Posters

file

Visible to the public An Approach to Ransomware Effects Mitigation

file

Visible to the public An Evidence-Based Ecological Approach for Disrupting Ransomware Spread

file

Visible to the public Ransomware Analysis as Dialog for Attribution and Reconnaissance (RADAR)

file

Visible to the public The Threat of Ransomware in Energy Delivery Systems

file

Visible to the public RansomAir Filled with Clouds

file

Visible to the public Ransomware Detection using RNN

file

Visible to the public Integrating Historical and Real-Time Anomaly Detection to Create a More Resilient Smart Grid Architecture

Cadet Spencer Drakontaidis is currently a Firstie (senior) at the United States Military Academy, and was born and raised in Saugerties, NY. He studies Computer Science and focuses on security and data analysis. Cadet Drakontaidis currently works on two research projects, one of which is the Real Time Smart Grid project, where he works along side several other Computer Science, Electrical Engineering, and Information Technology cadets.

file

Visible to the public Detecting Monitor Compromise Using Evidential Reasoning

Uttam Thakore is a sixth-year Ph.D. student at the University of Illinois at Urbana-Champaign, advised by William Sanders, and a 2017-18 IBM Ph.D. Fellow. His research interests include the design of resilient cloud and enterprise systems through the use of data analysis and quantitative system modeling and identification of new techniques to analyze heterogeneous system data to provide security insights in distributed systems. During his Ph.D., Uttam has spent time working on security research problems on Google's Counter-Abuse Team and at IBM T.J. Watson Research Center.

file

Visible to the public A Comparative Analysis of Manual Methods for Analyzing Security Requirements in Regulatory Documents

BIOS

Sarah E. Elder received her undergraduate degree from the University of Virginia. She then worked as a Systems Engineer and Software Tester in Washington DC before starting her PhD at NC State in 2015. Her current research focuses on how to use Machine Learning and Natural Language Processing to assist in developing Security Requirements.