Graph-Based Traffic Analysis for Network Intrusion Detection
Gary Sandine, Los Alamos National Laboratory, USA
Security through Usability: a user-centered approach for balanced security policy requirements
Shamal Faily, University of Oxford, UK
Side Channel Finder (Version 1.0)
Artem Starostin, TU Darmstadt, Germany
Service Automata for Secure Distributed Systems
Richard Gay, TU Darmstadt, Germany
Accelerating Regular Expression Processing Using Hardware DFA Engines
Jordi Ros-Giralt, Reservoir Labs, USA
SIFEX: Tool for Static Analysis of Browser Extensions for Security Vulnerabilities
Shikhar Agarwal, Indian Institute of Technology, Delhi, India
RAVEN: Real-time Attack Visualization through Examining Network flows
Ethan Singleton, University of Tulsa, USA
DDoS Attacks Avoidance by Securely Hiding Web Severs
Mohamad Samir A. Eid, University of Tokyo, Japan
Reliable Time Based Forensics in NTFS
Xiaoqin Ding, Shanghai Jiao Tong University, China
Inherent Problems in the Information Technology Supply Chain
Courtney Cavness, Atsec Corporation, USA