Schedule

Subscribe to RSS Feed

2017
Wednesday, June 7th
12:00 AM

A Phishing Study of User Behavior with Incentive and Informed Intervention

Supriya Muthal, Johns Hopkins University Information Security Institute
Sen Li, Johns Hopkins University Information Security Institute
Yuan Huang, Johns Hopkins University Information Security Institute
Xiangyang Li, Johns Hopkins University Information Security Institute
Anton Dahbura, Johns Hopkins University Information Security Institute
Nathan Bos, Johns Hopkins University Applied Physics Laboratory
Kylie Molinaro, Johns Hopkins University Applied Physics Laboratory

Huntsville (Ala.)

12:00 AM

A Stochastic Model of an Industrial Control System Kill Chain

Guillermo A. Francia III, Jacksonville State University Center for Information Security and Assurance
Tingting Li, Imperial College London Institute for Security Science and Technology
Chen Feng, Imperial College London Institute for Security Science and Technology

Huntsville (Ala.)

12:00 AM

Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project

Alan T. Sherman, University of Maryland, Baltimore County (UMBC)
Linda Oliva, University of Maryland, Baltimore County (UMBC)
David DeLatte, University of Maryland, Baltimore County (UMBC)
Enis Golaszewski, University of Maryland, Baltimore County (UMBC)
Michael Neary, University of Maryland, Baltimore County (UMBC)
Konstantinos Patsourakos, University of Maryland, Baltimore County (UMBC)
Dhananjay Phatak, University of Maryland, Baltimore County (UMBC)
Travis Scheponik, University of Maryland, Baltimore County (UMBC)
Geoffrey L. Herman, University of Illinois at Urbana-Champaign
Julia Thompson, University of Illinois at Urbana-Champaign

Huntsville (Ala.)

12:00 AM

Cyber Operations RangE (CORE): Containerized Gaming Platform for Cyberoperations Competitions

Michael Vieth, DePaul University
James Daniel, DePaul University
Filipo Sharevski, DePaul University

Huntsville (Ala.)

12:00 AM

Cybersecurity and OSFA Architecture

Patrick Jungwirth, U.S. Army Research Lab, Aberdeen Proving Ground
Abdel-Hameed Badawy, New Mexico State University

Huntsville (Ala.)

12:00 AM

Date Spillage Remediation Techniques in Hadoop

Srinivas Jantali, Northeastern University
Sunanda Mani, Northeastern University

Huntsville (Ala.)

12:00 AM

Edge Computing Based Machine Learning Mobile Malware Detection

William G. Hatcher, Towson University
Jarrett Booz, Towson University
Josh McGiff, Towson University
Chao Lu, Towson University
Wei Yu, Towson University

Huntsville (Ala.)

12:00 AM

Enhancing Secure Coding Assistant with Error Correction and Contract Programming

Chen Li, California State University, Sacramento
Benjamin White, California State University, Sacramento
Jun Dai, California State University, Sacramento
Cui Zhang, California State University, Sacramento

Huntsville (Ala.)

12:00 AM

Insider Threat Mitigation in Attribute-based Encryption

Runhua Xu, University of Pittsburgh
James B.D. Joshi, University of Pittsburgh
Prashant Krishnamurthy, University of Pittsburgh
David Tipper, University of Pittsburgh

Huntsville (Ala.)

12:00 AM

Labtainers: A Framework for Parameterized Cybersecurity Labs Using Containers

Cynthia E. Irvine, Naval Postgraduate School
Michael F. Thompson, Naval Postgraduate School
Jean Khosalim, Naval Postgraduate School

Huntsville (Ala.)

12:00 AM

Offensive Computer Security Open Courseware

W. Owen Redwood, Nebraska Applied Research Institute
Mike Burmester, Florida State University
Xiuwen Liu, Florida State University

Huntsville (Ala.)

12:00 AM

Operating System Fingerprinting Using IPv6 Packets and Machine Learning Techniques

Adrian Ordorica, University of Arkansas
Dale R. Thompson, University of Arkansas

Huntsville (Ala.)

12:00 AM

Panopticon in the 21st Century

Myeongsub Lee, Valdosta State University
Walter Hufstetler, Valdosta State University
Sanguk Park, Valdosta State University
Sudip Chakraborty, Valdosta State University

Huntsville (Ala.)

12:00 AM

Protecting the Supply Chain with RFID Technologies

Mike Burmester, Florida State University
Jorge Munilla, Universidad de Málaga
Xiuwen Liu, Florida State University

Huntsville (Ala.)

12:00 AM

Siri Gets a Subpoena: Unintended Social, Ethical and Legal Consequences of the Internet of Things

Bryson R. Payne, University of North Georgia Center for Cyber Operations Education
Victor C. Parker Jr., University of North Georgia
Edward L. Mienie, University of North Georgia

Huntsville (Ala.)

12:00 AM

Teaching Quantum Cryptography Using a Virtual 3D Educator: QuaSim

Shane McDermott, University of Nebraska at Omaha
Srikanth Vadla, University of Nebraska at Omaha
Vidya Bommanapally, University of Nebraska at Omaha
Abhishek Parakh, University of Nebraska at Omaha
Mahadevan Subramaniam, University of Nebraska at Omaha
Elliott Ostler, University of Nebraska at Omaha

Huntsville (Ala.)

12:00 AM

Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems

Nagendra Babu Gunti, University of Alabama at Birmingham
Karthikeyan Lingasubramanian, University of Alabama at Birmingham
Thiago Alves, University of Alabama in Huntsville
Rishabh Das, University of Alabama in Huntsville
Thomas Morris, University of Alabama in Huntsville

Huntsville (Ala.)

12:00 AM