- Powerless to Change: Individual Security Policy Compliance in the Age of Cyberwarfare
Paul Wilmoth, Griffin Gerry, Julia Stachofsky, Robert Crossler - Developing Tools for Cybersecurity Education and Assessment
Moises Carranza, Matthew Kusman, James Crabb, Chris Hundhausen - Evaluating the Observability of Network Security Monitoring Strategies with TOMATO
Zachary Werle, William Heinecke, James Halvorsen, Assefaw Gebremedhin - Graph Neural Networks for Polymorphic Virus Detection
Nathan Waltz, Kaitlin White, James Halvorsen, Assefaw Gebremedhin - USB Hot-plug Attack Counter Forensics
Noah Black - Microsoft Security: User Segmentation through PCA
Hillary Zhang, Brevin Simon - Clustering Software Vulnerabilities using Self-Organizing Maps: Observations and Analysis
Khyati Panchal, Timothy Cain - Applications of Generative Adversarial Networks to Intrusion Detection Systems
James Halvorsen, Assefaw Gebremedhin - CMU Ghosts to Simulate a User Environment and Detect Novelty
Vincent Lombardi, Timothy Reidy, Lawrence Holder - Kinetic Modeling and Process Control of Cytotoxic T Cell Expansion in a Centrifugal Bioreactor System
Brenden Fraser-Hevlin, Kitana Kaiphanliam, Bernard Van Wie, William C. Davis, Arda Gozen - CySER – Carnivore A
Riggs Ferguson and Spencer Scamman (Montana State University)