Cybenko
Deception | ||||
---|---|---|---|---|
Date | Document Title | Author | Modified | Comments |
2009–07–09 | The Theory of Trackability with Applications to Sensor Networks | Crespi, Cybenko, Jiang | George Cybenko | Develops concepts for what kinds of processes are trackable and which are not, such as in cyberattacks. |
2009–07–09 | Process Query Systems | George Cybenko and Vincent H. Berk | George Cybenko | Algorithms for disambiguating sensor reports and assigning them to different processes, a problem that arises in large–scale cyber monitoring. |
2009–07–09 | Cybersecurity Strategies: The QuERIES Methodology | George Cybenko | Novel cyber risk assessment methodology using information markets | |
2009–07–09 | A Language of Life: Characterizing People using Cell Phone Tracks | Alexy Khrabrov and George Cybenko | George Cybenko | Computational approach for fingerprinting behaviors that can be used to uniquely characterize individuals or attack signatures |