Posters > 2019
Artificial Intelligence
- Authorship Attribution of Predators in Chat Conversations [AEB-9DE]
- We Need Robust Neural Networks [BEC-47F]
Assured Identity and Privacy
- Content Focus to Protect Against Trojan Attacks on Neural Networks [B55-CA5]
- Effects of Body Position on Facial Recognition in Police Body-Worn Cameras [851-34B]
- On the Security of Short Schnorr Signatures [73D-9BD]
- Online Social Network De-anonymization via Conditional Generative Adversarial Network Model [E3C-72A]
- Ryuk Ransomware Similarity Analysis [E72-781]
- Trellis++ a Practical Privacy-Preserving Food Safety Framework [F93-37E]
- WhatsApp Forensics: Locating Artifacts on Web Clients and Standalone Desktop Applications [B85-C09]
End System Security
- Blockhub: Blockchain-based Data Communication System with Leakage Prevention and Detection [818-F3F]
- Energy Efficient Byzantine Agreement [1D1-AE3]
- IoT2: Benchmarking The Security of The IoT Things [FB3-74E]
- Modular Neural Networks for Low-Power Computer Vision [BC6-AE9]
Human Centric Security
- A Study on Fingerprint Interoperability: Sensor and Individual Performance [877-B46]
- Comparing Learning Gains in Cryptography Concepts Taught Using Different Instructional Methods and Measuring Cognitive Processing Activity of Cryptography Concepts [8D7-65E]
- Cyber Human Ecosystem of Engaged Security Education [65A-26C]
- Leveraging Multi-View Reviewer Representation for Spammer Detection in Online Reviews [755-459]
- Password Training Using Crowdsourcing Methods: Results from a One-Year Follow-Up [0F7-6DE]
- Post-Mortem Biometrics [5D3-45F]
- Recall Accuracy of Self-generated Passwords with and without Generation Criteria Reminders [09B-BC5]
- The Effects of Online Anxiety on Cyber-Hygiene [4A1-DE5]
- The Effects of Online Anxiety on Cyber-Secure Behavior [8F6-CA3]
- Towards trustworthy NLP systems: detecting bias in popular models [F87-8F9]
Network Security
- Combating Caller ID Spoofing on 4G Phones Via CEIVE [89A-7E3]
- Not All Equal: Stronger Password Protection via Differentiated Hashing Costs [534-E2C]
- Poisoning Attacks agains Anomaly Detection Techniques [8E3-668]
- PULSAR: Purdue Live Security Analyzer for High-Performance Research Network [5AB-F63]
- Resilient Distributed State Estimation and Hypothesis Testing in Dynamic Environments [25D-B90]
- Resilient Sensor Placement for Kalman Filtering in Diffusion Networks [D9C-6DB]
- Towards A More Stable Bitcoin Transaction Fee Design [644-B19]
- Wazuh: A Free Security Monitoring Solution for Detecting Threats and Providing Incident Response [A0E-5FB]
Policy, Law and Management
- Controlled Unclassified Information Framework [5A9-0DB]
- Regulations and Requirements for Autonomous Vehicles [31C-213]
Prevention, Detection and Response
- Adaptive Task Allocation to Heterogeneous Agents [D67-351]
- Ancile: Attack Surface Reduction Through Application Specialization [925-1D4]
- Automated Indexing of Visual Data from Network Cameras [008-83E]
- Collaborative Response to Disruptions and Their Propagation (CRDP) in Cyber-physical Networks [526-1CC]
- Drone Disrupted Denial of Service Attack (3DOS): Towards an Incident Response and Forensic Analysis of Remotely Piloted Aerial Systems (RPASs) [ABC-9CC]
- Duress Authentication via Partially Homomorphic Encryption [3D1-B40]
- Interactive Learning for Identifying Relevant Tweets to Support Real-time Situational Awareness [3FE-B6F]
- MetricsVis: A Visual Analytics Framework for Evaluating Individual, Team, and Organization Performance [1E8-218]
- Resilient Control Designed for CPS: a Hybrid System Approach [BCB-34D]
- Secure Distributed Consensus Control for Multi-Robot Systems [440-21C]