Automatically Validating the Effectiveness of Software Diversity Schemes
Daniel M. Kelly, Christopher C. Wellons, Joel Coffman, Andrew S. Gearhart (JHU APL, Air Force Academy)
Privacy-Preserving Deep Learning Computation for Geo-Distributed Medical Big-Data Platforms
Joohyung Jeony, Junhui Kimy, Joongheon Kimy, Kwangsoo Kimz, Aziz Mohaisen, and Jong-Kook Kim
A Quantitative Approach For Medical Imaging Device Security Assessment
Pingchuan Ma1, Zhiqiang Wang, Xiaoxiang Zou, Jianyi Zhang, Qixu Liu, Xin Lv and Wentao Wang
The STAR-Guardian Network for the Protection of Long-Life Cyber-Physical Systems
Algirdas Avizienis, Rimas Avizienis, Audrius Avizienis
Privacy and Security of Connected Vehicles in Intelligent Transportation System
Alireza Jolfaei and Krishna Kant
Towards Cognitive Security Defense from Data
Marcello Cinque, Domenico Cotroneo, and Antonio Pecchia
Towards Predicting the Impact of Roll-Forward Failure Recovery for HPC Applications
Bo Fang, Jieyang Chen, Karthik Pattabiraman, Matei Ripeanu, Sriram Krishnamoorthy
SDN-based IP Shuffling Moving Target Defense with Multiple SDN Controllers
Jargalsaikhan Narantuya, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Dong Seong Kim, Terrence J. Moore, and Frederica F. Nelson
Consistent BFT Performance for Blockchains
Mohammad M. Jalalzai, Costas Busch, Golden G. Richard III
Bayesian Neural Network based Encrypted Traffic Classification using Initial Handshake Packets
Jiwon Yang, Jargalsaikhan Narantuya, and Hyuk Lim
P4 AIG : Circuit-Level Verification of P4 programs
Mohammad A. Noureddine, Amanda Hsu, Matthew Caesar, Fadi A. Zaraket, William H. Sanders
Short-Liveness of Error Propagation in Kernel can Improve Operating Systems Availability
Manabu Sugimoto, Takafumi Kubota, Kenji Kono
Towards a Bayesian Approach for Assessing Fault Tolerance of Deep Neural Networks
Subho S. Banerjee, James Cyriac, Saurabh Jha, Zbigniew T. Kalbarczyk and Ravishankar K. Iyer
Retrospectively Documenting SAFEGUARD’s Possession of the Overarching Properties
Mallory Suzanne Graydon