Posters > 2014
Assured Identity and Privacy
- Consumer Privacy Architecture for Power Grid Advanced metering infrastructure [616-591]
- Privacy Preserving Access Control in Service Oriented Architecture [955-3C4]
- pSigene: Generalizing Attack Signatures [F74-76F]
- Resilient and Active Authentication and User-Centric Identity Ecosystems [621-AD0]
- Semantic Anonymization of Medical Records [79D-5DB]
- The Password Wall — A Better Defense against Password Exposure [356-E8E]
- Top-K Frequent Itemsets via Differentially Private FP-trees [026-59A]
- VeryBioIDX: Privacy Preserving Biometrics-Based and User Centric Authentication Protocol [642-A07]
End System Security
- A Framework for Service Activity Monitoring [10E-9E2]
- A Key Management Scheme in BYOD Environment [953-6AD]
- FPGA Password Cracking [AB6-C90]
Human Centric Security
- A Study of Probabilistic Password Models [293-790]
- Analysis of Coping Mechanisms in Password Selection [ED9-F1E]
- Detecting Tic-Tac-Stego: Anomaly Detection for Steganalysis in Games [EF2-A3A]
- Enhancing Analyst Situation Awareness and Event Response in Cyber Network Operations Centers [BA8-C6C]
- Finland's Cyber Warfare Capabilities [B76-BC6]
- Mutual Restraining Voting Involving Multiple Conflicting Parties [CFF-BFE]
- Natural Language IAS: The Problem of Phishing [568-98B]
- Using social network data to track information and make decisions during a crisis [63B-A51]
Network Security
- A Framework to Find Vulnerabilities Using State Characteristics in Transport Protocol Implementations [0CA-1EC]
- Divide & Recombine for Big Data Analysis for Cybersecurity - Application of DNS Blacklist Query Study [1D1-D96]
Policy, Law and Management
- Confidentiality Guidelines for Cloud Storage [638-07D]
- Cyber 9/12 Student Challenge: Team Purdue Cyber Forensics [125-226]
- DC3 Digital Forensics Challenge [06E-C7C]
- Implementing Bayesian Statistics from an Analysis of Competing Hypothesis Framework [423-BAF]
- Netherland's Cyber Capabilities [5C4-B69]
- Saudi Arabian Policy on Cyber Capabilities [736-4CD]
- South Korea ICT Index Leader Cyber Assessments [889-AE7]
- Technological Impact of Criminal Enterprises: The Impact of Cloud Computing: [C58-160]
- The Efficacy of Case Studies for Teaching Policy in Engineering and Technology Courses [A5D-F63]
- The Impact of University Provided Nurse Electronic Medical Record (EMR)Training on Hospital Provider Systems: A Computer Simulation Approach [67A-535]
- The Irish Economy's Vulnerability to Cyber Conflict [68A-4A1]
- Threats, Vulnerabilities, and Security Controls in Cloud Computing [47D-18C]
Prevention, Detection and Response
- A Critical Look at Steganographic Investigations [6DA-2BF]
- Analysis of Cyberattacks on UASs in Simulation [60D-1F6]
- Communications, Information, and Cybersecurity in Systems-of-Systems [762-07D]
- Distributed Fault Detection and Isolation for Kalman Consensus Filter [5B1-A88]
- End to End Security in Service Oriented Architecture [AB0-BBB]
- INSuRE -- Information Security Research and Education [B4D-540]
- Log-Centric Analytics for Advanced Persistent Threat Detection [DC5-04B]
- Making the Case of Digital Forensics Field Training for Parole Services [F1A-504]
- Periodic Mobile Forensics [137-661]
- Robust Hybrid Controller Design: Cyber Attack Mitigation Strategy for Cyber-Physical Systems [531-FF5]
- Text-based Approaches to Detect Phishing Attacks [410-0E0]
- The Case of Using Negative (Deceiving) Information in Data Protection [822-479]