C3E 2010 Bibliography

Topic Areas 
Create a New Topic

Workshop 10
Date Document Title Author Modified By Comments 
(hover over for full text)
2010-08-18 Data Analysis Challenges D. Meiron et al.  Luanne Burns JASON was asked to recommend ways in which the DOD/IC can handle present and future sensor data in fundamentally different ways
2010-08-18 On the Efficacy of Data Mining for Security Applications Ted E .Senator  Luanne Burns Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several...
2010-08-18 A Combinatorial Analysis of Link Discovery John Cheng, Ted Senator  Luanne Burns Link discovery and analysis, or connecting the dots, is a key component of intelligence analysis. Little principled analysis of this process...
2010-08-13 Detecting Fraud in the Real World Cahill, Lambert, Pinheiro, Sun  John Gerth One in a series of papers from Bell Labs about the development of their phone fraud detection system. It is a...
2010-08-13 Reducing Transaction Databases, Without Lagging Behind or Losing Information Chen, Lambert, Pinheiro, Sun  John Gerth A companion to "Detecting Fraud in the Real World", this Bell Labs paper details how individualized multi-dimensional signatures can be adaptively...
2010-08-12 Modeling Human Reasoning About Meta-Information Guarino, Pfautz, Cox & Roth  Sean Guarino An essential aspect of developing models of cyberspace behaviors - particularly online human behavior - is capturing the essential qualifiers, or...
2010-08-12 IMPOSING COSTS ON CYBER ATTACKERS 
 
Stephen J. Lukasik  Luanne Burns This is the third in a series of short papers dealing with cyber attacks and cyber attackers. The first “mapped the...
2010-08-11 A FRAMEWORK FOR THINKING ABOUT CYBER CONFLICT AND CYBER DETERRENCE, WITH POSSIBLE DECLARATORY POLICIES FOR THESE DOMAINS Stephen J. Lukasik  Luanne Burns Deterring Cyber Attacks, The Role of Declaratory Policy in Cyber Defense
2010-08-11 PROTECTING USERS OF THE CYBER COMMONS Stephen J. Lukasik  Luanne Burns Progress in protecting users of the cyber commons, popularly called "cyberspace," has been slow since network services became a consumer offering...
2010-08-04 International and Domestic Defense Against Cyber Attacks Steve Lukasik, Ph.D.  Luanne Burns Critical infrastructure systems provide attractive targets to agents intent on causing substantial damage to the U.S. economy. Infrastructure systems have features...
2010-07-15 A Framework for Analyst Focus from Computed Significance David Skillicorn  David Skillicorn This is a high-level think piece of how algorithmic approaches can make analysts' lives easier by helping to generate hypotheses and...
2010-07-07 Cyber Shockwave   Luanne Burns On February 16, 2010, a bipartisan group of former senior administration and national security officials participated in a simulated cyber attack...
2010-06-30 The Comprehensive National Cybersecurity Initiative National Security Council  Luanne Burns President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation,...
2010-06-24 The Hacker's Profiling Project Raoul Chiesa, Stefania Ducci and Silvio Ciappi  Luanne Burns The HPP project has the following main objectives: Analyze the hacking phenomenon-technological, social and economic-in all its aspects, using both a...
2010-06-24 Modelling Cyber Security: Approaches, Methodology, Strategies Edited by: U. Gori  Luanne Burns Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008,...
2010-06-24 CYBER WARFARE AND THE CRIME OF AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY ON TOMORROW'S BATTLEFIELD JONATHAN A. OPHARDT1  Luanne Burns As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow...
2010-06-24 SHADOWS IN THE CLOUD: 
 
JOINT REPORT:Information Warfare Monitor  Luanne Burns Crime and espionage form a dark underworld of cyberspace. Whereas crime is usually the first to seek out new opportunities and...