Academia

The document was issued by academy or academy organization.
file

Visible to the public A Comparative Analysis of Manual Methods for Analyzing Security Requirements in Regulatory Documents

BIOS

Sarah E. Elder received her undergraduate degree from the University of Virginia. She then worked as a Systems Engineer and Software Tester in Washington DC before starting her PhD at NC State in 2015. Her current research focuses on how to use Machine Learning and Natural Language Processing to assist in developing Security Requirements.

file

Visible to the public Detecting Monitor Compromise Using Evidential Reasoning

Uttam Thakore is a sixth-year Ph.D. student at the University of Illinois at Urbana-Champaign, advised by William Sanders, and a 2017-18 IBM Ph.D. Fellow. His research interests include the design of resilient cloud and enterprise systems through the use of data analysis and quantitative system modeling and identification of new techniques to analyze heterogeneous system data to provide security insights in distributed systems. During his Ph.D., Uttam has spent time working on security research problems on Google's Counter-Abuse Team and at IBM T.J. Watson Research Center.

file

Visible to the public Hourglass-shaped Architecture for Model-based Development of Safe and Secure Cyber-physical Systems

Marilyn Wolf is Farmer Distinguished Chair in Embedded Computing Systems and GRA Eminent Scholar at the Georgia Institute of Technology. She received her BS, MS, and PhD in electrical engineering from Stanford University in 1980, 1981, and 1984. She was with AT&T Bell Laboratories from 1984 to 1989 and was on the faculty of Princeton University from 1989 to 2007. Her research interests include cyber-physical systems, Internet-of-Things, embedded computing, embedded computer vision, and VLSI systems.

file

Visible to the public Indirect Cyber Attacks by Perturbation of Environment Control: a Data-Driven Attack Model

Keywhan Chung is a Ph.D. candidate at the University of Illinois with Professor Ravishankar Iyer and Professor Kalbarczyk. He received a B.S. degree in computer engineering from Purdue University and an M.S. degree in computer engineering from the University of Illinois. As a member of the DEPEND research group, his research focuses on developing efficient measures toward secure and reliable the computer systems. His current work includes looking towards potential advanced threats such as indirect or smart attacks.

file

Visible to the public An Expert-based Bibliometric for a Science of Security

Dr. Lindsey McGowen is a Research Scientist, Department of Psychology, North Carolina State University. Dr. McGowen's research focuses on program evaluation for cooperative science and technology programs, particularly the outcomes and implications of cooperative research centers. With over a decade of experience, Dr. McGowen has pioneered work on program sustainability for cooperative research centers.

file

Visible to the public How Bad It It Really? An Analysis of Severity Scores for Vulnerabilities

Christopher Theisen is a graduate student at North Carolina State University in Raleigh, North Carolina, advised by Laurie Williams. Prior to his PhD studies, he was a security engineer at Northrop Grumman in Cincinnati, Ohio. His research interests include developing metrics for measurable security, finding more effective techniques for distributing security knowledge, and developing security norms to describe user behavior.

file

Visible to the public You Get Where You're Looking for: The Impact of Information Sources on Code Security

BIO

Michelle Mazurek is an assistant professor of computer science with joint appointments in the Maryland Cybersecurity Center and the Human-Computer Interaction Lab.

Her research is focused on computer security, with an emphasis on human factors. She is interested in designing systems to support usable security.

file

Visible to the public Quantifying the Security Effectiveness of Firewalls and DMZs

BIO

Huashan Chen is a second-year PhD student in the Department of Computer Science, University of Texas at San Antonio. He received the MS degree in 2016 from the Institute of Information Engineering, Chinese Academy of Sciences. His primary research interests are in cybersecurity, especially moving target defense and security metrics.

ABSTRACT