Academia

The document was issued by academy or academy organization.
file

Visible to the public Checked C: Safe C, Incrementally

Presented as part of the 2019 HCSS conference.

file

Visible to the public A New Metric to Compare Anomaly Detection Algorithms In Cyber-Physical Systems

ABSTRACT

file

Visible to the public A Formal Verification Of Mutation-based Moving Target Defense

ABSTRACT

Static system configuration provides the advantage for the attackers to discover the vulnerabilities of the system and launch attacks.

file

Visible to the public Towards An Understanding Of Resilience With Complex Networks

BIO

Francisco Pipa is a Graduate student in the Department of Philosophy, University of Kansas. Studying resilience and robustness in complex systems.

file

Visible to the public TRACTION: An Infrastructure For TRusted Alert Sharing And Collaborative MitigaTION

BIO

Keywhan Chung is a Ph.D. candidate at the University of Illinois with Professor Ravishankar Iyer and Professor Kalbarczyk. He received a B.S. degree in computer engineering from Purdue University and an M.S. degree in computer engineering from the University of Illinois. As a member of the DEPEND research group, his research focuses on developing efficient measures toward secure and reliable computer systems. His current work includes looking towards potential advanced threats such as indirect or smart attacks.

file

Visible to the public Measures And Metrics For The Enforcement Of Critical Security Controls: A Case Study Of Boundary Defense

ABSTRACT

The center for internet security [3] publishes a set of defense actions which forms a set of defense in depth best practices known as critical security control(CSC) to detect, prevent, respond, and mitigate the cyber attacks against cyber systems and networks. However, no well defined automated measures and metrics are developed to validate the enforcement of these CSCs. Additionally, it is infeasible to directly analyze implementation of security products to verify and validate the enforcement of CSCs in those security products.