Visible to the public HotSoS 2019 PostersConflict Detection Enabled

A BIRD’S EYE VIEW OF KNOWLEDGE NEEDS RELATED TO PENETRATION TESTING
Akond Rahman and Laurie Williams
North Carolina State University

A FORMAL VERIFICATION OF MUTATION-BASED MOVING TARGET DEFENSE
Muhammad Abdul Basit Ur Rahim, Qi Duan, and Ehab Al-Shaer
University of North Carolina at Charlotte

A NEW METRIC TO COMPARE ANOMALY DETECTION ALGORITHMS IN CYBER-PHYSICAL SYSTEMS
*Jairo Giraldo and Alvaro A. Cardenas
*University of Texas at Dallas, University of California Santa Cruz

A SYNOPSIS OF STATIC ANALYSIS ALERTS ON OPEN SOURCE SOFTWARE
Nasif Imtiaz and Laurie Williams
North Carolina State University

CLIPS/ActiveSDN FOR AUTOMATED AND SAFE CYBERSECURITY COURSE-OF-ACTIONS ORCHESTRATION
Md Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, and Mohammed Noraden Alsaleh
University of North Carolina at Charlotte

CYBER DEFENSE MATRIX– A NEW MODEL FOR OPTIMAL COMPOSITION OF CYBERSECURITY CONTROLS FOR CONSTRUCTING RESILIENT RISK MITIGATION
Ashutosh Dutta and Ehab Al-Shaer
University of North Carolina at Charlotte

DESIGN AND SIMULATION PLATFORM FOR EVALUATION OF GRID DISTRIBUTION SYSTEM AND TRANSACTIVE ENERGY
Himanshu Neema, Harsh Vardhan, Carlos Barreto, and Xenofon Koutsoukos
Vanderbilt University

DESIGN FOR AN EDUCATIONAL CYBER RANGE
*Ryan Brunner, *Sang Keun Oh, *Jesse Ramirez, *Paul Houck, *Nathaniel Stickney, and Raymond Blaine
*United State Military Academy, Cyber Research Center

DESIGNING A RASPBERRY PI SENSOR NETWORK FOR REMOTE OBSERVATION OF WILDLIFE
Brian Curtin, Rachelle H. David, Emmet D. Dunham, Cullen D. Johnson, Nikhil Shyamkumar, Thomas A. Babbitt, Suzanne J. Matthews
United State Military Academy

EXPLORING RNNs FOR ANALYZING ZEEK HTTP DATA
*Daniel Andrews, *Jennifer Behn, *Danielle Jaksha, *Jinwon Seo, *Madeleine Schneider, *James Yoon, *Suzanne J. Matthews, Rajeev Agrawal, *Alexander S. Mentis
*United States Military Academy, U.S. Army E.R.D.C.

LEARNING APT CHAINS FROM CYBER THREAT INTELLIGENCE
Ghaith Husari, Ehab Al-Shaer, Ruhani Faiheem Rahman, and Bill Chu
University of North Carolina at Charlotte

LOAD FORECASTING WITH ADVERSARIAL ATTACKS IN POWER SYSTEMS USING DEEPFORGE
*Xingyu Zhou, *Yi Li, *Carlos Barreto, Peter Volgyesi, Xenofon Koutsoukos
*Vanderbilt University, Vanderbilt University, Institute for Software Integrated Systems

MEASURES AND METRICS FOR THE ENFORCEMENT OF CRITICAL SECURITY CONTROLS: A CASE STUDY OF BOUNDARY DEFENSE
Mohiuddin Ahmed and Ehab Al-Shaer
University of North Carolina at Charlotte

SIMULATION BASED EVALUATION OF SECURITY AND RESILIENCE IN RAILWAY INFRASTRUCTURE
Bradley Potteiger, Hamzah Abdel-Aziz, Himanshu Neema, Xenofon Koutsoukos
Vanderbilt University

TAMING WEB VIEWS IN THE DETECTION OF ANDROID PRIVACY LEAKS
*Xue Qin, *Robert Neuhaus, *Diego Gonzales, *Xiaoyin Wang, Travis Breaux, *Jianwei Niu
*The University of Texas at San Antonio, Carnegie Mellon University

THREATZOOM: NEURAL NETWORK FOR AUTOMATED VULNERABILITY MITIGATION
Ehsan Aghaei and Ehab Al-shaer
University of North Carolina-Charlotte

TOWARD A RELIABILITY MEASUREMENT FRAMEWORK AUTOMATED USING DEEP LEARNING
*John Heaps, *Xiaoyin Wang, Travis Breaux, *Jianwei Niu
*The University of Texas at San Antonio, Carnegie Mellon University

TOWARDS AN UNDERSTANDING OF RESILIENCE WITH COMPLEX NETWORKS
Francisco Pipa and John Symons
University of Kansas

TRACTION: AN INFRASTRUCTURE FOR TRUSTED ALERT SHARING AND COLLABORATIVE MITIGATION
*Keywhan Chung, *Phuong Cao, *Yuming Wu, *Zbigniew T. Kalbarczyk, *Ravishankar K. Iyer, Alexander Withers
*University of Illinois at Urbana-Champaign, National Center for Supercomputing Applications