Presentations

file

Visible to the public Work-in-Progress: Cybersecurity Incident Response (title not shown in full)

This presentation is part of the Works-in-Progress session, which aims to provide authors with early feedback to adjust on-going research. Manuscript titles are redacted until the work has been published.

CYBERSECURITY INCIDENT RESPONSE (full title not shown)

file

Visible to the public Evaluating Mail-Based Security for Electoral Processes Using Attack Trees

Evaluating Mail-Based Security for Electoral Processes Using Attack Trees

file

Visible to the public MLEFlow: Learning from History to Improve Load Balancing in Tor

Tor has millions of daily users seeking privacy while browsing the Internet. It has thousands of relays to route users’ packets while anonymizing their sources and destinations. Users choose relays to forward their traffic according to probability distributions published by the Tor authorities. The authorities generate these probability distributions based on estimates of the capacities of the relays. They compute these estimates based on the bandwidths of probes sent to the relays. These estimates are necessary for better load balancing.

file

Visible to the public FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques

Organizations depend on heavy use of various cyber defense technologies, including intrusion detection and prevention systems, to monitor and protect networks and devices from malicious activities. However, large volumes of false alerts from such technologies challenge cybersecurity analysts in isolating credible alerts from false positives for further investigations.

file

Visible to the public Work-in-Progress: Resilient Target Pursuit for Multi-UAV Systems (title not shown in full)

This presentation is part of the Works-in-Progress session, which aims to provide authors with early feedback to adjust on-going research. Manuscript titles are redacted until the work has been published.

file

Visible to the public Work-in-Progress: Mixed-autonomy Vehicular Traffic (title not shown in full)

This presentation is part of the Works-in-Progress session, which aims to provide authors with early feedback to adjust on-going research. Manuscript titles and abstracts are redacted until the work has been published.

 

file

Visible to the public Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs

Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs

file

Visible to the public Empirical Study of PLC Authentication Protocols in Industrial Control Systems

Empirical Study of PLC Authentication Protocols in Industrial Control Systems

file

Visible to the public Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem

Tracing Your Roots: Exploring the TLS Trust Anchor Ecosystem