Adaptive Autonomous Secure Cyber Systems
暂无分享,去创建一个
Sushil Jajodia | Michael P. Wellman | V. S. Subrahmanian | George Cybenko | Vipin Swarup | Cliff Wang | Michael Wellman | G. Cybenko | S. Jajodia | Cliff X. Wang | Vipin Swarup
[1] Florian Kammüller,et al. Modeling and Verification of Insider Threats Using Logical Analysis , 2017, IEEE Systems Journal.
[2] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[3] Yitzchak M. Gottlieb,et al. ACyDS: An adaptive cyber deception system , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[4] Srikanth V. Krishnamurthy,et al. Cyber Deception: Virtual Networks to Defend Insider Reconnaissance , 2016, MIST@CCS.
[5] Maximilian Golla,et al. On the Security of Cracking-Resistant Password Vaults , 2016, CCS.
[6] R. K. Chavan,et al. Sandboxing in Linux: From Smartphone to Cloud , 2016 .
[7] Sushil Jajodia,et al. Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning , 2016, ACM Trans. Intell. Syst. Technol..
[8] Amanda Bonnie,et al. Design and Implementation of a Scalable HPC Monitoring System , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).
[9] Hovav Shacham,et al. HIPStR: Heterogeneous-ISA Program State Relocation , 2016, ASPLOS.
[10] George C. Necula,et al. Minimizing Faulty Executions of Distributed Systems , 2016, NSDI.
[11] Thomas Ludwig,et al. MPI-checker: static analysis for MPI , 2015, LLVM '15.
[12] Josephine Micallef,et al. CINDAM: Customized Information Networks for Deception and Attack Mitigation , 2015, 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops.
[13] Cristian Cadar,et al. VARAN the Unbelievable: An Efficient N-version Execution Framework , 2015, ASPLOS.
[14] Seif Haridi,et al. Apache Flink™: Stream and Batch Processing in a Single Engine , 2015, IEEE Data Eng. Bull..
[15] Martin Schulz,et al. Towards Providing Low-Overhead Data Race Detection for Large OpenMP Applications , 2014, 2014 LLVM Compiler Infrastructure in HPC.
[16] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[17] Fan Yang,et al. Mesa: Geo-Replicated, Near Real-Time, Scalable Data Warehousing , 2014, Proc. VLDB Endow..
[18] Rajiv Ranjan,et al. Streaming Big Data Processing in Datacenter Clouds , 2014, IEEE Cloud Computing.
[19] Jignesh M. Patel,et al. Storm@twitter , 2014, SIGMOD Conference.
[20] Ehab Al-Shaer,et al. Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[21] Ronald L. Rivest,et al. Honeywords: making password-cracking detectable , 2013, CCS.
[22] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[23] Cristian Cadar,et al. Safe software updates via multi-version execution , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[24] Marco Ramilli,et al. Return-Oriented Programming , 2012, IEEE Security & Privacy.
[25] Jérémy Briffaut,et al. Advanced MAC in HPC Systems: Performance Improvement , 2012, 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012).
[26] Bianca Schroeder,et al. Cosmic rays don't strike twice: understanding the nature of DRAM errors and the implications for system design , 2012, ASPLOS XVII.
[27] Christian Payne,et al. Empowering End Users to Confine Their Own Applications: The Results of a Usability Study Comparing SELinux, AppArmor, and FBAC-LSM , 2011, TSEC.
[28] Lior Rokach,et al. HoneyGen: An automated honeytokens generator , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.
[29] John R. Douceur,et al. Cycles, cells and platters: an empirical analysisof hardware failures on a million consumer PCs , 2011, EuroSys '11.
[30] Martin Schulz,et al. A Scalable and Distributed Dynamic Formal Verifier for MPI Programs , 2010, 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis.
[31] Dominique Devriese,et al. Noninterference through Secure Multi-execution , 2010, 2010 IEEE Symposium on Security and Privacy.
[32] P. Hovland,et al. Depth Analysis of MPI Programs , 2010 .
[33] Konstantin Serebryany,et al. ThreadSanitizer: data race detection in practice , 2009, WBIA '09.
[34] Douglas Thain,et al. Reflections on the virtues of modularity: a case study in linux security modules , 2009, Softw. Pract. Exp..
[35] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[36] Daniel Grosu,et al. A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[37] Michael Franz,et al. Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space , 2009, EuroSys '09.
[38] A. Prasad Sistla,et al. Preventing Information Leaks through Shadow Executions , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[39] Fausto Giunchiglia,et al. RelBAC: Relation Based Access Control , 2008, 2008 Fourth International Conference on Semantics, Knowledge and Grid.
[40] S. Habib,et al. Introducing map-reduce to high end computing , 2008, 2008 3rd Petascale Data Storage Workshop.
[41] Julie A. McCann,et al. A survey of autonomic computing—degrees, models, and applications , 2008, CSUR.
[42] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[43] Mark Bickford,et al. Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures , 2008, NSDI.
[44] Stephen F. Siegel. Verifying Parallel Programs with MPI-Spin , 2007, PVM/MPI.
[45] Landon P. Cox,et al. TightLip: Keeping Applications from Spilling the Beans , 2007, NSDI.
[46] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[47] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[48] Kamran Sartipi,et al. Dynamic Analysis of Software Systems using Execution Pattern Mining , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).
[49] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[50] Priya Narasimhan,et al. Thema: Byzantine-fault-tolerant middleware for Web-service applications , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).
[51] Robert C. Seacord,et al. Secure coding in C and C , 2005 .
[52] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[53] George Bosilca,et al. Open MPI: Goals, Concept, and Design of a Next Generation MPI Implementation , 2004, PVM/MPI.
[54] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[55] Gregory A. Koenig,et al. Cluster Security as a Unique Problem with Emergent Properties: Issues and Techniques , 2004 .
[56] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[57] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[58] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[59] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[60] Axelle Apvrille,et al. Distributed Access Control for Carrier Class Clusters , 2003, PDPTA.
[61] Michael M. Resch,et al. MARMOT: An MPI Analysis and Checking Tool , 2003, PARCO.
[62] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[63] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[64] Bronis R. de Supinski,et al. Dynamic Software Testing of MPI Applications with Umpire , 2000, ACM/IEEE SC 2000 Conference (SC'00).
[65] K. Claessen,et al. QuickCheck: a lightweight tool for random testing of Haskell programs , 2000, ICFP '00.
[66] Naohiro Ishii,et al. Analysis of software bug causes and its prevention , 1999, Inf. Softw. Technol..
[67] Michael Hayden. The Insider Threat to U.S. Government Information Systems , 1999 .
[68] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[69] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[70] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[71] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[72] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .