Posters > 2012
Assured Identity and Privacy
- Challenges in Biometric Usability [FC2-00C]
- Differential Identifiability [75C-D67]
- Fine-Grained Encryption-Based Access Control for Big Data [4CC-8B5]
- Impact of Henry System of Classification on the Entropy of Fingerprint Images [50E-63F]
- Is This Hardcopy an Original? [A33-F8E]
- Issues in Cyber Forensics [50C-D5D]
- Privacy Preserving Tatonnement [0CC-4FA]
- Privacy through Identity Management [192-77E]
- Private Anonymous Messaging [4B8-28C]
- Public Population Information in Differential Privacy [966-32D]
- Query Processing in Private Data Outsourcing Using Anonymization [9DD-066]
- Resilient and active authentication and user-centric identity ecosystems [D1D-E54]
- RFID Applications of Embedded Processing and Zero-Knowledge Proof [D61-D44]
- Trust, Empathy, Social Identity, and Contribution of Knowledge within Patient Online Communities [276-91D]
- Understanding Malware through Classification and Machine Learning [835-75B]
- Zoo Animal Stability [141-BAA]
End System Security
- Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems [59F-360]
- Motivation of Pharmacies to use Biometric Authentication [56D-C9C]
- Process Implanting: A New Active Introspection Framework for Virtualization [577-C5F]
Human Centric Security
- NL IAS Marches On [408-4BE]
- Secure Communication among Robots and Humans with a Human Voice [A6E-F68]
- Social group and identity management across social networking sites [5AA-27F]
- Trust Framework for Social Networks [291-153]
Network Security
- Create Moving Target Defense in Static Networks by Learning from Botnets [159-98E]
- Multi-Path Overlay Routing to Improve Latency while Tolerating Intrusions [C74-069]
- Newton Meets Vivaldi: Securing Virtual Coordinates by Enforcing Physical Laws [CED-ACB]
- Over-the-Air Penetration Testing [827-B9D]
- Privacy-Preserving and Efficient Friend Recommendation in Social Networks [77E-936]
- Resource Mapping on Hybrid Testbeds [46C-991]
- Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems [B9A-545]
- Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack [CAD-D4E]
- Securing HARMS-based Communication between Heterogeneous Robots [74C-C60]
- Simulation of Data Transmission in Network Environment [00D-770]
- T-dominance: A Stealthy Propagation Strategy for Mobile Botnet [0EB-5B5]
Policy, Law and Management
- Amazon Kindle Forensics [78E-4D3]
- CERIAS Information Security Archive [0B5-6CD]
- Cyber warfare as a form of conflict: Evaluation of models of cyber conflict as a prototype to conceptual analysis [2CB-266]
- Identity Policy Choices as Propagation of Structure [216-7CA]
- Minding our ISPs and ICTs: A Model of the Policy Challenges to Alleviate the Digital Divide [E45-7CA]
- Motorola Xoom Examination [C61-907]
- Risk Assessment in an information centric world: Threats, vulnerabilities, countermeasures and impacts (a work in progress) [9C1-1F7]
Prevention, Detection and Response
- A Robust One Class Bayesian Approach for Masquerade Detection [DE7-FBD]
- Closing the Pandora’s Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks [544-4BA]
- Closing the Pandora’s Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks [BC9-697]
- Co-tenant Application Security on Mobile Devices [CE5-3C6]
- Computer Forensics at NIST [CE3-76D]
- Data Hiding in Cell Phones [95E-E13]
- Data Hiding in Cell Phones [AB0-7FE]
- Finding the Story in the TweetStack: Mining Spatio-temporal Clusters for Event Correlation and Visualization [5AA-2E8]
- Insider Threat Mitigation Framework [259-DBA]
- Modeling and Simulating the Cost and Impact of Cyber Attacks : Malware Threats [AE7-1FB]
- Secure Sensor Network SUM Aggregation with Detection of Malicious Nodes [B6D-17D]
- Security Auditing in Service Oriented Architecture [0B6-E42]
- The Evolution of Agricultural Pest Control and Food Security [EE1-AE3]
- Trustworthy Data from Untrusted Databases [2FA-B6D]
- Unmanned Aerial Systems Cyberattack Identification and Analysis [2B4-35E]