C3E 2009 Bibliography

Topic Areas 
Create a New Topic

2009 C3E Bibliography
Date Topic Name Document Title Author Modified By Comments 
(hover over for full text)
2009-09-30 Network Analytics Inference on Edge Density in Undirected Binary Networks Marcus Perry and others  Marty clever and fast
2009-09-30 Network Analytics Identifying the Time of Step Change in the Mean of Autocorrelated Processes Perry and others  Marty helps to find when/where things happened
2009-08-24 Deception Computing under occupation K. Kursawe and S. Katzenbeisser  Steven Borbash Directly relates to a theme of this workshop
2009-08-04 Behaviors NY Times article about "behavior" natalie Angier  George Cybenko What do people mean by "behavior"....this is an example from biology
2009-08-03 Cyber Threat 2009 Cyber Threats and Trends   Richard Howard This document presents cyber security threats for 2009 and predicts cyber security disruptors that may emerge in 10 to 15 years.
2009-07-31 Cyber Threat Microsoft Security Intelligence Report Microsoft Malware Protection Center  Steven Lipner Recent summary of the prevalance of cyber attacks and vulnerabilities worldwide.
2009-07-28 Cybersecurity Strategy and Policy Castle Warrior: redefining 21st century network defense Monty McDougal  David Skillicorn This seems like a helpful way to think about some of the issues (a keynote at the Intelligence and Security Informatics...
2009-07-23 Intelligent Systems Intelligent Multi-Agent Information Security System N. Kussul , A. Shelestov , A. Sidorenko , S. Skakun , Y. Veremeenko   Luanne Burns The system includes different types of intelligent agents. The most important one is user agent based on neural network model of...
2009-07-23 Agile Systems Agile Monitoring for Cyber Defense Doyle, Kohane, Long, Shrobe, Szolovits  Luanne Burns Monitoring, Analysis, and Interpretation Tool
2009-07-23 Game Theory Challenges in Applying Game Theory to the Domain of Information Warfare? Hamilton, Miller, Ott, Saydjari  Luanne Burns There are significant advantages to utilizing game theory in the domain of information warfare. The algorithms sculpted to create programs capable...
2009-07-23 Dasgupta Immuno-Inspired Autonomic System for Cyber Defense Dipankar Dasgupta  Dipankar Dasgupta The biological immune system is an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning,...
2009-07-23 Intelligent Systems MULTI-AGENT SECURITY SYSTEM BASED ON NEURAL NETWORK MODEL OF USER'S BEHAVIOR N. Kussul, A. Shelestov, A. Sidorenko, V. Pasechnik, S. Skakun, Y. Veremeyenko, N. Levchenko  Luanne Burns It is proposed an agent approach for creation of intelligent intrusion detection system. The system allows detecting known type of attacks...
2009-07-23 Intrusion Detection Traffic and Attack Pattern Analysis for Multiagent Distributed Intrusion Detection System Grzegorz KoĹ‚aczek Krzysztof Juszczyszyn  Luanne Burns The role of traffic anomalies detection is discussed, then it has been clarified how some specific values characterizing network communication can...
2009-07-13 Network Analytics A Bibliography on Network Analytics Salvatore J Stolfo  Salvatore Stolfo A bibliography of recent papers cast in the "CV5 famework" : Audit and analysis of network traffic (or host events) and...
2009-07-13 Masquerader/Insider Attack Masquerade Attack Detection Using a Search-Behavior Malek Ben Salem and Salvatore J. Stolfo  Salvatore Stolfo Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior...
2009-07-13 Deception Baiting Inside Attackers Using Decoy Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo  Salvatore Stolfo In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to ex ltrate...
2009-07-09 Cybersecurity Strategy and Policy Cyberspace Policy Review   Sean Fahey The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties...
2009-07-09 Cybersecurity Strategy and Policy National Cyberspace Strategy (2003)   Sean Fahey The National Strategy to Secure Cyberspace is a call for national awareness and action by individuals and institutions throughout the United...
2009-07-09 Cybersecurity Strategy and Policy Creating a Framework for Cybersecurity   Sean Fahey Some recent laws do provide regulatory incentives for corporate management to address cybersecurity issues. Potential models for additional action include the...
2009-07-09 Cyber Threat Terrorist Capability for Cyberattack (2007)   Sean Fahey This report examines possible terrorists? objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of...
2009-07-09 Cyber Threat Symantec Global Internet Security Threat Report (2008)   Sean Fahey The Symantec Global Internet Security Threat Report provides a six-month update of worldwide Internet threat activity. It includes analysis of network-based...
2009-07-09 Cybersecurity Strategy and Policy CSIS Securing Cybersecurity for the 44th President   Sean Fahey The aim of the report is to identify recommendations that the next administration can implement quickly to make a noticeable improvement...
2009-07-09 Cyber Threat GAO - Cybercrime (2008)   Sean Fahey GAO?s objectives were to (1) determine the impact of cybercrime on our nation?s economy and security; (2) describe key federal entities,...
2009-07-09 Cybenko The Theory of Trackability with Applications to Sensor Networks CRESPI, CYBENKO,JIANG  George Cybenko Develops concepts for what kinds of processes are trackable and which are not, such as in cyberattacks
2009-07-09 Cybenko Process Query Systems George Cybenko and Vincent H. Berk  George Cybenko Algorithms for disambiguating sensor reports and assigning them to different processes, a problem that arises in large-scale cyber monitoring
2009-07-09 Cybenko Cybersecurity Strategies: The Queries Methodology   George Cybenko Novel cyber risk assessment methodology using information markets
2009-07-09 Cybenko A Language of Life: Characterizing People using Cell Phone Tracks Alexy Khrabrov and George Cybenko  George Cybenko Computational approach for fingerprinting behaviors that can be used to uniquely characterize individuals or attack signatures
2009-07-09 Dasgupta Password Security through Negative Authentication Dipankar Dasgupta and Sudip Saha  Dipankar Dasgupta Authentication systems generally adopt the approach of checking an authentication request in a list of stored profiles of identification and verification...
2009-07-09 Dasgupta Characterizing Comment Spam in the Blogosphere through Content Analysis Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta  Dipankar Dasgupta Spams are no longer limited to emails and webpages. The increasing penetration of spam in the form of comments in blogs...
2009-07-06 Cyber Threat Mission Oriented Risk and Design Analysis of Critical Information Systems Donald L. Buckshaw, et al.  William Streilein This paper summarizes some interesting and useful work in risk analysis of cyber systems. It provides a methodology for assessing risk...
2009-06-25 Cybersecurity Strategy and Policy Sami Saydjari on Cyberspace Operations Sami Saydjari  Luanne Burns ViodiTV coverage of 2009 Cyberspace Symposium sponsored by HEM Productions. Sami Saydjari, President, Cyber Defense Agency talks of critical infrastructures.
2009-06-21 Workshop description Workshop 1-pager   Curt B The basic outline of the conference and description of the workshop