Export 8 results:
Filters: Author is Michael E. Locasto  [Clear All Filters]
Weiss R, Turbak F, Mache J, Nilsen E, Locasto ME.  2016.  Finding the Balance Between Guidance and Independence in Cybersecurity Exercises. 2016 {USENIX} Workshop on Advances in Security Education ({ASE} 16).
Williamson JF, Bratus S, Locasto ME.  2011.  Using Active Intrusion Detection to Recover Network Trust. 25th Large Installation System Administration Conference ({LISA} 11).
Bratus S, Kotz D, Tan K, Taylor W, Shubina A, Vance B, Locasto ME.  2009.  Dartmouth Internet Security Testbed (DIST): Building a Campus-wide Wireless Testbed. 2nd Workshop on Cyber Security Experimentation and Test ({CSET} 09).
Locasto ME, Burnside M, Bethea D.  2009.  Pushing Boulders Uphill: The Difficulty of Network Intrusion Recovery. 23rd Large Installation System Administration Conference ({LISA} 09).
Locasto ME, Stavrou A, Cretu GF, Keromytis AD.  2007.  From STEM to SEAD: Speculative Execution for Automated Defense . 2007 {USENIX} Annual Technical Conference ({USENIX} {ATC} 07).
Sidiroglou S, Locasto ME, Boyd SW, Keromytis AD.  2005.  Building a Reactive Immune System for Software Services. 2005 {USENIX} Annual Technical Conference ({USENIX} {ATC} 05).