Found 199 results
In Press
Harrison, W. L., D. Andrews, and G. Allwein, "Simulation Logic", Logic and Logical Philosophy, In Press. PDF icon 12-1231-2384.pdf (281.37 KB)
Shing, L., A. Wollaber, S. Chikkagoudar, J. Yuen, P. Alvino, A. Chambers, and T. Allard, "Extracting Workflows from Natural Language Documents: A First Step", First International Workshop on Artificial Intelligence for Business Process Management (AI4BPM): Springer, Cham, pp. 294-300, 2019. PDF icon AI4BPM_Shing_et_al.pdf (283.95 KB)
Arthur-Durett, K., T. E. Carroll, and S. Chikkagoudar, "Discovering Significant Co-Occurrences to Characterize Network Behaviors", 20th International Conference on Human Computer Interaction (HCII 2018): Springer, Cham, pp. 609-623, 06/2018. PDF icon 2400_final(1).pdf (174.48 KB)
Guarino, A., J. Komárková, and J. Rowell, "“Hello, World” Autonomous Agent", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience: Army Research Laboratory, pp. 26-31, 04/2018. PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
Blowers, M., H. Harney, and G. Wehner, "Preventing the “Killer Robot” Scenario", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience: Army Research Laboratory, pp. 22-25, 04/2018. PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
Blakely, B., D. Henshel, G. Wehner, and J. Rowell, "Toward a Taxonomy of Fundamental System Properties of Cyber Resilience", NATO IST-153 Workshop on Cyber Resilience: Army Research Laboratory , pp. 2-6, 04/2018. PDF icon Report of IST-153 workshop Munich 2017.pdf (1.55 MB)
Macklin, T., and P. West, "Towards a Trustworthy Foundation for Assured Autonomous Systems", Specialist's Meeting on Mission Assurance for Autonomous Unmanned Systems: NATO RTO, pp. 15, 10/2018. PDF icon MP-IST-166-04.pdf (428.26 KB)
Harrison, A., A. Raglin, M. Livingston, D. Brock, Jr., J. Decker, D. Perzanowski, C. Van Dolson, J. Mathews, and A. Lulush, "The Analysis and Prediction of Eye Gaze When Viewing Statistical Graphs", International Conference on Augmented Cognition, Vancouver, Canada, Springer, pp. 148-165, 05/2017.
Johnson, A., R. Jansen, A. D. Jaggard, J. Feigenbaum, and P. Syverson, "Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection", Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), 2017. PDF icon 16-1231-4380.pdf (1.19 MB)
Macklin, T., and J. Mathews, "Big Data, Little Security: Addressing Security Issues in your Platform", SPIE Proceedings, Next-Generation Analyst V, Anaheim, California, SPIE Defense + Security, pp. 1-10, 05/2017. PDF icon Macklin et al.pdf (4.14 MB)
Kirby, Jr, J., J. McDermott, and G.. Campbell, Commonality and Variability Analysis for Xenon Family of Separation Virtual Machine Monitors (CVAX), , 2017. PDF icon 17-1231-2039.pdf (524.15 KB)
Fenske, E., A. Mani, A. Johnson, and M. Sherr, "Distributed Measurement with Private Set-Union Cardinality", The 24th ACM Conference on Computer and Communications Security (CCS 2017), 10/2017. PDF icon 17-1231-3131.pdf (1.16 MB)
Wehner, G., J. Rowell, J. Langley, and J. Mathews, "Federated Cybersecurity Policy Arbitration", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience, Munich, Germany, International Journal of Security and Networks, pp. 83-85, 10/2017. PDF icon Wehner et al.pdf (525.18 KB)
Syverson, P., "The Once and Future Onion", Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017) , 07/2017. PDF icon 17-1231-2218.pdf (144.21 KB)
Chen, O., C. A. Meadows, and G. Trivedi, "Stealthy Protocols: Metrics and Open Problems", Proceedings of Concurrency, Security, and Puzzles, pp. 1-17, 01/2017. PDF icon 16-1231-4198.pdf (241.78 KB)
Syverson, P., and G. Boyce, "Bake in .onion for Tear-Free and Stronger Website Authentication", IEEE Security & Privacy Magazine, 2016. PDF icon 15-1231-4218.pdf (1.99 MB)
Johnson, A., R. Jansen, N. Hopper, A. Segal, and P. Syverson, "PeerFlow: Secure Load Balancing in Tor", Proceedings on Privacy Enhancing Technologies, vol. 2017, issue 2, 12/2016. PDF icon 16-1231-4353.pdf (1.1 MB)
Jansen, R., and A. Johnson, "Safely Measuring Tor", 23rd ACM Conference on Computer and Communications Security, 10/2016. PDF icon 16-1231-2651.pdf (498.4 KB)
Jaggard, A. D., A. Johnson, S. Cortes, P. Syverson, and J. Feigenbaum, "20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables Proceedings on Privacy Enhancing Technologies", Proceedings on Privacy Enhancing Technologies, vol. 1, issue 1, pp. 4-24, 04/2015. PDF icon 15-1231-0586.pdf (1.36 MB)
Juen, J., A. Johnson, A. Das, N. Borisov, and M. Caesar, "Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", Proceedings on Privacy Enhancing Technologies, vol. 1, 05/2015. PDF icon 15-1231-1429.pdf (2.06 MB)
Syverson, P., and G. Boyce, "Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication", IEEE Workshop on Web 2.0 Security & Privacy, 05/2015. PDF icon 15-1231-0478.pdf (77.83 KB)
Goulet, D., A. Johnson, G. Kadianakis, and K. Loesing, "Hidden-service statistics reported by relays", NRL Technical Reports, no. 2015-04-001, 06/2015. PDF icon 15-1231-1605.pdf (131.38 KB)
Miller, A., and R. Jansen, "Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015. PDF icon 15-1231-1593.pdf (3.24 MB)
West, N., D. Geiger, and G. Scheets, "Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014. PDF icon 14-1231-2162.pdf (1.1 MB)
Allwein, G., and W. L. Harrison, "Distributed Logics", NRL Memorandum Report, no. 9565, 2014. PDF icon 14-1231-3181.pdf (583.12 KB)