![]() |
|
| SafeConfig'17 Table of Contents SafeConfig'16:
Testing and Evaluation for Active & Resilient Cyber Systems SafeConfig'16 Workshop Organization
Session:
Keynote Addresses Configuring
Software and Systems for Defense-in-Depth (Page
1) From
Cybersecurity to Collaborative Resiliency (Page
3) Session:
Architectures, Configurations and Verification AHEAD:
A New Architecture for Active Defense (Page
11) A
One-Year Perspective on Exposed In-memory Key-Value Stores (Page
17) Towards
Automated Verification of Active Cyber Defense Strategies on Software
Defined Networks (Page
23) |
|
| (Return to Top) | Session:
Prevention, Detection and Metrics Firewalling
Scenic Routes: Preventing Data Exfiltration via Political and Geographic
Routing Policies (Page
31) An
Iterative and Toolchain-Based Approach to Automate Scanning and Mapping
Computer Networks (Page
37) A
Graph-Based Impact Metric for Mitigating Lateral Movement Cyber Attacks (Page
45) |
| (Return to Top) | Panel
Session SafeConfig'16:
Testing and Evaluation for Active & Resilient Cyber Systems Panel: Verification
of Active and Resilient Systems: Practical or Utopian? (Page
53) |