Publications by the DETER Team

The DETER Project Team has published extensively about the work of the project, its research results, and the on-going process of putting research results into practice in DETERLab, where cybersecurity experimenters worldwide can benefit from DETER's advances in cybersecurity test and experimentation technology. You can view peer-reviewed publications, invited papers and other publications below.

Peer-Reviewed Publications

2018

2017

2016

2015

  • A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. Tatyana Ryutov, Michael Orosz, James Blythe, and Detlof von Winterfeldt. In Proceedings of the 11th International Workshop on Security and Trust Management (STM '15), Vienna, Austria, September 21-22, 2015.
  • Engaging Novices in Cybersecurity Competitions: A Vision and Lessons Learned at ACM Tapia 2015. Jelena Mirkovic, Aimee Tabor, Simon Woo, and Portia Pusey. In Proceedings of the 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE '15), Washington DC, August 11, 2015.
  • Mismorphism: a Semiotic Model of Computer Security Circumvention. S.W. Smith, R. Koppel, J. Blythe, and V. Kothari. In Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance (HAISA '15), Levos, Greece, July 1-3, 2015.
  • Expressing Different Traffic Models Using The LegoTG Framework. Genevieve Bartlett and Jelena Mirkovic. Best Paper Award at the international workshop on Computer and Networking Experimental Research using Testbeds (CNERT '15), Columbus, OH, June 29, 2015.
  • Cypress: A Testbed for Research in Networked Cyber-Physical Systems. Ryan Goodfellow and Erik Kline. In Proceedings of the 10th EAI International Conference on Testbeds and Research Infrastructures of the Development of Networks & Communities (TRIDENTCOM), Vancouver, BC, Canada, June 24-25, 2015.
  • Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Best Paper Honorable Mention at the eCrime 2015 Mobile Security Symposium, Barcelona, Spain, May 26-29, 2015.
  • Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems. Paul Wood, Saurabh Bagchi, and Alefiya Hussain. In Proceedings of the 20th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems, Hyderabad, India, May 25-29, 2015.
  • Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling. Vijay Kothari, Jim Blythe, Ross Koppel, and Sean W. Smith. In Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS '15), University of Illinois at Urbana-Champaign, April 21-22, 2015.
  • Workarounds to Computer Access in Healthcare Organizations: You want My Password or a Dead Patient? Ross Koppel, Sean W. Smith, Jim Blythe, and Vijay Kothari. In Proceedings of Information Technology and Communication in Health Conference (ITCH) 2015, Victoria, BC, Canada, February 26 - March 1, 2015.

2014

2013

2012

2011

2010

2009

  • RAD: Reflector Attack Defense Using Message Authentication Codes. E. Kline, M. Beaumont-Gay, J. Mirkovic, and P. Reiher. In Proceedings of the 2009 Annual Computer Security Applications Conference, Honolulu, Hawaii, December 7-11, 2009.
  • A Federated Experiment Environment for Emulab-based Testbeds. T. Faber and J. Wroclawski. In Proceedings of the 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2009), Washington DC, April 6-8, 2009.
  • Tools for Worm Experimentation on the DETER Testbed. S. Wei, C. Ko, J. Mirkovic, and A. Hussain. In Proceedings of the 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM 2009), Washington DC, April 6-8, 2009.
  • Current Developments in DETER Cybersecurity Testbed Technology. T. Benzel, B. Braden, T. Faber, J. Mirkovic, S. Schwab, K. Sollins, and J. Wroclawski. In Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security (CATCH 2009), Washington, DC, March 3-4, 2009.
  • How to Test DoS Defenses. J. Mirkovic, S. Fahmy, P. Reiher, and R. Thomas. In Proceedings of the Cybersecurity Applications & Technology Conference for Homeland Security (CATCH 2009), Washington, DC, March 3-4, 2009.

2008

2007

2006

  • Identification of Repeated Denial of Service Attacks. Alefiya Hussain, John Heidemann, and Christos Papadopoulos. In Proceedings of 25th IEEE International Conference on Computer Communications 2006 (INFOCOM '06), Barcelona, Spain, April 23-29, 2006.
  • Experience with DETER: A Testbed for Security Research. T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. In Proceedings of Tridentcom (International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities), March 2006.

2004

  • Cyber Defense Technology Networking and Evaluation. R. Bajcsy, T. Benzel, M. Bishop, B. Braden, C. Brodley, S. Fahmy, S. Floyd, W. Hardaker, A. Joseph, G. Kesidis, K. Levitt, B. Lindell, P. Liu, D. Miller, R. Mundy, C. Neuman, R. Ostrenga, V. Paxson, P. Porras, C. Rosenberg, J. D. Tygar, S. Sastry, D. Sterne, and S. F. Wu. In Communications of the ACM, Special issue on Emerging Technologies for Homeland Security, Vol. 47, Issue 3, pp 58-61, March 2004.

2003

Invited Papers

Other Publications