skip to main content
10.1145/3212687acmotherconferencesBook PagePublication PagescybersecConference Proceedingsconference-collections
CyberSec '18: Proceedings of the Fifth Cybersecurity Symposium
ACM2018 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CyberSec '18: Fifth Cybersecurity Symposium Coeur d' Alene Idaho April 9 - 11, 2018
ISBN:
978-1-4503-6406-5
Published:
09 April 2018

Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

Skip Table Of Content Section
research-article
The challenging nexus of technology and security in transportation management center operations

The growing dependency on the use of technology has increased the potential for cyber-security vulnerabilities. The purpose of this study was to provide insight by gathering feedback from industry operators, practitioners, and suppliers specifically ...

research-article
Public Access
Understanding past, current and future communication and situational awareness technologies for first responders

This study builds a foundation for improving research for first responder communication and situational awareness technology in the future. In an online survey, we elicited the opinions of 250 U.S. first responders about effectiveness, security, and ...

research-article
Advancing cybersecurity education: pink elephant unicorn

Pink Elephant Unicorn (PEU) is a Science, Technology, Engineering, and Math (STEM) cybersecurity competition targeted at anyone who has a drive to learn about cybersecurity. Tasks included puzzle development, trivia creation, play zone development, ...

research-article
Hardening web applications using a least privilege DBMS access model

Within the last three years hundreds of millions of private data records have been compromised in high-profile data breaches, resulting in billions of dollars in economic losses and unrecoverable loss of privacy. One commonality is that attackers ...

research-article
Operational characteristics of modern malware: PCO threats

Active network threats are substantial hurdles for achieving absolute network security. This hurdle is due to the ability of highly infectious threats, like viruses and worms to propagate and duplicate autonomously and automatically, over a network. ...

short-paper
Situational awareness for SCADA systems

As the threat level and attack sophistication increases for supervisory control and data acquisition (SCADA) systems, the need to increase the ability to detect, respond and recover becomes correspondingly important. This paper discusses the methods to ...

short-paper
Development of industrial network forensics lessons

Most forensic investigators are trained to recognize abusive network behavior in conventional information systems, but they may not know how to detect anomalous traffic patterns in industrial control systems (ICS) that manage critical infrastructure ...

short-paper
Public Access
Qualitative risk assessment of cyberattacks on power systems

For almost 100 years, attacks on the electric infrastructure of a country have been identified as key vulnerabilities during times of war. Homegrown radical environmental groups and separatist movements in other countries have all waged war on the ...

short-paper
Vulnerabilities under the surface: tracking potential vulnerabilities by voiding warranties

This paper will describe a practical methodology for understanding the cyber risk of a digital asset. This research attempts to gain a greater understanding of the cyber risk posed by a hardware-based computer asset by considering it as a sum of its ...

short-paper
Dealing with the risk of organizational espionage

This paper reviews the issues involved with espionage in organizations. The dimensions of information are described as well as a brief history of espionage. There are multiple detection tools available to the organization that can be implemented, with ...

short-paper
Public Access
Developing a taxonomy of cyber attacks in WAMS

Power grids are undergoing their largest technological transformation since their invention. They are adopting technologies like Phasor Measurement Units (PMU) to obtain real- time measurements of the system and report them to the control center for ...

short-paper
Open Access
Security as a service: real-time intrusion detection in internet of things

With the increase in number of Internet connected devices, security and privacy concerns are the major obstacles impeding the widespread adoption of Internet of Things (IoT). Securing IoT has become a huge area of concern for all, including the ...

short-paper
Exploring ensemble classifiers for detecting attacks in the smart grids

The advent of machine learning has made it a popular tool in various areas. It has also been applied in network intrusion detection. However, machine learning hasn't been sufficiently explored in the cyberphysical domains such as smart grids. This is ...

short-paper
Cyber security considerations on PMU-based state estimation

State estimation allows continuous monitoring of a power system by estimating the power system state variables from measurement data. Unfortunately, the measurement data provided by the devices can serve as attack vectors for false data injection ...

Recommendations