C3E 2010 Bibliography
Topic Areas
Create a New Topic
Workshop 10 | ||||
---|---|---|---|---|
Date | Document Title | Author | Modified By | Comments (hover over for full text) |
2010-08-18 | Data Analysis Challenges | D. Meiron et al. | Luanne Burns | JASON was asked to recommend ways in which the DOD/IC can handle present and future sensor data in fundamentally different ways |
2010-08-18 | On the Efficacy of Data Mining for Security Applications | Ted E .Senator | Luanne Burns | Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several... |
2010-08-18 | A Combinatorial Analysis of Link Discovery | John Cheng, Ted Senator | Luanne Burns | Link discovery and analysis, or connecting the dots, is a key component of intelligence analysis. Little principled analysis of this process... |
2010-08-13 | Detecting Fraud in the Real World | Cahill, Lambert, Pinheiro, Sun | John Gerth | One in a series of papers from Bell Labs about the development of their phone fraud detection system. It is a... |
2010-08-13 | Reducing Transaction Databases, Without Lagging Behind or Losing Information | Chen, Lambert, Pinheiro, Sun | John Gerth | A companion to "Detecting Fraud in the Real World", this Bell Labs paper details how individualized multi-dimensional signatures can be adaptively... |
2010-08-12 | Modeling Human Reasoning About Meta-Information | Guarino, Pfautz, Cox & Roth | Sean Guarino | An essential aspect of developing models of cyberspace behaviors - particularly online human behavior - is capturing the essential qualifiers, or... |
2010-08-12 | IMPOSING COSTS ON CYBER ATTACKERS |
Stephen J. Lukasik | Luanne Burns | This is the third in a series of short papers dealing with cyber attacks and cyber attackers. The first “mapped the... |
2010-08-11 | A FRAMEWORK FOR THINKING ABOUT CYBER CONFLICT AND CYBER DETERRENCE, WITH POSSIBLE DECLARATORY POLICIES FOR THESE DOMAINS | Stephen J. Lukasik | Luanne Burns | Deterring Cyber Attacks, The Role of Declaratory Policy in Cyber Defense |
2010-08-11 | PROTECTING USERS OF THE CYBER COMMONS | Stephen J. Lukasik | Luanne Burns | Progress in protecting users of the cyber commons, popularly called "cyberspace," has been slow since network services became a consumer offering... |
2010-08-04 | International and Domestic Defense Against Cyber Attacks | Steve Lukasik, Ph.D. | Luanne Burns | Critical infrastructure systems provide attractive targets to agents intent on causing substantial damage to the U.S. economy. Infrastructure systems have features... |
2010-07-15 | A Framework for Analyst Focus from Computed Significance | David Skillicorn | David Skillicorn | This is a high-level think piece of how algorithmic approaches can make analysts' lives easier by helping to generate hypotheses and... |
2010-07-07 | Cyber Shockwave | Luanne Burns | On February 16, 2010, a bipartisan group of former senior administration and national security officials participated in a simulated cyber attack... | |
2010-06-30 | The Comprehensive National Cybersecurity Initiative | National Security Council | Luanne Burns | President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation,... |
2010-06-24 | The Hacker's Profiling Project | Raoul Chiesa, Stefania Ducci and Silvio Ciappi | Luanne Burns | The HPP project has the following main objectives: Analyze the hacking phenomenon-technological, social and economic-in all its aspects, using both a... |
2010-06-24 | Modelling Cyber Security: Approaches, Methodology, Strategies | Edited by: U. Gori | Luanne Burns | Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008,... |
2010-06-24 | CYBER WARFARE AND THE CRIME OF AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY ON TOMORROW'S BATTLEFIELD | JONATHAN A. OPHARDT1 | Luanne Burns | As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow... |
2010-06-24 | SHADOWS IN THE CLOUD: |
JOINT REPORT:Information Warfare Monitor | Luanne Burns | Crime and espionage form a dark underworld of cyberspace. Whereas crime is usually the first to seek out new opportunities and... |