Posters > 2015
Assured Identity and Privacy
- A Taxonomy of Privacy-protecting Tools to Browse the World Wide Web [1AE-1EA]
- Data Spillage in Hadoop Clusters [8A5-562]
- Deception in Computing - Where and how it has been used [494-E03]
- FIDO Password Replacement: Spoofing a Samsung Galaxy S5 and PayPal Account Using a Latent Fake Fingerprint [1A8-BC8]
- INSuRE [CF2-F2E]
- Malware in Medical Devices [B6D-644]
- Monitoring DBMS Activity for Detecting Data Exfiltration by Insiders [C52-5A9]
- Privacy-Enhancing Features of Identidroid [65B-48E]
- Private Information Retrieval [C67-802]
- The Deep Web: An Exploratory Study of Social Networks [89B-BFD]
End System Security
- Car Hacking: Determining the Relative Risk of Vehicle Compromise [D27-C0C]
- Data Confidentiality and Integrity [212-C85]
- ls Based Integrity Levels [E1C-734]
- PD3: Policy–based Distributed Data Dissemination [A61-FBE]
- SNIPE: Signature Generation for Phishing Emails [79F-4F7]
Human Centric Security
- Improving the Biometric Data Collection Process through Six Sigma [1F1-36B]
- Information Alignment and Visualization for Security Operations Center Teams [2DA-870]
- Meaning-Based Machine Learning [B24-2EA]
- Natural Language IAS: Style Metrics from Semantic Analysis [F99-DDB]
- Password Coping Mechanisms [2D3-257]
Network Security
- A Visual Analytics based approach on identifying Server Redirections and Data Exfiltration [180-154]
- Analytical Environment for Large Scale Network Data [530-7FB]
- DNS Blacklist Query Study [DCC-595]
- Evaluating Public Cloud Providers [5DD-E79]
- Fast and Scalable Authentication for Vehicular Internet of Things [B37-A94]
- Hardware to Virtual Firewall Migration Heuristic Rules [9AB-546]
- How Secure and Quick is QUIC? Provable Security and Performance Analyses [D58-DCA]
- MIRROR: Automated Race Bug Detection for the Web via Network Events Replay [9FA-4B9]
- Network Forensics of Covert Channels in IPv6 [961-F17]
- Security Business Intelligence (SBI) Curriculum - Blazing the Trail [346-6EE]
Policy, Law and Management
- Cyber Forensics: The Need For An Official Governing Body [595-B62]
- Digital Forensics in Law Enforcement: A Needs Based Analysis of Indiana Agencies [369-D48]
- U.S. Bank of Cyber [EF2-253]
- Web Based Cyber Forensics Training [4EC-8A2]
- What Lies Beneath? The Forensics of Online Dating [440-484]
Prevention, Detection and Response
- A Tool For Interactive Visual Threat Analytics and Intelligence, based on OpenSOC Framework [9E8-4EE]
- Achieving a Cyber-Secure Smart Grid through Situation Aware Visual Analytics [BE7-5C6]
- Assessing Risk and Cyber Resiliency [4A5-418]
- Basic Dynamic Processes Analysis of Malware in Hypervisors: Type I & II [AAC-65E]
- ErsatzPasswords - Ending Password Cracking [0D5-AED]
- Increasing robustness and resilience: assessing disruptions and dependencies in analysis of System-of-Systems alternatives [46B-19D]
- JagWarz Junior: Cyber Security for Young Adolescents [2C8-2DF]
- Malware Defense with Access Control Policy and Integrity Levels [128-25A]
- Modeling Deception In Information Security As A Hypergame - A Primer [B4B-3D9]
- Risk Assessment in Layered Solutions [AB5-6F7]
- Using Syntactic Features for Phishing Detection [4D4-975]