C3E 2009 Bibliography
Topic Areas
Create a New Topic
2009 C3E Bibliography | |||||
---|---|---|---|---|---|
Date | Topic Name | Document Title | Author | Modified By | Comments (hover over for full text) |
2009-09-30 | Network Analytics | Inference on Edge Density in Undirected Binary Networks | Marcus Perry and others | Marty | clever and fast |
2009-09-30 | Network Analytics | Identifying the Time of Step Change in the Mean of Autocorrelated Processes | Perry and others | Marty | helps to find when/where things happened |
2009-08-24 | Deception | Computing under occupation | K. Kursawe and S. Katzenbeisser | Steven Borbash | Directly relates to a theme of this workshop |
2009-08-04 | Behaviors | NY Times article about "behavior" | natalie Angier | George Cybenko | What do people mean by "behavior"....this is an example from biology |
2009-08-03 | Cyber Threat | 2009 Cyber Threats and Trends | Richard Howard | This document presents cyber security threats for 2009 and predicts cyber security disruptors that may emerge in 10 to 15 years. | |
2009-07-31 | Cyber Threat | Microsoft Security Intelligence Report | Microsoft Malware Protection Center | Steven Lipner | Recent summary of the prevalance of cyber attacks and vulnerabilities worldwide. |
2009-07-28 | Cybersecurity Strategy and Policy | Castle Warrior: redefining 21st century network defense | Monty McDougal | David Skillicorn | This seems like a helpful way to think about some of the issues (a keynote at the Intelligence and Security Informatics... |
2009-07-23 | Intelligent Systems | Intelligent Multi-Agent Information Security System | N. Kussul , A. Shelestov , A. Sidorenko , S. Skakun , Y. Veremeenko | Luanne Burns | The system includes different types of intelligent agents. The most important one is user agent based on neural network model of... |
2009-07-23 | Agile Systems | Agile Monitoring for Cyber Defense | Doyle, Kohane, Long, Shrobe, Szolovits | Luanne Burns | Monitoring, Analysis, and Interpretation Tool |
2009-07-23 | Game Theory | Challenges in Applying Game Theory to the Domain of Information Warfare? | Hamilton, Miller, Ott, Saydjari | Luanne Burns | There are significant advantages to utilizing game theory in the domain of information warfare. The algorithms sculpted to create programs capable... |
2009-07-23 | Dasgupta | Immuno-Inspired Autonomic System for Cyber Defense | Dipankar Dasgupta | Dipankar Dasgupta | The biological immune system is an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning,... |
2009-07-23 | Intelligent Systems | MULTI-AGENT SECURITY SYSTEM BASED ON NEURAL NETWORK MODEL OF USER'S BEHAVIOR | N. Kussul, A. Shelestov, A. Sidorenko, V. Pasechnik, S. Skakun, Y. Veremeyenko, N. Levchenko | Luanne Burns | It is proposed an agent approach for creation of intelligent intrusion detection system. The system allows detecting known type of attacks... |
2009-07-23 | Intrusion Detection | Traffic and Attack Pattern Analysis for Multiagent Distributed Intrusion Detection System | Grzegorz Kołaczek Krzysztof Juszczyszyn | Luanne Burns | The role of traffic anomalies detection is discussed, then it has been clarified how some specific values characterizing network communication can... |
2009-07-13 | Network Analytics | A Bibliography on Network Analytics | Salvatore J Stolfo | Salvatore Stolfo | A bibliography of recent papers cast in the "CV5 famework" : Audit and analysis of network traffic (or host events) and... |
2009-07-13 | Masquerader/Insider Attack | Masquerade Attack Detection Using a Search-Behavior | Malek Ben Salem and Salvatore J. Stolfo | Salvatore Stolfo | Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior... |
2009-07-13 | Deception | Baiting Inside Attackers Using Decoy | Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo | Salvatore Stolfo | In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exltrate... |
2009-07-09 | Cybersecurity Strategy and Policy | Cyberspace Policy Review | Sean Fahey | The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties... | |
2009-07-09 | Cybersecurity Strategy and Policy | National Cyberspace Strategy (2003) | Sean Fahey | The National Strategy to Secure Cyberspace is a call for national awareness and action by individuals and institutions throughout the United... | |
2009-07-09 | Cybersecurity Strategy and Policy | Creating a Framework for Cybersecurity | Sean Fahey | Some recent laws do provide regulatory incentives for corporate management to address cybersecurity issues. Potential models for additional action include the... | |
2009-07-09 | Cyber Threat | Terrorist Capability for Cyberattack (2007) | Sean Fahey | This report examines possible terrorists? objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of... | |
2009-07-09 | Cyber Threat | Symantec Global Internet Security Threat Report (2008) | Sean Fahey | The Symantec Global Internet Security Threat Report provides a six-month update of worldwide Internet threat activity. It includes analysis of network-based... | |
2009-07-09 | Cybersecurity Strategy and Policy | CSIS Securing Cybersecurity for the 44th President | Sean Fahey | The aim of the report is to identify recommendations that the next administration can implement quickly to make a noticeable improvement... | |
2009-07-09 | Cyber Threat | GAO - Cybercrime (2008) | Sean Fahey | GAO?s objectives were to (1) determine the impact of cybercrime on our nation?s economy and security; (2) describe key federal entities,... | |
2009-07-09 | Cybenko | The Theory of Trackability with Applications to Sensor Networks | CRESPI, CYBENKO,JIANG | George Cybenko | Develops concepts for what kinds of processes are trackable and which are not, such as in cyberattacks |
2009-07-09 | Cybenko | Process Query Systems | George Cybenko and Vincent H. Berk | George Cybenko | Algorithms for disambiguating sensor reports and assigning them to different processes, a problem that arises in large-scale cyber monitoring |
2009-07-09 | Cybenko | Cybersecurity Strategies: The Queries Methodology | George Cybenko | Novel cyber risk assessment methodology using information markets | |
2009-07-09 | Cybenko | A Language of Life: Characterizing People using Cell Phone Tracks | Alexy Khrabrov and George Cybenko | George Cybenko | Computational approach for fingerprinting behaviors that can be used to uniquely characterize individuals or attack signatures |
2009-07-09 | Dasgupta | Password Security through Negative Authentication | Dipankar Dasgupta and Sudip Saha | Dipankar Dasgupta | Authentication systems generally adopt the approach of checking an authentication request in a list of stored profiles of identification and verification... |
2009-07-09 | Dasgupta | Characterizing Comment Spam in the Blogosphere through Content Analysis | Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta | Dipankar Dasgupta | Spams are no longer limited to emails and webpages. The increasing penetration of spam in the form of comments in blogs... |
2009-07-06 | Cyber Threat | Mission Oriented Risk and Design Analysis of Critical Information Systems | Donald L. Buckshaw, et al. | William Streilein | This paper summarizes some interesting and useful work in risk analysis of cyber systems. It provides a methodology for assessing risk... |
2009-06-25 | Cybersecurity Strategy and Policy | Sami Saydjari on Cyberspace Operations | Sami Saydjari | Luanne Burns | ViodiTV coverage of 2009 Cyberspace Symposium sponsored by HEM Productions. Sami Saydjari, President, Cyber Defense Agency talks of critical infrastructures. |
2009-06-21 | Workshop description | Workshop 1-pager | Curt B | The basic outline of the conference and description of the workshop |