All Stories

  1. Optimizing IDS rule placement via set covering with capacity constraints
  2. Resilience and performance quantification of dynamic reconfiguration
  3. Classifying Human-Generated and AI-Generated Election Claims in Social Media
  4. A framework for designing vulnerability metrics
  5. Measuring the Impact of Cyber Attacks on Complex Systems
  6. Dependency Graphs
  7. Biometric multi‐factor authentication: On the usability of the FingerPIN scheme
  8. A Formal Model for Credential Hopping Attacks
  9. Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses
  10. FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers
  11. Performance Modeling of Moving Target Defenses with Reconfiguration Limits
  12. Security and trust in cloud application life-cycle management
  13. A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
  14. SCIBORG: Secure Configurations for the IoT Based on optimization and Reasoning on Graphs
  15. Adaptive Cyber Defenses for Botnet Detection and Mitigation
  16. Moving Target Defense Quantification
  17. Online and Scalable Adaptive Cyber Defense
  18. Proactive Defense Through Deception
  19. DeBot: A novel network‐based mechanism to detect exfiltration by architectural stealthy botnets
  20. Measuring the Effectiveness of Network Deception
  21. On Defensive Cyber Deception: A Case Study Using SDN
  22. MTD 2018
  23. A Quantitative Framework to Model Advanced Persistent Threats
  24. Defending from Stealthy Botnets Using Moving Target Defenses
  25. From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field
  26. Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning
  27. Performance Modeling of Moving Target Defenses
  28. A Graphical Model to Assess the Impact of Multi-Step Attacks
  29. From idea to prototype: Introducing students to entrepreneurship
  30. A Framework for Moving Target Defense Quantification
  31. Computer-Aided Human Centric Cyber Situation Awareness
  32. An Integrated Framework for Cyber Situation Awareness
  33. A Moving Target Defense Approach to Disrupting Stealthy Botnets
  34. Moving Target Defense against DDoS Attacks
  35. A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
  36. A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud
  37. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks
  38. Deceiving Attackers by Creating a Virtual Attack Surface
  39. A deception based approach for defeating OS and service fingerprinting
  40. Disrupting stealthy botnets through strategic placement of detectors
  41. Security and Privacy Issues in Social Networks
  42. Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions
  43. Manipulating the attacker's view of a system's attack surface
  44. Next-generation technologies for preventing accidental death of children trapped in parked vehicles
  45. A probabilistic framework for jammer identification in MANETs
  46. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data
  47. A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices
  48. An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
  49. Attack Graph and Network Hardening
  50. Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance
  51. Conclusion
  52. Formation of Awareness
  53. Introduction
  54. Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions
  55. Linear-Time Network Hardening
  56. Minimum-Cost Network Hardening
  57. Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks
  58. Network Hardening
  59. Related Work
  60. An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities
  61. Securing Mission-Centric Operations in the Cloud
  62. A Logic Framework for Flexible and Security-Aware Service Composition
  63. Security-Aware Scheduling of Mission Tasks under Temporal Constraints
  64. A Multimedia Recommender System
  65. A moving target defense mechanism for MANETs based on identity virtualization
  66. A moving target defense approach for protecting resource-constrained distributed devices
  67. Recognizing Unexplained Behavior in Network Traffic
  68. Reliable mission deployment in vulnerable distributed systems
  69. Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models
  70. A Novel Strategy for Recommending Multimedia Objects and its Application in the Cultural Heritage Domain
  71. A Probabilistic Framework for Distributed Localization of Attackers in MANETs
  72. Measuring Trust in Big Data
  73. Automated Coding of Decision Support Variables
  74. Time-efficient and cost-effective network hardening using attack graphs
  75. A Probabilistic Framework for Localization of Attackers in MANETs
  76. Cauldron mission-centric cyber situational awareness with defense in depth
  77. A Novel Strategy for Recommending Multimedia Objects and its Application in the Cultural Heritage Domain
  78. A Multimedia Semantic Recommender System for Cultural Heritage Applications
  79. PLINI: A Probabilistic Logic Program Framework for Inconsistent News Information
  80. Scalable Analysis of Attack Scenarios
  81. Scalable Detection of Cyber Attacks
  82. PADS: A Probabilistic Activity Detection Framework for Video Data
  83. Capturing user behavior in multimedia recommenders
  84. A multimedia recommender integrating object features and user behavior
  85. A ranking method for multimedia recommenders
  86. Modeling recommendation as a social choice problem
  87. Semantic Video Content Analysis
  88. A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video*
  89. A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video
  90. MAGIC: A Multi-Activity Graph Index for Activity Detection
  91. CARA: A Cultural-Reasoning Architecture
  92. Story creation from heterogeneous data sources
  93. The priority curve algorithm for video summarization
  94. Experience of Animate Similarity Concepts in Multimedia Database
  95. Information Retrieval from the Web: An Interactive Paradigm
  96. A Formal Model for Video Shot Segmentation and its Application via Animate Vision
  97. A multimedia data base browsing system
  98. A web personalization system based on web usage mining techniques
  99. The priority curve algorithm for video summarization
  100. Web personalization based on static information and dynamic user behavior
  101. A web personalization system based on web usage mining techniques