2019 Cybersecurity Research Transition to Practice Workshop Poster Session
Author(s)
Okutan, Ahmet
Andalibi, Vafa
Kim, DongInn
Moriano, Pablo
Kenny, Olivia
Streiff, Joshua
Jan, Steve
Harsha Kondapalli, Sri
Mehta, Darshit
Aono, Kenji
Issue Date
2019-06-19
Keyword(s)
Trusted CI
TTP
NSF
Cybersecurity
Posters
Abstract
Poster session from the Trusted CI 2019 Cybersecurity Research Transition to Practice Workshop.
Ahmet Okutan, Rochester Institute of Technology, Research Faculty
* CyberMPS: Cyberattack, Modeling, Prediction, and Simulation
Vafa Andalibi, Indiana University
* Securtle for Cyber Defense
* Defending IoT devices and Edge network with Manufacturer Usage Description
DongInn Kim, Indiana University
* Defending against Man In The Middle (MITM) Attacks at the Edge
Pablo Moriano, Indiana University, PhD
* Insider Threat Mitigation
Olivia Kenny, Indiana University
* Who’s Watching Your Child?
* The Overly Friendly Crockpot
Joshua Streiff, Indiana University
* Why Johnny Doesn’t Use Two Factor
Steve Jan, Virginia Tech
* Connecting the Digital and Physical World for Adversarial Attacks
Sri Harsha Kondapalli and Darshit Mehta, Washington University in St. Louis
* Zero-powered Dynamic Authentication based on Quantum Tunneling Timers
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.