


default search action
21st USENIX Security Symposium 2012: Bellevue, WA, USA - CSET
- Sean Peisert, Stephen Schwab:
5th Workshop on Cyber Security Experimentation and Test, CSET '12, Bellevue, WA, USA, August 6, 2012. USENIX Association 2012
Testbed Technology for Cyber Security
- Michael Rosenstein, Frank Corvese:
A Secure Architecture for the Range-Level Command and Control System of a National Cyber Range Testbed. - Jelena Mirkovic, Abdulla Alwabel, Ted Faber:
Beyond Disk Imaging for Preserving User State in Network Testbeds. - Olaf Maennel, Iain Phillips, Debbie Perouli, Randy Bush, Rob Austein, Askar Jaboldinov:
Towards a Framework for Evaluating BGP Security.
Malware and Attacks
- Anas AlMajali, Arun Viswanathan, Clifford Neuman:
Analyzing Resiliency of the Smart Grid Communication Architectures under Cyber Attack. - Tamas K. Lengyel, Justin Neumann, Steve Maresca, Bryan D. Payne, Aggelos Kiayias:
Virtual Machine Introspection in a Hybrid Honeypot Architecture. - Marie Vasek, Tyler Moore:
Do Malware Reports Expedite Cleanup? An Experimental Study.
Anonymity and Privacy
- John F. Duncan, L. Jean Camp:
Conducting an Ethical Study of Web Traffic. - Rob Jansen, Kevin S. Bauer, Nicholas Hopper, Roger Dingledine:
Methodically Modeling the Tor Network. - Sandy Clark, Chris Wacek, Matt Blaze, Boon Thau Loo
, Micah Sherr, Clay Shields, Jonathan M. Smith:
Collaborative Red Teaming for Anonymity System Evaluation.
Games and Studies in Academic Environments
- Roya Ensafi, Mike Jacobi, Jedidiah R. Crandall:
Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper. - Sebastian Koch, Jörg Schneider, Jan Nordholz:
Disturbed Playing: Another Kind of Educational Security Games. - Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Learning from Early Attempts to Measure Information Security Performance.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.