


default search action
7. CSIIRW 2011: Oak Ridge, TN, USA
- Frederick T. Sheldon, Robert K. Abercrombie, Axel W. Krings:
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, CSIIRW 2011, Oak Ridge, TN, USA, October 12-14, 2011. ACM 2011, ISBN 978-1-4503-0945-5
Plenary and panel sessions
- Patricia Hoffman:
Energy infrastructure cyber protection: protecting our critical infrastructure. 1 - Carol Hawk:
Working to achieve cybersecurity in the energy sector. 2 - Robert Osborn:
Transforming NNSA information, collaboration and security. 3 - Doug Maughan:
Federal R&D landscape and DHS S&T overview. 4 - Joe Jarzombeck:
Software assurance: mitigating risk of zero-day attacks and enabling resilience of cyber infrastructure. 5 - Jennifer Silk, Matthew E. Luallen:
Plenary Speakers: Jennifer Silk, White House and Matthew E. Luallen, SANS. 6 - Michael A. Brown:
Plenary Keynote Speaker: Rear Admiral Michael A. Brown, DoD/DHS. 7 - Shankar Sastry:
Towards a theory of high confidence networked control systems: action webs. 8 - Gregory Neal Akers:
Plenary Speaker: Gregory Neal Akers, CISCO. 9 - George J. Allen:
Plenary keynote Speaker: Major General George J. Allen, J5, US Cyber Command. 10 - John Bumgarner:
Plenary Speaker: John Bumgarner, U.S. Cyber Consequences Unit. 11 - Ernest McDuffie:
NICE: National Initiative for Cybersecurity Education. 12 - Victor Piotrowski:
NSF investments in cybersecurity research and education. 13 - Carol Hawk:
Key questions for the day on cryptographic key management. 14 - Debra Frincke:
National Laboratory panel. 15
Security assurance for EDS
- Shan Liu, Xianyong Feng, Deepa Kundur, Takis Zourntos, Karen L. Butler-Purry:
A class of cyber-physical switching attacks for power system disruption. 16 - Daniel Bilar
, James Solderitsch, Elvis Hovor:
Monitoring smart grid operations and maintaining mission assurance through adaptive computer network defenses. 17 - Douglas A. Creager, John McHugh:
Verified workflow-based software development for infrastructure sensing and control applications. 18 - Arun Velagapalli, Mahalingam Ramkumar:
Minimizing the TCB for securing SCADA systems. 19 - Aditya Ashok, Adam Hahn, Manimaran Govindarasu:
A cyber-physical security testbed for smart grid: system architecture and studies. 20 - Jonathan Kirsch, Stuart Goose, Yair Amir, Paul M. Skare:
Toward survivable SCADA. 21 - Gyan Ranjan, Zhi-Li Zhang:
How to glue a robust smart-grid?: a "finite-network" theory for interdependent network robustness. 22 - Clive Blackwell:
Formally modeling the electricity grid with bigraphs. 23 - Thomas H. Morris, Shengyi Pan, Jeremy Lewis, Jonathan Moorhead, Nicolas H. Younan, Roger L. King, Mark Freund, Vahid Madani:
Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators. 24 - Aniket Rodrigues, Tish Best, Ravi Pendse:
SCADA security device: design and implementation. 25 - William L. Sousan, Robin A. Gandhi, Qiuming Zhu, William R. Mahoney
:
Using anomalous event patterns in control systems for tamper detection. 26 - Thomas H. Morris, Rayford B. Vaughn, Yoginder S. Dandass:
A testbed for SCADA control system cybersecurity research and pedagogy. 27
Wide area monitoring/protection
- Marco M. Carvalho
, Carlos Perez:
An evolutionary multi-agent approach to anomaly detection and cyber defense. 28 - Ning Lu, Pengwei Du
, Patrick R. Paulson, Frank L. Greitzer, Xinxin Guo, Mark Hadley:
A predictive defense system for the smart grid. 29 - Becker Polverini, William M. Pottenger:
Using clustering to detect Chinese censorware. 30 - Chen Lu, Richard R. Brooks
:
Botnet traffic detection using hidden Markov models. 31 - Kevin W. Hamlen, Peng Liu, Murat Kantarcioglu, Bhavani Thuraisingham, Ting Yu:
Identity management for cloud computing: developments and directions. 32 - Bereket Mathewos Hambebo, Marco M. Carvalho
, Fredric M. Ham:
Network traffic classification using a parallel neural network classifier architecture. 33 - Axel W. Krings, Victor Balogun, Saad Alshomrani, Ahmed Abdel-Rahim, Mike Dixon:
A measurement-based design and evaluation methodology for embedded control systems. 34 - Robert F. Erbacher, Anupama Biswas, Trent Cameron:
A novel data reduction technique. 35 - Vimalathithan Subramanian, Remzi Seker, Jiang Bian, Nitin Kanaskar:
Collaborations, mergers, acquisitions, and security policy conflict analysis. 36
Security risk assessment
- Jackson R. Mayo, Robert C. Armstrong:
Tradeoffs in targeted fuzzing of cyber systems by defenders and attackers. 37 - Zhi Chen, Meikang Qiu, Lei Zhang, Fei Hu, Senlin Zhang:
ILP security optimization method for embedded systems with timing constraints. 38 - Dipankar Dasgupta, Mohd. Hassan Ali, Robert K. Abercrombie
, Bob G. Schlicher, Frederick T. Sheldon
, Marco Carvalho
:
Secure VM for monitoring industrial process controllers. 39 - Dipankar Dasgupta, Md. Moshiur Rahman:
A framework for estimating security coverage for cloud service insurance. 40 - Jason Jaskolka
, Ridha Khédri, Khair Eddin Sabri
:
A formal test for detecting information leakage via covert channels. 41 - Zhanshan (Sam) Ma, Hongju (Daisy) Chen, Jiajin Zhang, Axel W. Krings, Frederick T. Sheldon
:
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim? 42 - Aaron Mishtal, Craig A. Shue, Stephen Kelley:
A system for intelligent substitution of named entities with applications to the automatic generation of honey tokens. 43 - Erik M. Ferragut, Nicole Braden:
System log summarization via semi-Markov models of inter-arrival times. 44 - Alan Michaels, Josef Allen:
Physical-layer encryption for enhanced cyber-physical security. 45 - Janusz Zalewski, Steven Drager, William McKeever, Andrew J. Kornecki:
Can we measure security and how? 46 - Matthew Butler, Peter J. Hawrylak
, John Hale
:
Graceful privilege reduction in RFID security. 47 - Curtis Taylor
, Craug Shue:
Implementing a "moving target" system to protect servers. 48
Malware
- Rich Nolan, Peter P. Chen:
Supporting velocity of investigation with behavior analysis of malware. 49 - Jason Carter
:
An architecture for Concordia. 50 - Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell
, Kirk Sayre:
Behavior computation for smart grid software analysis. 51
Cyber physical security
- Thoshitha T. Gamage, Ravi Akella, Thomas P. Roth, Bruce M. McMillin
:
Information flow security in cyber-physical systems. 52 - Thomas W. Edgar, David O. Manz
, Thomas E. Carroll:
Towards an experimental testbed facility for cyber-physical security research. 53 - Josef D. Allen, Sereyvathana Ty, Xiuwen Liu, Ivan Lozano:
Preventing cascading event: a distributed cyber-physical approach. 54 - Mark R. Heckman, Roger R. Schell
, Edwards E. Reed:
Using a high assurance TCB for infrastructure security. 55 - Mohamed Azab, Mohamed Eltoweissy:
Towards a cooperative autonomous resilient defense platform for cyber-physical systems. 56 - Lucille McMinn, Jonathan Butts, David Robinson, Billy Rios:
Exploiting the critical infrastructure via nontraditional system inputs. 57
Cryptographic key management
- Timothy Calver
, Michael R. Grimaila, Jeffrey W. Humphries:
An empirical analysis of the cascade error reconciliation protocol for quantum key distribution. 58 - Robert K. Abercrombie
, Frederick T. Sheldon
, Hal Aldridge, Michael Duren, Tracy Ricci, Elisa Bertino, N. Athula Kulatunga, Uditha Navaratne:
Secure cryptographic key management system (CKMS) considerations for smart grid devices. 59 - Kevin Benton, Ju-Yeon Jo, Yoohwan Kim:
SignatureCheck: a protocol to detect man-in-the-middle attack in SSL. 60
Use cases and attack scenarios
- Wade Gasior, Li Yang:
Network covert channels on the Android platform. 61 - George Louthan, Phoebe Hardwicke, Peter J. Hawrylak
, John Hale
:
Toward hybrid attack dependency graphs. 62 - Rajeshwar Katipally, Li Yang, Anyi Liu:
Attacker behavior analysis in multi-stage attack detection system. 63
Smart grid advanced concepts
- Miodrag J. Mihaljevic, Hideki Imai, Michael W. David, Kazukuni Kobara, Hajime Watanabe:
On advanced cryptographic techniques for information security of smart grid AMI. 64 - Hai Su, Meikang Qiu, Huimin Chen, Zhonghai Lu, Xiao Qin:
Jamming-resilient multi-radio multi-channel multihop wireless network for smart grid. 65 - Claire Vishik, Anand Rajan, Chris Ramming, David Grawrock, Jesse Walker:
Defining trust evidence: research directions. 66
Anti-tamper devices/architecture
- Jiayin Li, Daigu Zhang, Meikang Qiu, Yongxin Zhu, Ju Shen:
Security protection on FPGA against differential power analysis attacks. 67 - Jeffrey Todd McDonald, Yong C. Kim, Daniel J. Koranek
:
Deterministic circuit variation for anti-tamper applications. 68 - Jinpeng Wei, Calton Pu, Keke Chen:
Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures. 69
Poster
- Luanne Burns, Christina Selby
, Thomas A. Longstaff:
DART3: DHS assistant for R&D tracking and technology transfer. 70 - Robert F. Erbacher, Steve E. Hutchinson, Joshua Edwards:
Web traffic profiling and characterization. 71 - Terry N. Guo:
Distributed radio relay for communication and control with physical-layer security in smart grid. 72 - Yonghe Guo, Chee-Wooi Ten
, Panida Jirutitijaroen:
Data integrity validation framework for distribution system operations. 73 - Zach Harbort, George Louthan, John Hale
:
Techniques for attack graph visualization and interaction. 74 - Alec Yasinsac, Jonathan Alawine:
Insider-free systems. 75 - Sunirmal Khatua
, Nandini Mukherjee, Nabendu Chaki
:
A new agent based security framework for collaborative cloud environment. 76 - Yoohwan Kim, Frederick T. Sheldon
:
Anomaly detection in multiple scale for insider threat analysis. 77 - Summer-Mistine Olmstead, Joseph Stites, Ferrol Aderholdt:
A layer cyber security defense strategy for smart grid programmable logic controllers. 78 - Ilker Özçelik
, Richard R. Brooks
:
Security experimentation using operational systems. 79 - Salim Hariri, Mohamed Eltoweissy, Youssif B. Al-Nashif:
BioRAC: biologically inspired resilient autonomic cloud. 80 - Curtis R. Taylor
, Craig A. Shue:
Implementing a "moving target" system to protect servers. 81 - Li Yang, Mina Sartipi, Matt McNeely:
Usable protection to healthcare application. 82 - Lu Yu, Richard R. Brooks
:
Observable subspace solution for irreducible POMDPs with infinite horizon. 83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.