity. 9 - Yujuan Han, Wenlian Lu, Shouhuai Xu:
Characterizing the power of moving target defense via cyber epidemic dynamics. 10 - Anupam Das, Nikita Borisov, Matthew Caesar:
Analyzing an adaptive reputation metric for anonymity systems. 11 - Sayan Mitra:
Proving abstractions of dynamical systems through numerical simulations. 12 - Shouhuai Xu:
Emergent behavior in cybersecurity. 13 - Shouhuai Xu:
Cybersecurity dynamics. 14 - Lucas Layman, Nico Zazworka:
InViz: instant visualization of security attacks. 15 - Arnab Ray, Rance Cleaveland:
An analysis method for medical device security. 16 - Jingwei Huang, David M. Nicol:
Evidence-based trust reasoning. 17 - Darya Kurilova, Cyrus Omar, Ligia Nistor, Benjamin Chung, Alex Potanin, Jonathan Aldrich:
Type-specific languages to fight injection attacks. 18 - Trisha Biswas, Kendra Lesser, Rudra Dutta, Meeko M. K. Oishi:
Examining reliability of wireless multihop network routing with linear systems. 19 - Naseem Ibrahim:
Trustworthy context-dependent services. 20 - Phuong Cao, Key-whan Chung, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell:
Preemptive intrusion detection. 21 - Phuong Cao, Hongyang Li, Klara Nahrstedt, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell:
Personalized password guessing: a new security threat. 22 - Christian Kästner, Jürgen Pfeffer:
Limiting recertification in highly configurable systems: analyzing interactions and isolation among configuration options. 23 - Alain Forget, Saranga Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Rahul Telang:
Building the security behavior observatory: an infrastructure for long-term monitoring of client machines. 24 - Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Channel correlation modeling for link signature security assessment. 25 - Xianqing Yu, Peng Ning, Mladen A. Vouk:
Securing Hadoop in cloud. 26 - Lisa J. K. Durbeck, Peter M. Athanas, Nicholas J. Macias:
Secure-by-construction composable componentry for network processing. 27 - JeeHyun Hwang, Laurie A. Williams, Mladen A. Vouk:
Access control policy evolution: an empirical study. 28 - Roopak Venkatakrishnan, Mladen A. Vouk:
Diversity-based detection of security anomalies. 29 - Ebrahim Khalaj, Radu Vanciu, Marwan Abi-Antoun:
Is there value in reasoning about security at the architectural level: a comparative evaluation. 30 - Agnes Davis, Ashwin Shashidharan, Qian Liu, William Enck, Anne McLaughlin, Benjamin Watson:
Insecure behaviors on mobile devices under stress. 31 - Wei Yang, Xusheng Xiao, Rahul Pandita, William Enck, Tao Xie:
Improving mobile application security via bridging user expectations and application behaviors. 32 - Qian Liu, Juhee Bae, Benjamin Watson, Anne McLaughlin, William Enck:
Modeling and sensing risky user behavior on mobile devices. 33 - Arpan Chakraborty, Brent E. Harrison, Pu Yang, David L. Roberts, Robert St. Amant:
Exploring key-level analytics for computational modeling of typing behavior. 34 - Shweta Subramani, Mladen A. Vouk, Laurie A. Williams:
An analysis of Fedora security profile. 35
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.