All Stories

  1. An attack volume metric
  2. Dependency Graphs
  3. Biometric multi‐factor authentication: On the usability of the FingerPIN scheme
  4. A Formal Model for Credential Hopping Attacks
  5. Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses
  6. FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers
  7. Performance Modeling of Moving Target Defenses with Reconfiguration Limits
  8. Security and trust in cloud application life-cycle management
  9. A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
  10. SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs
  11. Adaptive Cyber Defenses for Botnet Detection and Mitigation
  12. Moving Target Defense Quantification
  13. Online and Scalable Adaptive Cyber Defense
  14. Proactive Defense Through Deception
  15. DeBot: A novel network‐based mechanism to detect exfiltration by architectural stealthy botnets
  16. Measuring the Effectiveness of Network Deception
  17. On Defensive Cyber Deception: A Case Study Using SDN
  18. MTD 2018
  19. A Quantitative Framework to Model Advanced Persistent Threats
  20. Defending from Stealthy Botnets Using Moving Target Defenses
  21. From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field
  22. Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning
  23. Performance Modeling of Moving Target Defenses
  24. A Graphical Model to Assess the Impact of Multi-Step Attacks
  25. From idea to prototype: Introducing students to entrepreneurship
  26. A Framework for Moving Target Defense Quantification
  27. Computer-Aided Human Centric Cyber Situation Awareness
  28. An Integrated Framework for Cyber Situation Awareness
  29. A Moving Target Defense Approach to Disrupting Stealthy Botnets
  30. Moving Target Defense against DDoS Attacks
  31. A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
  32. A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud
  33. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks
  34. Deceiving Attackers by Creating a Virtual Attack Surface
  35. A deception based approach for defeating OS and service fingerprinting
  36. Disrupting stealthy botnets through strategic placement of detectors
  37. Security and Privacy Issues in Social Networks
  38. Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions
  39. Manipulating the attacker's view of a system's attack surface
  40. Next-generation technologies for preventing accidental death of children trapped in parked vehicles
  41. A probabilistic framework for jammer identification in MANETs
  42. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data
  43. A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices
  44. An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
  45. Attack Graph and Network Hardening
  46. Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance
  47. Conclusion
  48. Formation of Awareness
  49. Introduction
  50. Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions
  51. Linear-Time Network Hardening
  52. Minimum-Cost Network Hardening
  53. Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks
  54. Network Hardening
  55. Related Work
  56. An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
  57. Securing Mission-Centric Operations in the Cloud
  58. A Logic Framework for Flexible and Security-Aware Service Composition
  59. Security-Aware Scheduling of Mission Tasks under Temporal Constraints
  60. A Multimedia Recommender System
  61. A moving target defense mechanism for MANETs based on identity virtualization
  62. A moving target defense approach for protecting resource-constrained distributed devices
  63. Recognizing Unexplained Behavior in Network Traffic
  64. Reliable mission deployment in vulnerable distributed systems
  65. Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models
  66. A Novel Strategy for Recommending Multimedia Objects and its Application in the Cultural Heritage Domain
  67. A Probabilistic Framework for Distributed Localization of Attackers in MANETs
  68. Measuring Trust in Big Data
  69. Automated Coding of Decision Support Variables
  70. Time-efficient and cost-effective network hardening using attack graphs
  71. A Probabilistic Framework for Localization of Attackers in MANETs
  72. Cauldron mission-centric cyber situational awareness with defense in depth
  73. A Novel Strategy for Recommending Multimedia Objects and its Application in the Cultural Heritage Domain
  74. A Multimedia Semantic Recommender System for Cultural Heritage Applications
  75. PLINI: A Probabilistic Logic Program Framework for Inconsistent News Information
  76. Scalable Analysis of Attack Scenarios
  77. Scalable Detection of Cyber Attacks
  78. PADS: A Probabilistic Activity Detection Framework for Video Data
  79. Capturing user behavior in multimedia recommenders
  80. A multimedia recommender integrating object features and user behavior
  81. A ranking method for multimedia recommenders
  82. Modeling recommendation as a social choice problem
  83. Semantic Video Content Analysis
  84. A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video*
  85. A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video
  86. MAGIC: A Multi-Activity Graph Index for Activity Detection
  87. CARA: A Cultural-Reasoning Architecture
  88. Story creation from heterogeneous data sources
  89. The priority curve algorithm for video summarization
  90. Experience of Animate Similarity Concepts in Multimedia Database
  91. Information Retrieval from the Web: An Interactive Paradigm
  92. A Formal Model for Video Shot Segmentation and its Application via Animate Vision
  93. A multimedia data base browsing system
  94. A web personalization system based on web usage mining techniques
  95. The priority curve algorithm for video summarization
  96. Web personalization based on static information and dynamic user behavior