This work presents an evaluation of six prominent commercial endpoint ma...
Modern security operation centers (SOCs) rely on operators and a tapestr...
In this case study, we describe the design and assembly of a cyber secur...
Vehicular Controller Area Networks (CANs) are susceptible to cyber attac...
Security operation centers (SOCs) all over the world are tasked with rea...
Policy-mandated, rigorously administered scientific testing is needed to...
Modern vehicles are complex cyber-physical systems made of hundreds of
e...
The Controller Area Network (CAN) protocol is ubiquitous in modern vehic...
There is a lack of scientific testing of commercially available malware
...
CANs are a broadcast protocol for real-time communication of critical ve...
Security operation centers (SOCs) typically use a variety of tools to co...
We present an approach to analyze C^1(R^m) functions that
addresses limi...
Metrics and frameworks to quantifiably assess security measures have ari...
Modern vehicles contain a few controller area networks (CANs), which all...
Modern security operations centers (SOCs) employ a variety of tools for
...
Modern vehicles contain scores of Electrical Control Units (ECUs) that
b...
Host logs, in particular, Windows Event Logs, are a valuable source of
i...
Modern vehicles rely on scores of electronic control units (ECUs)
broadc...
Modern cyber security operations collect an enormous amount of logging a...
This survey focuses on intrusion detection systems (IDS) that leverage
h...
Scientists and engineers rely on accurate mathematical models to quantif...
Anomaly detection (AD) has garnered ample attention in security research...
This paper introduces a novel graph-analytic approach for detecting anom...
In order to assist security analysts in obtaining information pertaining...
This work presents a novel modeling and analysis framework for graph
seq...