Cybersecurity and Digital Forensics, Center for (CDF)

Filter
Conference contribution

Search results

  • 2015

    Federated access management for collaborative network environments: Framework and case study

    Rubio-Medrano, C. E., Zhao, Z., Doupe, A. & Ahn, G.-J., Jun 1 2015, SACMAT 2015 - Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 125-134 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. 2015-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Functional cognitive models of malware identification

    Lebiere, C., Bennati, S., Thomson, R., Shakarian, P. & Nunes, E., 2015, Proceedings of ICCM 2015 - 13th International Conference on Cognitive Modeling. Taatgen, N. A., van Vugt, M. K., Borst, J. P. & Mehlhorn, K. (eds.). University of Groningen, p. 90-95 6 p. (Proceedings of ICCM 2015 - 13th International Conference on Cognitive Modeling).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • KSGM: Keynode-driven scalable graph matching

    Chen, X., Candan, K., Sapino, M. L. & Shakarian, P., Oct 17 2015, CIKM 2015 - Proceedings of the 24th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1101-1110 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. 19-23-Oct-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Malware task identification: A data driven approach

    Nunes, E., Buto, C., Shakarian, P., Lebiere, C., Bennati, S., Thomson, R. & Jaenisch, H., Aug 25 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 978-985 8 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Mining for causal relationships: A data-driven study of the islamic state

    Stanton, A., Thart, A., Jain, A., Vyas, P., Chatterjee, A. & Shakarian, P., Aug 10 2015, KDD 2015 - Proceedings of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 2137-2146 10 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. 2015-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • MTD 2015: Second ACM workshop on moving target defense

    Cybenko, G. & Huang, D., Oct 12 2015, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 2015-October. p. 1709-1710 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • POEM: On Establishing a Personal On-Demand Execution Environment for Mobile Cloud Applications

    Wu, H., Huang, D. & Chen, M., Aug 26 2015, Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015. Zhang, J. & Altintas, O. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 41-48 8 p. 7226670. (Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment

    Chung, C. J., Xing, T., Huang, D., Medhi, D. & Trivedi, K., Sep 18 2015, Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2015. Institute of Electrical and Electronics Engineers Inc., p. 4-11 8 p. 7272544. (Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN-W 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Toward a Moving Target Defense for Web Applications

    Taguinod, M., Doupe, A., Zhao, Z. & Ahn, G.-J., Oct 19 2015, Proceedings - 2015 IEEE 16th International Conference on Information Reuse and Integration, IRI 2015. Institute of Electrical and Electronics Engineers Inc., p. 510-517 8 p. 7301020

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    50 Scopus citations
  • Toward order-of-magnitude cascade prediction

    Guo, R., Shaabani, E., Bhatnagar, A. & Shakarian, P., Aug 25 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 1610-1613 4 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • 2014

    Keeping intruders at large: A graph-theoretic approach to reducing the probability of successful network intrusions

    Shakarian, P., Paulo, D., Albanese, M. & Jajodia, S., 2014, SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications. Obaidat, M. S., Holzinger, A. & Samarati, P. (eds.). SciTePress, p. 19-30 12 p. (SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Reducing gang violence through network influence based targeting of social programs

    Shakarian, P., Salmento, J., Pulleyblank, W. & Bertetto, J., 2014, KDD 2014 - Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1829-1836 8 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • 1993

    An object-oriented approach to software development for autonomous decentralized systems

    Yau, S.-S. & Oh, G. H., 1993, Proceedings - ISADS 1993: International Symposium on Autonomous Decentralized Systems. Institute of Electrical and Electronics Engineers Inc., p. 37-43 7 p. 262724. (Proceedings - ISADS 1993: International Symposium on Autonomous Decentralized Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations