Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang |
DACSA: A Decoupled Architecture for Cloud Security Analysis Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot Study Fanny Lalonde Lévesque, José M. Fernandez |
Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot Study Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
Safe and Automated Live Malware Experimentation on Public Testbeds Abdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic |
Safe and Automated Live Malware Experimentation on Public Testbeds Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Simulating Malicious Insiders in Real Host-Monitored User Data Kurt C. Wallnau, Brian Lindauer, Michael Theis, Robert S. Durst, Terrance G. Champion, Eric Renouf, Christian Petersen |
Simulating Malicious Insiders in Real Host-Monitored User Data Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Effective Entropy: Security-Centric Metric for Memory Randomization Techniques William Herlands, Thomas Hobson, Paula J. Donovan |
Effective Entropy: Security-Centric Metric for Memory Randomization Techniques Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
A Metric for the Evaluation and Comparison of Keylogger Performance Tobias Fiebig, Janis Danisevskis, Marta Piekarska |
A Metric for the Evaluation and Comparison of Keylogger Performance Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments Stefan Boesen, Richard S. Weiss, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen |
EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TESTREX: a Testbed for Repeatable Exploits Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta |
TESTREX: a Testbed for Repeatable Exploits Details |
Author Comments:
Please note that the commercial exploitation is subject to US Patent PN/9811668
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Large-Scale Evaluation of a Vulnerability Analysis Framework Nathan S. Evans, Azzedine Benameur, Matthew C. Elder |
Large-Scale Evaluation of a Vulnerability Analysis Framework Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report Melissa Danforth, Charles Lam |
Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|