2018 MILCOM

Technical Paper Session: CSTC-4: Cyber Operation (Room New Orleans)

30 Oct 18
9:40 AM - 12:00 PM

Tracks: Track 3: Cyber Security and Trusted Computing, Unclassified Technical Paper Sessions

Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber Operations
Clara Maathuis (Delft University of Technology, TNO and Netherlands Defense Academy, The Netherlands); Wolter Pieters (Delft University of Technology, The Netherlands); Jan van den Berg (Delft University of Technology / Policy and Management, The Netherlands)
Wargaming a Closed National Network:What are You Willing to Sacrifice?
Heikki Lantto (National Defence University, Finland); Bernt M. Ã…kesson (Finnish Defence Research Agency, Finland); Juha Kukkola (National Defence University, Finland); Juha-Pekka Nikkarila and Mari Ristolainen (Finnish Defence Research Agency, Finland)
On Detecting Manifestation of Adversary Characteristics
Sridhar Venkatesan and Shridatt Sugrim (Vencore Labs, USA); Rauf IzmailovCho-Yu Jason Chiang and Ritu Chadha (Applied Communication Sciences, USA); Bharat Doshi (US Army CERDEC, USA); Blaine Hoffman (US Army Research Lab, USA); Allison Newcomb (US Army Research Laboratory & US Army Research Laboratory, USA); Norbou Buchler (Army Reserach Laboratory, USA)
15-min session break
Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth
John Charlton (University of Texas at San Antonio, USA); Pang Du (Virginia Tech, USA); Jin-Hee Cho (Virginia Polytechnic Institute and State University, USA); Shouhuai Xu (University of Texas at San Antonio, USA)
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example
Hyun Kwon (KAIST, Korea); Yongchul Kim (Korea Military Academy, Korea); Hyunsoo Yoon (KAIST, Korea); Daeseon Choi (Kongju University, Korea)