Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Home
Code of Conduct
Program Agenda
Breakout Reports-Groups
Poster Session
Project Highlight Slides
Demonstrations
Attendees
Registrants
Undergraduate Track
Organizing Committee
Files
CPS-VO
»
Secure and Trustworthy Cyberspace (SaTC) Community Forum
»
2019 Secure and Trustworthy Cyberspace Principal Investigators' Meeting (SaTC PI Meeting '19)
» POSTERS
Posters
file
A Systematic Study of Comparing Traditional Machine Learning and Deep Learning for Security Vetting of Android Apps
Submitted by xinmingou on Thu, 10/17/2019 - 2:32pm. Contributors:
Xinming Ou
Doina Caragea
Sankardas Roy
Guojun Liu
Emily Alfs
Dewan Chaulagain
Posters
Software
1717862
1717871
1718214
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
A Cybersecurity Collectable Card Game for Children
Submitted by Michael Thomas on Thu, 10/17/2019 - 2:32pm. Contributors:
Michael Thomas
Rigel Gjomemo
Posters
cybersecurity education
1623267
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
A Cryptanalysis of LUOV using the Subfield Differential Attack (SDA)
Submitted by Jintai Ding on Thu, 10/17/2019 - 2:32pm. Contributor:
Jintai Ding
Posters
Applied cryptography
Cryptography
Theory Mathematics and Statistics
1814221
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Toward Enforceable Data Usage Control in Cloud-based IoT Systems
Submitted by Wenjing Lou on Fri, 10/11/2019 - 12:11pm. Contributors:
Wenjing Lou
Y. Thomas Hou
Ning Zhang
Posters
Applied Privacy
Systems
wireless networking
1916902
1916926
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Shielding Software From Privileged Side-Channel Attacks
Submitted by John Criswell on Fri, 10/11/2019 - 12:11pm. Contributors:
Xiaowan Dong
Zhuojia Shen
John Criswell
Alan L. Cox
Posters
Formal Methods and Language-based Security
Hardware Security Architecture
Software
Systems
1652280
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Sharing Expertise and Artifacts for Reuse through Cybersecurity Community Hub (SEARCCH)
Submitted by Jelena Mirkovic on Fri, 10/11/2019 - 12:11pm. Contributors:
Terry Benzel
Jelena Mirkovic
Laura Tinnel
David Balenson
Timothy Yardley
Eric Eide
Posters
Research Infrastructure
1925773
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
SecureMCMR: Privacy-Preserving Computation Outsourcing for MapReduce Applications
Submitted by Ana Milanova on Fri, 10/11/2019 - 12:10pm. Contributors:
Ana Milanova
Lindsey Kennard
Posters
Applied cryptography
Software
Systems
1814898
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
QuaSim An Interactive Quantum Cryptography Learning Tool
Submitted by Abhishek Parakh on Fri, 10/11/2019 - 12:10pm. Contributors:
Abhishek Parakh
Mahadevan Subramaniam
Elliott Ostler
Posters
cybersecurity education
1623380
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Extracting and Synthesizing and Cyberattack Behavior Models for Predictive Intelligence
Submitted by jy@cosvo19 on Fri, 10/11/2019 - 12:10pm. Contributors:
S. Jay Yang
Michael Kuhl
Bill Stackpole
daryl johnson
Posters
data science
Intrusion Detection
Transition to Practice
1526383
1742789
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Mapping Privacy and Surveillance Dynamics in Emerging Mobile Ecosystems Practices and Contexts in the Netherlands and US
Submitted by Jessica Vitak on Fri, 10/11/2019 - 12:10pm. Contributors:
Jessica Vitak
Michael Zimmer
Jason Pridmore
Daniel Trottier
Posters
Applied Privacy
Social Behavioral and Economics Sciences
Theoretical Privacy
1640640
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »