CSET '20 | On Design and Enhancement of Smart Grid Honeypot System for Practical Collection of Threat Intelligence | Daisuke Mashima, Derek Kok, Wei Lin, Muhammad Hazwan, Alvin Cheng |
CSET '20 | Bridging Missing Gaps in Evaluating DDoS Research | Lumin Shi, Samuel Mergendahl, Devkishen Sisodia, Jun Li |
CSET '20 | Historical Analysis of Exploit Availability Timelines | Allen D. Householder, Jeff Chrabaszcz, Trent Novelly, David Warren, Jonathan M. Spring |
CSET '20 | Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques | Seungoh Choi, Jongwon Choi, Jeong-Han Yun, Byung-Gil Min, HyoungChun Kim |
CSET '20 | UBCIS: Ultimate Benchmark for Container Image Scanning | Shay Berkovich, Jeffrey Kam, Glenn Wurster |
CSET '20 | HAI 1.0: HIL-based Augmented ICS Security Dataset | Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim |
CSET '20 | Towards Adversarial Phishing Detection | Thomas Kobber Panum, Kaspar Hageman, René Rydhof Hansen, Jens Myrup Pedersen |
CSET '20 | Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT) | Kayla Afanador, Cynthia Irvine |
CSET '20 | Toward Orchestration of Complex Networking Experiments | Alefiya Hussain, Prateek Jaipuria, Geoff Lawler, Stephen Schwab, Terry Benzel |
CSET '20 | APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted Attack Sequences | Yusuke Takahashi, Shigeyoshi Shima, Rui Tanabe, Katsunari Yoshioka |
CSET '20 | ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource | Benjamin Green, Richard Derbyshire, William Knowles, James Boorman, Pierre Ciholas, Daniel Prince, David Hutchison |
CSET '19 | An Assessment of the Usability of Cybercrime Datasets | Ildiko Pete, Yi Ting Chua |
CSET '19 | Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing | Josiah Dykstra, Matt Fante, Paul Donahue, Dawn Varva, Linda Wilk, Amanda Johnson |
CSET '19 | Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized Through Software Debloating | Michael D. Brown, Santosh Pande |
CSET '19 | Triton: A Software-Reconfigurable Federated Avionics Testbed | Sam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko |
CSET '19 | A Multi-level Fidelity Microgrid Testbed Model for Cybersecurity Experimentation | Aditya Ashok, Siddharth Sridhar, Tamara Becejac, Theora Rice, Matt Engels, Scott Harpool, Mark Rice, Thomas Edgar |
CSET '19 | Implementation of Programmable CPS Testbed for Anomaly Detection | Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim |
CSET '19 | A Data-Driven Reflection on 36 Years of Security and Privacy Research | Aniqua Baset, Tamara Denning |
CSET '19 | Percentages, Probabilities and Professions of Performance | Jim Alves-Foss |
CSET '19 | The Impact of Secure Transport Protocols on Phishing Efficacy | Zane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph D. Barnes, Joshua Mason, Michael Bailey |
CSET '19 | Comparative Measurement of Cache Configurations’ Impacts on Cache Timing Side-Channel Attacks | Xiaodong Yu, Ya Xiao, Kirk Cameron, Danfeng (Daphne) Yao |
CSET '19 | Automated Attack Discovery in Data Plane Systems | Qiao Kang, Jiarong Xing, Ang Chen |
CSET '19 | Design and Implementation of a Cyber Physical Testbed for Security Training | Paul Pfister, Mathew L. Wymore, Doug Jacobson, Daji Qiao |
CSET '19 | Lessons Learned from 10k Experiments to Compare Virtual and Physical Testbeds | Jonathan Crussell, Thomas M. Kroeger, David Kavaler, Aaron Brown, Cynthia Phillips |
CSET '19 | CAERUS: Chronoscopic Assessment Engine for Recovering Undocumented Specifications | Adam Seitz, Adam Satar, Brian Burke, Lok Yan, Zachary Estrada |