Academia

The document was issued by academy or academy organization.
file

Visible to the public On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach

ABSTRACT: Intrusion Detection Systems (IDSs) are crucial security mechanisms widely deployed for critical network protection. However, conventional IDSs become incompetent due to the rapid growth in network size and the sophistication of large scale attacks.

file

Visible to the public Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms

ABSTRACT: Cyber-Physical Systems (CPS) have unique properties that can be exploited to design new privacy-enhancing technologies that minimize the negative impact to the utility of CPS. In this paper we show two examples of these properties.

file

Visible to the public Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers

ABSTRACT: Scientific advancement is fueled by solid fundamental research, followed by replication, meta-analysis, and theory building. To support such advancement, researchers and government agencies have been working towards a “science of security”.

file

Visible to the public Optimal Security Investments in a Prevention and Detection Game

ABSTRACT: Most security defenses can be breached by motivated adversaries, therefore in addition to attack-prevention technologies, firms investing in cyber-security for their information technology infrastructure need to consider attack-detection and restoration tools to detect intruders, an

file

Visible to the public Use of Phishing Training to Improve Security Warning Compliance: Evidence From a Field Experiment

ABSTRACT: The current approach to protect users from phishing attacks is to display a warning when the webpage is considered suspicious. We hypothesize that users are capable of making correct informed decisions when the warning also conveys the reasons why it is displayed.

video

Visible to the public The 2016 NSF CPS Student Challenge Video

news

Visible to the public Call for Student Posters on Unmanned Aircraft Systems (UAS) Communications and Networking Research

Call for Student Posters on Unmanned Aircraft Systems (UAS) Communications and Networking Research

file

Visible to the public A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer.