


default search action
Search dblp for Publications
export results for "toc:db/conf/ncs/ncs2018.bht:"
@inproceedings{DBLP:conf/ncs/ApplebaumJLS18, author = {Andy Applebaum and Shawn Johnson and Michael Limiero and Michael Smith}, title = {Playbook Oriented Cyber Response}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {8--15}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00007}, doi = {10.1109/NCS.2018.00007}, timestamp = {Mon, 09 Aug 2021 14:54:04 +0200}, biburl = {https://dblp.org/rec/conf/ncs/ApplebaumJLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/DunstatterGT18, author = {Noah Dunstatter and Mina Guirguis and Alireza Tahsini}, title = {Allocating Security Analysts to Cyber Alerts Using Markov Games}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {16--23}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00008}, doi = {10.1109/NCS.2018.00008}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/DunstatterGT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/Heydari18, author = {Vahid Heydari}, title = {Moving Target Defense for Avionic Systems}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {53--57}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00013}, doi = {10.1109/NCS.2018.00013}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncs/Heydari18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/JonesW18, author = {Keith J. Jones and Yong Wang}, title = {An Optimized Running Window Entropy Algorithm}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {72--77}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00016}, doi = {10.1109/NCS.2018.00016}, timestamp = {Thu, 28 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncs/JonesW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/JonnadaDSRW18, author = {Srikanth Jonnada and Ram Dantu and Pradhumna L. Shrestha and Ishan Ranasinghe and Logan Widick}, title = {An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {38--44}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00011}, doi = {10.1109/NCS.2018.00011}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/JonnadaDSRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/JoyceDE18, author = {Amanda Joyce and Steven Day and Nathaniel Evans}, title = {Educational Competitions to Boost the Cyber Workforce-Development}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {34--37}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00010}, doi = {10.1109/NCS.2018.00010}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/JoyceDE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/KimPR18, author = {Dan J. Kim and Brandon Phillps and Young U. Ryu}, title = {Impact of Perceived Risk, Perceived Controllability, and Security Self-Efficacy on Secure Intention from Social Comparison Theory Perspective}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {58--63}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00014}, doi = {10.1109/NCS.2018.00014}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/KimPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/KimSYK18, author = {Kevin Kim and Justin Smith and T. Andrew Yang and Dan J. Kim}, title = {An Exploratory Analysis on Cybersecurity Ecosystem Utilizing the {NICE} Framework}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00006}, doi = {10.1109/NCS.2018.00006}, timestamp = {Thu, 08 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/KimSYK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/PekerRS18, author = {Yesem Peker and Lydia Ray and Stephanie da Silva}, title = {Online Cybersecurity Awareness Modules for College and High School Students}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {24--33}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00009}, doi = {10.1109/NCS.2018.00009}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/PekerRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/PriviteraS18, author = {Donald Privitera and Hossain Shahriar}, title = {Design and Development of Smart {TV} Protector}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {45--52}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00012}, doi = {10.1109/NCS.2018.00012}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/PriviteraS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncs/SenDVT18, author = {Nilanjan Sen and Ram Dantu and Jagannadh Vempati and Mark A. Thompson}, title = {Performance Analysis of Elliptic Curves for Real-Time Video Encryption}, booktitle = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, pages = {64--71}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NCS.2018.00015}, doi = {10.1109/NCS.2018.00015}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/SenDVT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ncs/2018, title = {National Cyber Summit, {NCS} 2018, Huntsville, AL, USA, June 5-7, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8589959/proceeding}, isbn = {978-1-5386-7252-5}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ncs/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.