Files in this item

FilesDescriptionFormat

application/pdf

application/pdfTTP_posters_all.pdf (52MB)
(no description provided)PDF

Description

Title:2019 Cybersecurity Research Transition to Practice Workshop Poster Session
Author(s):Okutan, Ahmet; Andalibi, Vafa; Kim, DongInn; Moriano, Pablo; Kenny, Olivia; Streiff, Joshua; Jan, Steve; Harsha Kondapalli, Sri; Mehta, Darshit; Aono, Kenji
Subject(s):Trusted CI
TTP
NSF
Cybersecurity
Posters
Abstract:Poster session from the Trusted CI 2019 Cybersecurity Research Transition to Practice Workshop. Ahmet Okutan, Rochester Institute of Technology, Research Faculty * CyberMPS: Cyberattack, Modeling, Prediction, and Simulation Vafa Andalibi, Indiana University * Securtle for Cyber Defense * Defending IoT devices and Edge network with Manufacturer Usage Description DongInn Kim, Indiana University * Defending against Man In The Middle (MITM) Attacks at the Edge Pablo Moriano, Indiana University, PhD * Insider Threat Mitigation Olivia Kenny, Indiana University * Who’s Watching Your Child? * The Overly Friendly Crockpot Joshua Streiff, Indiana University * Why Johnny Doesn’t Use Two Factor Steve Jan, Virginia Tech * Connecting the Digital and Physical World for Adversarial Attacks Sri Harsha Kondapalli and Darshit Mehta, Washington University in St. Louis * Zero-powered Dynamic Authentication based on Quantum Tunneling Timers
Issue Date:2019-06-19
Genre:Conference Poster
Type:Text
image
Language:English
URI:http://hdl.handle.net/2142/104072
Sponsor:NSF #1547272
Rights Information:Copyright © 2019 The Trustees of Indiana University. This work is licensed under a Creative Commons Attribution-­NonCommercial 3.0 Unported (CC BY­NC 3.0) license.
Date Available in IDEALS:2019-06-27


This item appears in the following Collection(s)

Item Statistics