Cybersecurity and Digital Forensics, Center for (CDF)

Filter
Conference contribution

Search results

  • 2017

    On the Safety and Efficiency of Virtual Firewall Elasticity Control

    Deng, J., Li, H., Hu, H., Wang, K. C., Ahn, G. J., Zhao, Z. & Han, W., 2017, 24th Annual Network and Distributed System Security Symposium, NDSS 2017. The Internet Society, (24th Annual Network and Distributed System Security Symposium, NDSS 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements

    Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G.-J., Dec 9 2017, Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-10 10 p. (Proceedings - 2017 IEEE 3rd International Conference on Collaboration and Internet Computing, CIC 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Panel: Trustworthy data science

    Doupe, A., Mar 22 2017, CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 217 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Piston: Uncooperative remote runtime patching

    Salls, C., Shoshitaishvili, Y., Stephens, N., Kruegel, C. & Vigna, G., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, p. 141-153 13 p. (ACM International Conference Proceeding Series; vol. Part F132521).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Platooning as a service of autonomous vehicles

    Lu, D., Li, Z. & Huang, D., Jul 10 2017, 18th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2017 - Conference. Institute of Electrical and Electronics Engineers Inc., 7974353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Poster: On the safety and efficiency of virtual firewall elasticity control

    Li, H., Deng, J., Hu, H., Wang, K. C., Ahn, G.-J., Zhao, Z. & Han, W., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 129-131 3 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. Part F128644).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Predicting cyber threats through hacker social networks in darkweb and deepweb forums

    Almukaynizi, M., Grimm, A., Nunes, E., Shakarian, J. & Shakarian, P., Oct 19 2017, Proceedings of the 2017 International Conference of the Computational Social Science Society of the Americas, CSS 2017. Association for Computing Machinery, a12. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Scopus citations
  • Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers

    Dong, Q. & Huang, D., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Institute of Electrical and Electronics Engineers Inc., p. 2591-2592 2 p. 7980246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Proactive identification of exploits in the wild through vulnerability mentions online

    Almukaynizi, M., Nunes, E., Dharaiya, K., Senguttuvan, M., Shakarian, J. & Shakarian, P., Dec 5 2017, 2017 IEEE International Conference on Cyber Conflict U.S., CyCon U.S. 2017 - Proceedings. Sobiesk, E., Bennett, D. & Maxwell, P. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 82-88 7 p. (2017 IEEE International Conference on Cyber Conflict U.S., CyCon U.S. 2017 - Proceedings; vol. 2017-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Scopus citations
  • Rise of the HaCRS: Augmenting autonomous cyber reasoning systems with human assistance

    Shoshitaishvili, Y., Weissbacher, M., Dresel, L., Salls, C., Wang, R., Kruegel, C. & Vigna, G., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 347-362 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Scopus citations
  • Science DMZ: SDN based secured cloud testbed

    Chowdhary, A., Dixit, V. H., Tiwari, N., Kyung, S., Huang, D. & Ahn, G.-J., Dec 7 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-2 2 p. (2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Security policy checking in distributed SDN based clouds

    Pisharody, S., Chowdhary, A. & Huang, D., Feb 21 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 19-27 9 p. 7860466. (2016 IEEE Conference on Communications and Network Security, CNS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Team coordination dynamics in human-autonomy teaming

    Demir, M., Amazeen, P., McNeese, N. J., Likens, A. & Cooke, N., 2017, Proceedings of the Human Factors and Ergonomics Society 2017 International Annual Meeting, HFES 2017. Human Factors an Ergonomics Society Inc., p. 236 1 p. (Proceedings of the Human Factors and Ergonomics Society; vol. 2017-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Temporal analysis of influence to predict users’ adoption in online social networks

    Marin, E., Guo, R. & Shakarian, P., 2017, Social, Cultural, and Behavioral Modeling - 10th International Conference, SBP-BRiMS 2017, Proceedings. Osgood, N., Lee, D., Thomson, R. & Lin, Y.-R. (eds.). Springer Verlag, p. 254-261 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10354 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation

    Tu, H., Doupe, A., Zhao, Z. & Ahn, G.-J., Jan 4 2017, Proceedings of the 2016 ITU Kaleidoscope Academic Conference: ICTs for a Sustainable World, ITU WT 2016. Institute of Electrical and Electronics Engineers Inc., 7805728

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Towards adaptive and proactive security assessment for energy delivery systems

    Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G.-J., Oct 10 2017, 2017 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, MSCPES 2017 - Held as part of CPS Week, Proceedings. Institute of Electrical and Electronics Engineers Inc., 8064532

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards automated threat intelligence fusion

    Modi, A., Sun, Z., Panwar, A., Khairnar, T., Zhao, Z., Doupe, A., Ahn, G.-J. & Black, P., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 408-416 9 p. 7809731. (Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • Towards PII-based multiparty access control for photo sharing in Online Social Networks

    Vishwamitra, N., Li, Y., Wang, K., Hu, H., Caine, K. & Ahn, G.-J., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 155-166 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. Part F128644).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    46 Scopus citations
  • 2016

    A comparison of methods for cascade prediction

    Guo, R. & Shakarian, P., Nov 21 2016, Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016. Kumar, R., Caverlee, J. & Tong, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 591-598 8 p. 7752296. (Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • An empirical evaluation of social influence metrics

    Kumar, N., Guo, R., Aleali, A. & Shakarian, P., Nov 21 2016, Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016. Kumar, R., Caverlee, J. & Tong, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1329-1336 8 p. 7752408. (Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • A non-parametric learning approach to identify online human trafficking

    Alvari, H., Shakarian, P. & Snyder, J. E. K., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 133-138 6 p. 7745456. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing

    Riad, K., Yan, Z., Hu, H. & Ahn, G.-J., Mar 1 2016, Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015. Institute of Electrical and Electronics Engineers Inc., p. 28-35 8 p. 7423062. (Proceedings - 2015 IEEE Conference on Collaboration and Internet Computing, CIC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Argumentation models for cyber attribution

    Nunes, E., Shakarian, P., Simari, G. I. & Ruef, A., Nov 21 2016, Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016. Kumar, R., Caverlee, J. & Tong, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 837-844 8 p. 7752335. (Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    16 Scopus citations
  • Attack Detection in Cloud Infrastructures Using Artificial Neural Network with Genetic Feature Selection

    Guha, S., Yau, S.-S. & Buduru, A. B., Oct 11 2016, Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data Intelligence and Computing, DataCom 2016 and 2016 IEEE Cyber Science and Technology Congress, CyberSciTech 2016, DASC-PICom-DataCom-CyberSciTech 2016. Wang, K.I.-K., Jin, Q., Bhuiyan, M. Z. A., Zhang, Q. & Hsu, C.-H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 414-419 6 p. 7588878. (Proceedings - 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, DASC 2016, 2016 IEEE 14th International Conference on Pervasive Intelligence and Computing, PICom 2016, 2016 IEEE 2nd International Conference on Big Data Intelligence and Computing, DataCom 2016 and 2016 IEEE Cyber Science and Technology Congress, CyberSciTech 2016, DASC-PICom-DataCom-CyberSciTech 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin

    Liao, K., Zhao, Z., Doupe, A. & Ahn, G.-J., Jun 8 2016, Proceedings of the 2016 APWG Symposium on Electronic Crime Research, eCrime 2016. IEEE Computer Society, p. 1-13 13 p. 7487938. (eCrime Researchers Summit, eCrime; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    144 Scopus citations
  • Cachededup: In-line deduplication for flash caching

    Li, W., Jean-Baptise, G., Riveros, J., Narasimhan, G., Zhang, T. & Zhao, M., 2016, Proceedings of the 14th USENIX Conference on File and Storage Technologies, FAST 2016. USENIX Association, p. 301-314 14 p. (Proceedings of the 14th USENIX Conference on File and Storage Technologies, FAST 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    70 Scopus citations
  • Can One Tamper with the Sample API?

    Morstatter, F., Dani, H., Sampson, J. & Liu, H., Apr 11 2016, WWW 2016 Companion - Proceedings of the 25th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 81-82 2 p. (WWW 2016 Companion - Proceedings of the 25th International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Checking intent-based communication in android with intent space analysis

    Jing, Y., Ahn, G.-J., Doupe, A. & Yi, J. H., May 30 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 735-746 12 p. (ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Darknet and deepnet mining for proactive cybersecurity threat intelligence

    Nunes, E., Diab, A., Gunn, A., Marin, E., Mishra, V., Paliath, V., Robertson, J., Shakarian, J., Thart, A. & Shakarian, P., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 7-12 6 p. 7745435. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    152 Scopus citations
  • HoneyMix: Toward SDN-based intelligent honeynet

    Han, W., Zhao, Z., Doupe, A. & Ahn, G.-J., Mar 11 2016, SDN-NFV Security 2016 - Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 1-6 6 p. (SDN-NFV Security 2016 - Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, co-located with CODASPY 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    45 Scopus citations
  • MIST: Missing person Intelligence Synthesis Toolkit

    Shaabani, E., Alvari, H., Shakarian, P. & Snyder, J. E. K., Oct 24 2016, CIKM 2016 - Proceedings of the 2016 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1843-1852 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • MobiVPN: A mobile VPN providing persistency to applications

    Alshalan, A., Pisharody, S. & Huang, D., Mar 23 2016, 2016 International Conference on Computing, Networking and Communications, ICNC 2016. Institute of Electrical and Electronics Engineers Inc., 7440684. (2016 International Conference on Computing, Networking and Communications, ICNC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Modeling cyber-Attacks on industrial control systems

    Paliath, V. & Shakarian, P., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Institute of Electrical and Electronics Engineers Inc., p. 316-318 3 p. 7745499

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Moving target defense for Web applications using Bayesian Stackelberg games

    Vadlamud, S. G., Sengupta, S., Taguinod, M., Zhao, Z., Doupe, A., Ahn, G.-J. & Kambhampati, S., 2016, AAMAS 2016 - Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1377-1378 2 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Scopus citations
  • Position paper: Towards a moving target defense approach for attribute-based access control

    Rubio-Medrano, C. E., Lamp, J., Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G.-J., Mar 11 2016, ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016. Association for Computing Machinery, Inc, p. 68-71 4 p. (ABAC 2016 - Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, co-located with CODASPY 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Product offerings in malicious hacker markets

    Marin, E., Diab, A. & Shakarian, P., Nov 15 2016, IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016. Mao, W., Wang, G. A., Zhou, L. & Kaati, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 187-189 3 p. 7745465. (IEEE International Conference on Intelligence and Security Informatics: Cybersecurity and Big Data, ISI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • SDN based scalable MTD solution in cloud network

    Chowdhary, A., Pisharody, S. & Huang, D., Oct 24 2016, MTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 27-36 10 p. (MTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    53 Scopus citations
  • Short term traffic flow prediction based on on-line sequential extreme learning machine

    Ma, Z., Luo, G. & Huang, D., Apr 7 2016, Proceedings of the 8th International Conference on Advanced Computational Intelligence, ICACI 2016. Institute of Electrical and Electronics Engineers Inc., p. 143-149 7 p. 7449818. (Proceedings of the 8th International Conference on Advanced Computational Intelligence, ICACI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Socio-cultural modeling for cyber threat actors

    Shakarian, P. & Shakarian, J., 2016, WS-16-01: Artificial Intelligence Applied to Assistive Technologies and Smart Environments; WS-16-02: AI, Ethics, and Society; WS-16-03: Artificial Intelligence for Cyber Security; WS-16-04: Artificial Intelligence for Smart Grids and Smart Buildings; WS-16-05: Beyond NP; WS-16-06: Computer Poker and Imperfect Information Games; WS-16-07: Declarative Learning Based Programming; WS-16-08: Expanding the Boundaries of Health Informatics Using AI; WS-16-09: Incentives and Trust in Electronic Communities; WS-16-10: Knowledge Extraction from Text; WS-16-11: Multiagent Interaction without Prior Coordination; WS-16-12: Planning for Hybrid Systems; WS-16-13: Scholarly Big Data: AI Perspectives, Challenges, and Ideas; WS-16-14: Symbiotic Cognitive Systems; WS-16-15: World Wide Web and Population Health Intelligence. AI Access Foundation, p. 193-194 2 p. (AAAI Workshop - Technical Report; vol. WS-16-01 - WS-16-15).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam

    Tu, H., Doupe, A., Zhao, Z. & Ahn, G.-J., Aug 16 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016. Institute of Electrical and Electronics Engineers Inc., p. 320-338 19 p. 7546510. (Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    69 Scopus citations
  • State-Aware network access management for software-defined networks

    Han, W., Hu, H., Zhao, Z., Doupe, A., Ahn, G.-J., Wang, K. C. & Deng, J., Jun 6 2016, SACMAT 2016 - Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 1-11 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. 06-08-June-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Target Fragmentation in Android Apps

    Mutchler, P., Safaei, Y., Doupe, A. & Mitchell, J., Aug 1 2016, Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016. Institute of Electrical and Electronics Engineers Inc., p. 204-213 10 p. 7527771. (Proceedings - 2016 IEEE Symposium on Security and Privacy Workshops, SPW 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Toward argumentation-based cyber attribution

    Nunes, E., Shakarian, P. & Simari, G. I., 2016, WS-16-01: Artificial Intelligence Applied to Assistive Technologies and Smart Environments; WS-16-02: AI, Ethics, and Society; WS-16-03: Artificial Intelligence for Cyber Security; WS-16-04: Artificial Intelligence for Smart Grids and Smart Buildings; WS-16-05: Beyond NP; WS-16-06: Computer Poker and Imperfect Information Games; WS-16-07: Declarative Learning Based Programming; WS-16-08: Expanding the Boundaries of Health Informatics Using AI; WS-16-09: Incentives and Trust in Electronic Communities; WS-16-10: Knowledge Extraction from Text; WS-16-11: Multiagent Interaction without Prior Coordination; WS-16-12: Planning for Hybrid Systems; WS-16-13: Scholarly Big Data: AI Perspectives, Challenges, and Ideas; WS-16-14: Symbiotic Cognitive Systems; WS-16-15: World Wide Web and Population Health Intelligence. AI Access Foundation, p. 177-184 8 p. (AAAI Workshop - Technical Report; vol. WS-16-01 - WS-16-15).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Understanding anti-forensic techniques with timestamp manipulation

    Jang, D. I., Ahn, G.-J., Hwang, H. & Kim, K., 2016, Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016. Institute of Electrical and Electronics Engineers Inc., p. 609-614 6 p. (Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • VC-bots: A vehicular cloud computing testbed with mobile robots

    Lu, D., Li, Z., Huang, D., Lu, X., Deng, Y., Chowdhary, A. & Li, B., Jul 4 2016, IoV-VoI 2016 - Proceedings of the 1st MobiHoc International Workshop on Internet of Vehicles and Vehicles of Internet. Association for Computing Machinery, Inc, p. 31-36 6 p. 2938683. (IoV-VoI 2016 - Proceedings of the 1st MobiHoc International Workshop on Internet of Vehicles and Vehicles of Internet).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls

    Deng, J., Hu, H., Li, H., Pan, Z., Wang, K. C., Ahn, G.-J., Bi, J. & Park, Y., Jan 19 2016, 2015 IEEE Conference on Network Function Virtualization and Software Defined Network, NFV-SDN 2015. Institute of Electrical and Electronics Engineers Inc., p. 107-114 8 p. 7387414. (2015 IEEE Conference on Network Function Virtualization and Software Defined Network, NFV-SDN 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • 2015

    ACTRA - A case study for threat information sharing

    Haass, J. C., Ahn, G.-J. & Grimmelmann, F., Oct 12 2015, WISCS 2015 - Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, co-located with: CCS 2015. Association for Computing Machinery, Inc, p. 23-26 4 p. (WISCS 2015 - Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, co-located with: CCS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Cyber-deception and attribution in capture-the-flag exercises

    Nunes, E., Kulkarni, N., Shakarian, P., Ruef, A. & Little, J., Aug 25 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 962-965 4 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Demo: LIVES: Learning through interactive video and emotion-aware system

    Chen, M., Hao, Y., Li, Y., Wu, D. & Huang, D., Jun 22 2015, MobiHoc'15 - Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Association for Computing Machinery, p. 399-400 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); vol. 2015-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Early identification of violent criminal gang members

    Shaabani, E., Aleali, A., Shakarian, P. & Bertetto, J., Aug 10 2015, KDD 2015 - Proceedings of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 2079-2088 10 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. 2015-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Scopus citations