Papers

Search results

    ConferenceTitleAuthor(s)
    CSET '16Chappie Swarm: Persona-Driven Web Corpus GenerationNicholas Kaufman, Michael Collins, Kristof Ladny, Jeffrey Wiley, Adam Plattner, Mark Sanders, Evan Thaler, Patrick Ball
    CSET '16Honey Sheets: What Happens to Leaked Google Spreadsheets?Martin Lazarov, Jeremiah Onaolapo, Gianluca Stringhini
    CSET '16Evaluating Malware Mitigation by Android Market OperatorsYosuke Kikuchi, Hiroshi Mori, Hiroki Nakano, Katsunari Yoshioka, Tsutomu Matsumoto, Michel Van Eeten
    CSET '16A Cybersecurity Test and Evaluation Facility for the Next Generation Air Transportation System (NextGen)David Ingegneri, Dominic Timoteo, Patrick Hyle, Fidel Parraga, Alex Reyes
    CSET '16Providing SCADA Network Data Sets for Intrusion Detection ResearchAntoine Lemay, José M. Fernandez
    CSET '15This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year UndergraduatesTanya Flushman, Mark Gondree, Zachary N. J. Peterson
    CSET '15Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-Threaded ApplicationsAndrew Miller, Rob Jansen
    CSET '15Build It Break It: Measuring and Comparing Development SecurityAndrew Ruef, Michael Hicks, James Parker, Dave Levin, Atif Memon, Jandelyn Plane, Piotr Mardziel
    CSET '15Experiences with Honey-Patching in Active Cyber Security EducationFrederico Araujo, Mohammad Shapouri, Sonakshi Pandey, Kevin Hamlen
    CSET '15PRISM: Private Retrieval of the Internet’s Sensitive MetadataAng Chen, Andreas Haeberlen
    CSET '15Developing Security Reputation Metrics for Hosting ProvidersArman Noroozian, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten
    CSET '15Finding Bugs in Source Code Using Commonly Available Development MetadataDevin Cook, Yung Ryn Choe, John A. Hamilton, Jr.
    CSET '15Experimental Study of Fuzzy Hashing in Malware Clustering AnalysisYuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang
    CSET '14TESTREX: a Testbed for Repeatable ExploitsStanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta
    CSET '14Safe and Automated Live Malware Experimentation on Public TestbedsAbdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic
    CSET '14Large-Scale Evaluation of a Vulnerability Analysis FrameworkNathan S. Evans, Azzedine Benameur, Matthew Elder
    CSET '14Simulating Malicious Insiders in Real Host-Monitored User DataKurt Wallnau, Brian Lindauer, Michael Theis, Robert Durst, Terrance Champion, Eric Renouf, Christian Petersen
    CSET '14Effective Entropy: Security-Centric Metric for Memory Randomization TechniquesWilliam Herlands, Thomas Hobson, Paula J. Donovan
    CSET '14DACSA: A Decoupled Architecture for Cloud Security AnalysisJason Gionta, Ahmed Azab, William Enck, Peng Ning, Xiaolan Zhang
    CSET '14A Metric for the Evaluation and Comparison of Keylogger PerformanceTobias Fiebig, Janis Danisevskis, Marta Piekarska
    CSET '14Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot StudyFanny Lalonde Lévesque, José M. Fernandez
    CSET '14EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining EnvironmentsStefan Boesen, Richard Weiss, James Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen
    CSET '14Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience ReportMelissa Danforth, Charles Lam
    CSET '13BugBox: A Vulnerability Corpus for PHP Web ApplicationsGary Nilson, Kent Wills, Jeffrey Stuckman, James Purtilo
    CSET '13MalwareLab: Experimentation with Cybercrime Attack ToolsLuca Allodi, Vadim Kotov, Fabio Massacci

Pages