CSET '13 | MINESTRONE: Testing the SOUP | Azzedine Benameur, Nathan S. Evans, Matthew C. Elder |
CSET '13 | Internet Measurements and Public Policy: Mind the Gap | Hadi Asghari, Michel J.G. van Eeten, Milton L. Mueller |
CSET '13 | Bridging the Data Gap: Data Related Challenges in Evaluating Large Scale Collaborative Security Systems | John Sonchack, Adam J. Aviv, Jonathan M. Smith |
CSET '13 | OCTANE (Open Car Testbed and Network Experiments): Bringing Cyber-Physical Security Research to Researchers and Students | Christopher E. Everett, Damon McCoy |
CSET '13 | Generation of SSH Network Traffic Data for IDS Testbeds | Hristo Djidjev, Lyudmil Aleksandrov |
CSET '13 | RTRlib: An Open-Source Library in C for RPKI-based Prefix Origin Validation | Matthias Wählisch, Fabian Holler, Thomas C. Schmidt, Jochen H. Schiller |
CSET '12 | Students Who Don’t Understand Information Flow Should Be Eaten: An Experience Paper | |
CSET '12 | Beyond Disk Imaging for Preserving User State in Network Testbeds | |
CSET '12 | Do Malware Reports Expedite Cleanup? An Experimental Study | |
CSET '12 | Towards a Framework for Evaluating BGP Security | |
CSET '12 | Conducting an Ethical Study of Web Traffic | |
CSET '12 | Learning from Early Attempts to Measure Information Security Performance | |
CSET '12 | Virtual Machine Introspection in a Hybrid Honeypot Architecture | |
CSET '12 | Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack | |
CSET '12 | Methodically Modeling the Tor Network | |
CSET '12 | Collaborative Red Teaming for Anonymity System Evaluation | |
CSET '12 | Disturbed Playing: Another Kind of Educational Security Games | |
CSET '12 | A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed | |
CSET '11 | Should Security Researchers Experiment More and Draw More Inferences? | Kevin S. Killourhy, Roy A. Maxion |
CSET '11 | No Plan Survives Contact: Experience with Cybercrime Measurement | Chris Kanich, Neha Chachra, Damon McCoy, Chris Grier, David Wang, Marti Motoyama, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker |
CSET '11 | Salting Public Traces with Attack Traffic to Test Flow Classifiers | Z. Berkay Celik, Jayaram Raghuram, George Kesidis, David J. Miller |
CSET '11 | Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols | Nathan S. Evans, Christian Grothoff |
CSET '11 | Automating Network Monitoring on Experimental Testbeds | Michael Golightly, Jack Brassil |
CSET '11 | Challenges in Experimenting with Botnet Detection Systems | Adam J. Aviv, Andreas Haeberlen |
CSET '11 | ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation | Kevin Bauer, Micah Sherr, Dirk Grunwald |