Skip to Main Content Area
CPS-VO
Contact Support
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Home
Archive
Call for Papers
Registration
Program Agenda
WIP at HoTSoS
Program Committee
Presenter Guidance
Past Events
Files
CPS-VO
»
Science of Security VO
»
Symposium on the Science of Security (HotSoS)
» POSTERS
Posters
file
Examining Reliability of Wireless Multihop Networks with Linear Systems (poster)
Submitted by rudra on Wed, 06/04/2014 - 9:43am. Contributors:
Trisha Biswas
Kendra Lesser
Rudra Dutta
Meeko Oishi
Slides of this poster are available
here
.
Performance
Routing
stochastic dynamical systems
wireless multihop network
HotSoS 2014
Academia
Poster
Posters
Posters
file
Diversity Based Detection of Security Anomalies (poster)
Submitted by vouk on Wed, 06/04/2014 - 9:43am. Contributors:
Roopak Venkatakrishnan
Mladen A. Vouk
Slides of the poster are available
here
.
diversity
NVP
security anomaly
HotSoS 2014
Academia
Poster
Posters
Posters
Intrusion/Anomaly Detection and Malware Mitigation
file
Emergent Behavior in Cybersecurity (poster)
Submitted by shouhuai on Wed, 06/04/2014 - 9:43am. Contributor:
Shouhuai Xu
Emergent Behavior
HotSoS 2014
Academia
Poster
Posters
Posters
Cyber Security
file
Evidence-Based Trust Reasoning (poster)
Submitted by David Nicol on Wed, 06/04/2014 - 9:43am. Contributors:
Jingwei Huang
David M. Nicol
Slides of this poster are available
here
.
Belief Network
cloud
Evidence-based trust
privacy
HotSoS 2014
Academia
Poster
Posters
Posters
file
Cybersecurity Dynamics (poster)
Submitted by shouhuai on Wed, 06/04/2014 - 9:43am. Contributor:
Shouhuai Xu
Cybersecurity dynamics
Security analysis
security model
HotSoS 2014
Academia
Poster
Posters
Posters
file
Channel Correlation Modeling for Link Signature Security Assessment (poster)
Submitted by Huaiyu on Wed, 06/04/2014 - 9:43am. Contributors:
Xiaofan He
Huaiyu Dai
Wenbo Shen
Peng Ning
HotSoS 2014
Academia
Poster
Posters
Posters
file
American and Indian Conceptualization of Phishing (poster)
Submitted by emerson on Wed, 06/04/2014 - 9:43am. Contributors:
Rucha Tembe
Christopher M. Kelley
Christopher B. Mayhorn
Emerson Murphy-Hill
Kyung Wha Hong
Xi Ge
HotSoS 2014
Academia
Poster
Posters
Posters
Phishing
file
An Analysis of Fedora Security Profile (poster)
Submitted by Laurie Williams on Wed, 06/04/2014 - 9:43am. Contributors:
Shweta Subramani
Mladen A. Vouk
Laurie A. Williams
Slides of the poster are available
here
.
Aleatoric
Attack Profile
epistemic
Non-Operational Testing
HotSoS 2014
Academia
Poster
Posters
Posters
file
Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines (poster)
Submitted by Acquisti Alessandro on Wed, 06/04/2014 - 9:43am. Contributors:
Alain Forget
Saranga Komanduri
Alessandro Acquisti
Nicolas Christin
Lorrie Faith Cranor
Rahul Telang
Slides of the poster are available
here
.
Data collection
field study
observation
server
users
HotSoS 2014
Academia
Poster
Posters
Posters
file
Access Control Policy Evolution: An Empirical Study (poster)
Submitted by Laurie Williams on Wed, 06/04/2014 - 9:43am. Contributors:
JeeHyun Hwang
Laurie A. Williams
Mladen A. Vouk
Slides of the poster are available
here
.
Evolution
HotSoS 2014
Academia
Poster
Posters
Posters
Access Control
« first
‹ previous
1
2