Papers

Search results

    ConferenceTitleAuthor(s)
    CSET '20On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat IntelligenceDaisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, Alvin Cheng
    CSET '20Bridging Missing Gaps in Evaluating DDoS ResearchLumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li
    CSET '20Historical Analysis of Exploit Availability TimelinesAllen D. Householder, Jeff Chrabaszcz, Trent Novelly, David Warren, Jonathan M. Spring
    CSET '20Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK TechniquesSeungoh Choi, Jongwon Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim
    CSET '20UBCIS: Ultimate Benchmark for Container Image ScanningShay Berkovich, Jeffrey Kam, Glenn Wurster
    CSET '20HAI 1.0: HIL-based Augmented ICS Security DatasetHyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim
    CSET '20Towards Adversarial Phishing DetectionThomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen
    CSET '20Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)Kayla Afanador, Cynthia Irvine
    CSET '20Toward Orchestration of Complex Networking ExperimentsAlefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel
    CSET '20APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack SequencesYusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka
    CSET '20ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security ResourceBenjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince, David Hutchison
    CSET '19An Assessment of the Usability of Cybercrime DatasetsIldiko Pete, Yi Ting Chua
    CSET '19Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence SharingJosiah Dykstra, Matt Fante, Paul Donahue, Dawn Varva, Linda Wilk, Amanda Johnson
    CSET '19Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized Through Software DebloatingMichael D. Brown, Santosh Pande
    CSET '19Triton: A Software-Reconfigurable Federated Avionics TestbedSam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko
    CSET '19A Multi-level Fidelity Microgrid Testbed Model for Cybersecurity ExperimentationAditya Ashok, Siddharth Sridhar, Tamara Becejac, Theora Rice, Matt Engels, Scott Harpool, Mark Rice, Thomas Edgar
    CSET '19Implementation of Programmable CPS Testbed for Anomaly DetectionHyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim
    CSET '19A Data-Driven Reflection on 36 Years of Security and Privacy ResearchAniqua Baset, Tamara Denning
    CSET '19Percentages, Probabilities and Professions of PerformanceJim Alves-Foss
    CSET '19The Impact of Secure Transport Protocols on Phishing EfficacyZane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph D. Barnes, Joshua Mason, Michael Bailey
    CSET '19Comparative Measurement of Cache Configurations’ Impacts on Cache Timing Side-Channel AttacksXiaodong Yu, Ya Xiao, Kirk Cameron, Danfeng (Daphne) Yao
    CSET '19Automated Attack Discovery in Data Plane SystemsQiao Kang, Jiarong Xing, Ang Chen
    CSET '19Design and Implementation of a Cyber Physical Testbed for Security TrainingPaul Pfister, Mathew L. Wymore, Doug Jacobson, Daji Qiao
    CSET '19Lessons Learned from 10k Experiments to Compare Virtual and Physical TestbedsJonathan Crussell, Thomas M. Kroeger, David Kavaler, Aaron Brown, Cynthia Phillips
    CSET '19CAERUS: Chronoscopic Assessment Engine for Recovering Undocumented SpecificationsAdam Seitz, Adam Satar, Brian Burke, Lok Yan, Zachary Estrada

Pages