default search action
HotSoS 2015: Urbana, IL, USA
- David M. Nicol:
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015. ACM 2015, ISBN 978-1-4503-3376-4 - Aron Laszka, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Integrity assurance in resource-bounded systems through stochastic message authentication. 1:1-1:12 - Ren Zheng, Wenlian Lu, Shouhuai Xu:
Active cyber defense dynamics exhibiting rich phenomena. 2:1-2:12 - Dusko Pavlovic:
Towards a science of trust. 3:1-3:9 - Patrick Morrison, Kim Herzig, Brendan Murphy, Laurie A. Williams:
Challenges with applying vulnerability prediction models. 4:1-4:9 - Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Adam J. Slagell:
Preemptive intrusion detection: theoretical framework and real-world measurements. 5:1-5:12 - Jason King, Rahul Pandita, Laurie A. Williams:
Enabling forensics by proposing heuristics to identify mandatory log events. 6:1-6:11 - John C. Mace, Charles Morisset, Aad P. A. van Moorsel:
Modelling user availability in workflow resiliency analysis. 7:1-7:10 - Ghita Mezzour, Kathleen M. Carley, L. Richard Carley:
An empirical study of global malware encounters. 8:1-8:11 - Chen Zhong, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. 9:1-9:11 - Allaire K. Welk, Christopher B. Mayhorn:
All signals go: investigating how individual differences affect performance on a medical diagnosis task designed to parallel a signals intelligence analyst task. 10:1-10:5 - Ignacio X. Domínguez, Alok Goel, David L. Roberts, Robert St. Amant:
Detecting abnormal user behavior through pattern-mining input device analytics. 11:1-11:13 - Hongying Du, Bennett Narron, Nirav Ajmeri, Emily Berglund, Jon Doyle, Munindar P. Singh:
Understanding sanction under variable observability in a secure, collaborative environment. 12:1-12:10 - Vijay H. Kothari, Jim Blythe, Sean W. Smith, Ross Koppel:
Measuring the security impacts of password policies using cognitive behavioral agent-based modeling. 13:1-13:9 - Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li:
Effectiveness of a phishing warning in field settings. 14:1-14:2 - Bradley R. Schmerl, Jeffrey Gennari, David Garlan:
An architecture style for Android security analysis: poster. 15:1-15:2 - Charlotte Scheper, Susanna Cantor:
PREDICT: an important resource for the science of security. 16:1-16:2 - Gabriel Ferreira, Christian Kästner, Jürgen Pfeffer, Sven Apel:
Characterizing complexity of highly-configurable systems with variational call graphs: analyzing configuration options interactions complexity in function calls. 17:1-17:2 - Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert W. Proctor:
Towards quantification of firewall policy complexity. 18:1-18:2 - Qiao Jin, Jiayi Duan, Shobha Vasudevan, Michael D. Bailey:
Packer classifier based on PE header information. 19:1-19:2 - Hemank Lamba, Thomas J. Glazier, Bradley R. Schmerl, Jürgen Pfeffer, David Garlan:
Detecting insider threats in software systems using graph models of behavioral paths. 20:1-20:2 - Mohammad A. Noureddine, Ken Keefe, William H. Sanders, Masooda N. Bashir:
Quantitative security metrics with human in the loop. 21:1-21:2 - Olga A. Zielinska, Allaire K. Welk, Christopher B. Mayhorn, Emerson R. Murphy-Hill:
Exploring expert and novice mental models of phishing. 22:1-22:2 - Patrick Morrison:
Building a security practices evaluation framework. 23:1-23:2 - Phuong Cao, Eric C. Badger, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Alexander Withers, Adam J. Slagell:
Towards an unified security testbed and security analytics framework. 24:1-24:2 - Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari:
Mismorphism: a semiotic model of computer security circumvention (poster abstract). 25:1-25:2 - Tao Xie, Judith Bishop, Nikolai Tillmann, Jonathan de Halleux:
Gamifying software security education and training via secure coding duels in code hunt. 26:1-26:2 - Yufan Huang, Xiaofan He, Huaiyu Dai:
Systematization of metrics in intrusion detection systems. 27:1-27:2 - Robert Cain, Aad P. A. van Moorsel:
Optimisation of data collection strategies for model-based evaluation and decision-making: poster. 28:1-28:2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.