2017 | ||
Wednesday, June 7th | ||
---|---|---|
12:00 AM |
A Phishing Study of User Behavior with Incentive and Informed Intervention Supriya Muthal, Johns Hopkins University Information Security Institute Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
A Stochastic Model of an Industrial Control System Kill Chain Guillermo A. Francia III, Jacksonville State University Center for Information Security and Assurance Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project Alan T. Sherman, University of Maryland, Baltimore County (UMBC) Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Cyber Operations RangE (CORE): Containerized Gaming Platform for Cyberoperations Competitions Michael Vieth, DePaul University Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Cybersecurity and OSFA Architecture Patrick Jungwirth, U.S. Army Research Lab, Aberdeen Proving Ground Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Date Spillage Remediation Techniques in Hadoop Srinivas Jantali, Northeastern University Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Edge Computing Based Machine Learning Mobile Malware Detection William G. Hatcher, Towson University Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Enhancing Secure Coding Assistant with Error Correction and Contract Programming Chen Li, California State University, Sacramento Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Insider Threat Mitigation in Attribute-based Encryption Runhua Xu, University of Pittsburgh Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Labtainers: A Framework for Parameterized Cybersecurity Labs Using Containers Cynthia E. Irvine, Naval Postgraduate School Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Offensive Computer Security Open Courseware W. Owen Redwood, Nebraska Applied Research Institute Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Operating System Fingerprinting Using IPv6 Packets and Machine Learning Techniques Adrian Ordorica, University of Arkansas Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Panopticon in the 21st Century Myeongsub Lee, Valdosta State University Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Protecting the Supply Chain with RFID Technologies Mike Burmester, Florida State University Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Siri Gets a Subpoena: Unintended Social, Ethical and Legal Consequences of the Internet of Things Bryson R. Payne, University of North Georgia Center for Cyber Operations Education Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Teaching Quantum Cryptography Using a Virtual 3D Educator: QuaSim Shane McDermott, University of Nebraska at Omaha Huntsville (Ala.) 12:00 AM |
|
12:00 AM |
Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems Nagendra Babu Gunti, University of Alabama at Birmingham Huntsville (Ala.) 12:00 AM |