C3E Bibliography - All Documents
Topic Areas
Create a New Topic
C3E Bibliography – All Documents | ||||||
Date | Topic Name | Document Title | Author | Modified By | Comments (hover over for full text) |
|
---|---|---|---|---|---|---|
2011-09-25 | Workshop 2011 – Emergent Behavior Track | Complexity Science Challenges in Cybersecurity | Robert C. Armstrong, Jackson R. Mayo, Frank Siebenlist | Luanne Burns | Computers and the Internet are indispensable to our modern society, but by the standards of critical infrastructure, they are notably unreliable.... | |
2011-09-25 | Workshop 2011 – Emergent Behavior Track | Leveraging Complexity in Software for Cybersecurity | Robert C. Armstrong, Jackson R. Mayo | Luanne Burns | A method for assessing statistically quantifiable improvements in security for software vulnerabilities is presented. Drawing on concepts in complexity theory, undecidability,... | |
2011-09-25 | Workshop 2011 – Emergent Behavior Track | Self-organization in social insects | Eric Bonabeau, Guy Theraulaz, Jean-Louis Deneubourg, Serge Aron and Scott Camazine | Luanne Burns | Self-organization was introduced originally in the context of physics and chemistry to describe how microscopic processes give rise to macroscopic structures... | |
2011-09-25 | Workshop 2011 – Emergent Behavior Track | Swarm Intelligence | Blum, Christian; Merkle, Daniel (Eds.) | Luanne Burns | The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While... | |
2011-09-24 | Network Analytics | Discovering Emergent Behavior From Network Packet Data: Lessons from the Angle Project | Robert L Grossman, Michal Sabala, Yunhong Gu, Anushka Anand, Matt Handley, Rajmonda Sulo and Lee Wilkinson | Robert Grossman | The paper describes a practical method to discover a certain class of emergent behavior in distributed network data. The paper is... | |
2011–09–23 | Data Driven Experimental Science | The Role of Experimental Science in Cybersecurity | Ed Giorgio | Ed Giorgio | This presentation contrasts the theoretical and experimental approaches to cybersecurity research. With the emphasis on "data intensive computing" and "anomaly detection"... | |
2011-09-22 | Workshop 2011 – Emergent Behavior Track | The Promise and Peril of Big Data | David Bollier | Luanne Goldrich | According to a recent report1, the amount of digital content on the Internet is now close to five hundred billion gigabytes.... | |
2011-09-22 | Workshop 2011 | What is Data Science? | Mike Loukides | Luanne Burns | The Web is full of “data-driven apps.” Almost any e-commerce application is a data-driven application. There’s a database behind a web... | |
2011-09-22 | Workshop 2011 | Ant-Based Cyber Security | Jereme N. Haack, Glenn A. Fink, Wendy M. Maiden, A. David McKinnon, Steven J. Templeton | Luanne Burns | We describe a swarming-agent-based, mixedinitiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem... | |
2011-09-22 | Workshop 2011 | Big Data, Analytics and the Path From Insights to Value | Steve LaValle, Eric Lesser, Rebecca Shockely, Michael S. Hopkins, and Nina Kruschwitz | Luanne Burns | How the smartest organizations are embedding analytics to transform information into insight and then action. Findings and recommendations from the first... | |
2011-09-22 | Workshop 2011 | Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society | Randal E. Bryant, Rnady H. Katz, Edward D. Lazowska | Luanne Burns | Advances in digital sensors, communications, computation, and storage have created huge collections of data, capturing information of value to business, science,... | |
2011-09-22 | Workshop 2011 | Understanding High–Dimensional Spaces | David Skillcorn | Luanne Burns | High-dimensional spaces arise naturally as a way of modelling datasets with many attributes. Such a dataset can be directly represented in... | |
2011-09-20 | Workshop 2011 & Intrusion Detection | Outside the Closed World: On Using Machine Learning For Network Intrusion Detection | Robin Sommer and Vern Paxson | John Gerth | This is a thoughtful analysis of why, despite extensive research, one rarely finds network intrusion detection systems based on machine-learning deployed... | |
2011-09-16 | Workshop 2011 | Cyber Intelligence...setting the landscape for an emerging discipline | INSA | Luanne Burns | Evolving information systems technology has turned the cyber arena into a multi-dimensional attack space that extends the conventional landscape to a... | |
2011-09-16 | Workshop 2011 – Emergent Behavior Track | The Calculi of Emergence: Computation, Dynamics, and Induction | James P. Crutchfield | Luanne Burns | Defining structure and detecting the emergence of complexity in nature are inherently subjective, though essential, scientific activities. Despite the difficulties, these... | |
2011-09-16 | Workshop 2011 – Emergent Behavior Track | Directions in Security Metrics Research | Wayne Jansen | Luanne Burns | More than 100 years ago, Lord Kelvin insightfully observed that measurement is vital to deep knowledge and understanding in physical science.... | |
2011-09-16 | Workshop 2011 – Emergent Behavior Track | Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology | LAWRENCE CARIN, GEORGE CYBENKO, JEFF HUGHES | Luanne Burns | Organizations in both the private and public sectors have been struggling to determine the appropriate investments to make for protecting their... | |
2011-09-16 | Workshop 2011 – Emergent Behavior Track | Other References for Emergent Behavior Track | Antonio Sanfilippo | Luanne Burns | <This is a list of other books and referencesof read-ahead materials for the Emergent Behavior track sessions. | |
2011-09-16 | Workshop 2011 – Emergent Behavior Track | Gaming security by obscurity | Dusko Pavlovic | Luanne Burns | The present paper explores some ways to refine the current models of the attacker, and of the defender, by taking into... | |
2011-09-16 | Workshop 2011 – Emergent Behavior Track | Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy | Gerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver | Luanne Burns | a crucial ingredient tomanyweb sites and services today. However, many users who provide content do not realize that their uploads may... | |
2011-09-16 | Workshop 2011 – Emergent Behavior Track | Public Security: simulations need to replace conventional wisdom | Kay Hamacher, Stefan Katzenbeisser | Luanne Burns | Is more always better? Is conventional wisdom always the right guideline in the development of security policies that have large opportunity... | |
2011-09-01 | Workshop 2011 | Self-Organizing Resilient Network Sensing (SornS) with Very Large Scale Anomaly Detection | Rick Dove | Rick Dove | Abstract—Anomaly detection promises to find elements of abnormality in a field of data. Computational barriers constrain anomaly detection to sparse subsets... | |
2011-08-06 | Workshop 2011 | The Prediction of Abnormal and Malicious Behavior: Automated Behavior Analysis (ABA) | Gary M. Jackson | Luanne Burns | ABA as a set of methodologies consists of specific tools for constructing predictive models that may be embedded in specific adversarial... | |
2011-07-16 | Workshop 2011 | Department of Defense Strategy for Operating in Cyberspace | Luanne Burns | <At July 15, 2011 SCORE meeting, Jack, the DoD Representative, mentioned that the DoD just released an unclassified version of the... | ||
2011-07-16 | Workshop 2011 | Pentagon Strategy Prepares For War In Cyberspace | Luanne Burns | <NPR report July 15, 2011 | ||
2011-07-14 | Workshop 2011 | Cyberspace Defense Technician | Todd M. Boudreau | Luanne Burns | The current methods are completely inadequate for a variety of reasons. First, we cannot afford to allow adversarial activity to occur... | |
2011-07-14 | Workshop 2011 | Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor | Ondrej Linda, Milos Manic, Todd Vollmer, Jason Wright | Luanne Burns | This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented... | |
2011-07-14 | Workshop 2011 | Evolutionary Approach for Network Anomaly Detection Using Effective Classification | Chandrasekar,Vasudevan,Yogesh | Luanne Burns | This work discusses about the ways of implementing Evolutionary Approach for Network based Anomaly Detection Systems using Effective Classification. It involves... | |
2011-07-14 | Workshop 2011 | Cyber Profiling for Insider Threat Detection | Walter Udoeyop, University of Tennessee Research and Creative Exchange | Luanne Burns | Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses.... | |
2011-07-14 | Workshop 2011 | Automatic Construction of Anomaly Detectors from Graphical Models | M. Ferragut, David M. Darmon, Craig A. Shue, and Stephen Kelley | Luanne Burns | Detection of rare or previously unseen attacks in cyber security presents a central challenge: how does one search for a sufficiently... | |
2011-07-14 | Workshop 2011 | Cyber Infrastructure Protection | Tarek Saadawi and Louis Jordan | Luanne Burns | The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and... | |
2011-07-14 | Workshop 2011 | Doing intrusion detection using embedded sensors proposal | Zamboni | Luanne Burns | Intrusion detection systems have usually been developed using large host-based components. These components impose an extra load on the system where... | |
2011-07-14 | Workshop 2011 | Intrusion detection systems have usually been developed using large host-based components. | Schales, Christodorescu,Stoecklin, Rao,Venema, Sailer | Luanne Burns | In this paper, IBM presents a highly-scalable, run-time extensible, and dynamic cybersecurity analytics platform. It is specifically designed and implemented to... | |
2011-07-14 | Workshop 2011 | Holistic Network Defense: Fusing Host and Network Features for Attack Clarification | Jenny W. Ji | Luanne Burns | Defending the cyberspace domain has taken a higher priority as the internet has become an enabler and integrated component of the... | |
2011-07-14 | Workshop 2011 | Trust Management and Security in Satellite Telecommand Processing | Mark C. Duncan | Luanne Burns | New standards and initiatives in satellite system architecture are moving the space industry to more open and efficient mission operations. Primarily,... | |
2011-07-14 | Workshop 2011 | Spear Phishing Attack Detection | David T. Merritt | Luanne Burns | This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of... | |
2011-07-14 | Workshop 2011 | Mission Cyber Security Situation Management | Gabriel Jakobson | Luanne Burns | Interesting Powerpoint that looks at cyber attack detection more scientifically (scroll down to the cyber security section p. 43) | |
2011-07-14 | Workshop 2011 | Network profiling for high assurance survivability | Mike Burmester | Luanne Burns | with the Center for Security and Assurance in IT, Florida State University | |
2011-07-14 | Workshop 2011 | NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior | Taylor, Stephen Brooks and John McHugh | Luanne Burns | NetBytes Host Viewer is an interactive visualization tool designed to show the historical network flow data per port of an individual... | |
2011-07-14 | Workshop 2011 | Intrusion Detection Systems & Multisensor Data Fusion Creating Cyberspace Situational Awareness | Tim Bass | Luanne Burns | Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awarenes | |
2011-07-14 | Workshop 2011 | Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security | Stephen G. Batsell, Nageswara S. Rao, Mallikarjun Shankar | Luanne Burns | The sheer number and sophistication of cyber attacks are making our nation’s critical computer networks increasingly vulnerable. At the same time,... | |
2011-07-14 | Workshop 2011 | A Comprehensive Survey of Data Mining-based Fraud Detection Research | Luanne Burns | This survey paper categorizes, compares, and summarizes from almost all published technical and review articles in automated fraud detection within the... | ||
2011-07-14 | Workshop 2011 | The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature | Ngai, Hu, Wong, Chen, Sun | Luanne Burns | This paper thus represents the first systematic, identifiable and comprehensive academic literature review of the data mining techniques that have been... | |
2011-07-14 | Workshop 2011 | Transaction Mining for Fraud Detection in ERP Systems | Khan, Roheena Q. and Corney, Malcolm W. and Clark, Andrew J. and Mohay, George M. | Luanne Burns | In this paper, a role mining inspired approach is presented to represent user behavior in Enterprise Resource Planning (ERP) systems, primarily... | |
2011-07-14 | Workshop 2011 | Outlier Detection Techniques for Wireless Sensor Networks: A Survey | Yang Zhang, Nirvana Meratnia, and Paul Havinga | Luanne Burns | In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered... | |
2011-07-14 | Workshop 2011 | The Emerging Frontiers of Risk Management | Luanne Burns | This paper goes into detail about modern norms and expectations regarding fraud and detection methods. It then assesses how to manage... | ||
2011-07-14 | Workshop 2011 | Stopping Fraud Where it Starts The Value of Analytics in the Onboarding Process | Luanne Burns | Difficult economic conditions appear to have reversed the trend of decreasing fraud incidence. According to Javelin’s 2009 Identity Fraud Survey Report,... | ||
2011-07-14 | Workshop 2011 | RAC Game Changer: Predictive Modeling | Luanne Burns | Similar in nature to technology already being used by credit card companies to detect fraud, predictive modeling is expected to identify... | ||
2011-07-14 | Workshop 2011 | Fraud Detection Methods | Luanne Burns | Online electronic fraud has become increasingly problematic to many companies offering services on the web. This blogger is trying to generalize... | ||
2011-07-14 | Workshop 2011 | Businesses must use multi-layer authentication | Luanne Burns | Most single-layer authentication methods are broken and more are being broken all the time, says Gartner analyst Avivah Litan. | ||
2011-07-14 | Workshop 2011 | DOE Lab Shuts Down Email, Weak Access after Sophisticated Cyber-Attack | Luanne Burns | Cyber-attackers hit another Department of Energy research laboratory last week, forcing IT managers to shut down all of the facility’s computer... | ||
2011-07-14 | Workshop 2011 | New cyberattacks target small businesses | Luanne Burns | Since early June, one gang has been using a uniquely insidious type of automated attack to inject malicious code on some... | ||
2011-07-14 | Workshop 2011 | Cyber-criminals Increasingly Launch Spear Phishing Assaults: Cisco | Luanne Burns | Cisco recently released a report entitled "E-mail Attacks: This Time It's Personal," which finds that there's been a threefold increase in... | ||
2011-07-14 | Workshop 2011 | Citi: Millions stolen in May hack attack | Luanne Burns | Citigroup acknowledged that a hack attack last month stole millions of dollars from customers' credit card accounts. Citigroup told CNN that... | ||
2011-07-14 | Workshop 2011 | Brazil suffers its biggest cyber attack-yet | Luanne Burns | The service interruption of government websites and the disclosure of the supposedly personal data of top-ranking politicians claimed by hacking collective... | ||
2011-07-14 | Workshop 2011 | Not all Hack for the Heck of it | Luanne Burns | Interesting article about the future of cyber-attacks, specifically hacking as a paying job. What is grating the American authorities and security... | ||
2011-07-14 | Workshop 2011 | Darpa Gets Big Bucks for ‘Cyber Tech’ (Whatever That Means) | Luanne Burns | News on developments in anomalous behavior detection methods: In May, it was revealed in fiscal reports regarding the 2012 defense budget... | ||
2010-08-18 | Workshop 2010 | Data Analysis Challenges | D. Meiron et al. | Luanne Burns | JASON was asked to recommend ways in which the DOD/IC can handle present and future sensor data in fundamentally different ways | |
2010-08-18 | Workshop 2010 | On the Efficacy of Data Mining for Security Applications | Ted E .Senator | Luanne Burns | Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several... | |
2010-08-18 | Workshop 2010 | A Combinatorial Analysis of Link Discovery | John Cheng, Ted Senator | Luanne Burns | Link discovery and analysis, or connecting the dots, is a key component of intelligence analysis. Little principled analysis of this process... | |
2010-08-13 | Workshop 2010 | Detecting Fraud in the Real World | Cahill, Lambert, Pinheiro, Sun | John Gerth | One in a series of papers from Bell Labs about the development of their phone fraud detection system. It is a... | |
2010-08-13 | Workshop 2010 | Reducing Transaction Databases, Without Lagging Behind or Losing Information | Chen, Lambert, Pinheiro, Sun | John Gerth | A companion to "Detecting Fraud in the Real World", this Bell Labs paper details how individualized multi-dimensional signatures can be adaptively... | |
2010-08-12 | Workshop 2010 | Modeling Human Reasoning About Meta-Information | Guarino, Pfautz, Cox & Roth | Sean Guarino | An essential aspect of developing models of cyberspace behaviors - particularly online human behavior - is capturing the essential qualifiers, or... | |
2010-08-12 | Workshop 2010 | Verizon 2010 DBIR | Verizon + US Secret Service | John Gerth | This annual report provides a wealth of statistics about the overall nature of breaches. A highlight of this year's report was... | |
2010–09–12 | Workshop 2010 | Cybersecurity and National Policy | Dan Geer | John Gerth | Has cogent definitions of the policy issues and problems. | |
2010-08-12 | Workshop 2010 | IMPOSING COSTS ON CYBER ATTACKERS |
Stephen J. Lukasik | Luanne Burns | This is the third in a series of short papers dealing with cyber attacks and cyber attackers. The first “mapped the... | |
2010-08-11 | Workshop 2010 | A FRAMEWORK FOR THINKING ABOUT CYBER CONFLICT AND CYBER DETERRENCE, WITH POSSIBLE DECLARATORY POLICIES FOR THESE DOMAINS | Stephen J. Lukasik | Luanne Burns | Deterring Cyber Attacks, The Role of Declaratory Policy in Cyber Defense | |
2010-08-11 | Workshop 2010 | PROTECTING USERS OF THE CYBER COMMONS | Stephen J. Lukasik | Luanne Burns | Progress in protecting users of the cyber commons, popularly called "cyberspace," has been slow since network services became a consumer offering... | |
2010-08-04 | Workshop 2010 | International and Domestic Defense Against Cyber Attacks | Steve Lukasik, Ph.D. | Luanne Burns | Critical infrastructure systems provide attractive targets to agents intent on causing substantial damage to the U.S. economy. Infrastructure systems have features... | |
2010-07-15 | Workshop 2010 | A Framework for Analyst Focus from Computed Significance | David Skillicorn | David Skillicorn | This is a high-level think piece of how algorithmic approaches can make analysts' lives easier by helping to generate hypotheses and... | |
2010-07-07 | Workshop 2010 | Cyber Shockwave | Luanne Burns | On February 16, 2010, a bipartisan group of former senior administration and national security officials participated in a simulated cyber attack... | ||
2010-06-30 | Workshop 2010 | The Comprehensive National Cybersecurity Initiative | National Security Council | Luanne Burns | President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation,... | |
2010-06-24 | Workshop 2010 | The Hacker's Profiling Project | Raoul Chiesa, Stefania Ducci and Silvio Ciappi | Luanne Burns | The HPP project has the following main objectives: Analyze the hacking phenomenon-technological, social and economic-in all its aspects, using both a... | |
2010-06-24 | Workshop 2010 | Modelling Cyber Security: Approaches, Methodology, Strategies | Edited by: U. Gori | Luanne Burns | Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008,... | |
2010-06-24 | Workshop 2010 | CYBER WARFARE AND THE CRIME OF AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY ON TOMORROW'S BATTLEFIELD | JONATHAN A. OPHARDT1 | Luanne Burns | As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow... | |
2010-06-24 | Workshop 2010 | SHADOWS IN THE CLOUD: |
JOINT REPORT:Information Warfare Monitor | Luanne Burns | Crime and espionage form a dark underworld of cyberspace. Whereas crime is usually the first to seek out new opportunities and... | |
2009–09–30 | Network Analytics | Edge Density | Marcus Perry and others | Marty | Clever and fast. | |
2009–09–30 | Network Analytics | Change Point Estimation | Perry and others | Marty | Helps to find when/where things happened. | |
2009–08–24 | Deception | Computing Under Occupation | K. Kursawe and S. Katzenbeisser | Steven Borbash | Directly relates to a theme of this workshop | |
2009–08–04 | Behaviors | NY Times article about "behavior" | Natalie Angier | George Cybenko | What do people mean by "behavior"....this is an example from biology | |
2009-08-03 | Cyber Threat | 2009 Cyber Threats and Trends | Richard Howard | This document presents cyber security threats for 2009 and predicts cyber security disruptors that may emerge in 10 to 15 years. | ||
2009-07-31 | Cyber Threat | Microsoft Security Intelligence Report | Microsoft Malware Protection Center | Steven Lipner | Recent summary of the prevalance of cyber attacks and vulnerabilities worldwide. | |
2009–07–28 | Cyber Security Strategy and Policy | Castle Warrior: redefining 21st century network defense | Monty McDougal | David Skillicorn | This seems like a helpful way to think about some of the issues (a keynote at the Intelligence and Security Informatics... | |
2009–07–23 | Intelligent Systems | Intelligent Multi–Agent Information Security System | N. Kussul , A. Shelestov , A. Sidorenko , S. Skakun , Y. Veremeenko | Luanne Burns | The system includes different types of intelligent agents. The most important one is user agent based on neural network model of... | |
2009–07–23 | Agile Systems | Agile Monitoring for Cyber Defense | Doyle, Kohane, Long, Shrobe, Szolovits | Luanne Burns | Monitoring, Analysis, and Interpretation Tool | |
2009–07–23 | Agile Systems | Agile Monitoring for Cyber Defense | Doyle, Kohane, Long, Shrobe, Szolovits | Luanne Burns | Monitoring, Analysis, and Interpretation Tool | |
2009–07–23 | Game Theory | Challenges in Applying Game Theory to the Domain of Information Warfare? | Hamilton, Miller, Ott, Saydjari | Luanne Burns | There are significant advantages to utilizing game theory in the domain of information warfare. The algorithms sculpted to create programs capable... | |
2009–07–23 | Dasgupta | Immuno-Inspired Autonomic System for Cyber Defense | Dipankar Dasgupta | Dipankar Dasgupta | This presentation contrasts the theoretical and experimental approaches to cybersecurity research. With the emphasis on 'data intensive computing' and 'anomaly detection'... | |
2009–07–23 | Intelligent Systems | Intelligent Multi–Agent Information Security System | N. Kussul , A. Shelestov , A. Sidorenko , S. Skakun , Y. Veremeenko | Luanne Burns | The system includes different types of intelligent agents. The most important one is user agent based on neural network model of... | |
2009–07–23 | Intrusion Detection | Traffic and Attack Pattern Analysis for Multiagent Distributed Intrusion Detection System | Grzegorz Kołaczek Krzysztof Juszczyszyn | Luanne Burns | The role of traffic anomalies detection is discussed, then it has been clarified how some specific values characterizing network communication can... | |
2009–07–13 | Network Analytics | A Bibliography on Network Analytics | Salvatore J Stolfo | Salvatore Stolfo | A bibliography of recent papers cast in the "CV5 famework" : Audit and analysis of network traffic (or host events) and... | |
2011–09–23 | Masquerader/Insider Attack | Masquerade Attack Detection Using a Search–Behavior | Malek Ben Salem and Salvatore J. Stolfo | Salvatore J. Stolfo | Masquerade attacks are unfortunately a familiar security problem that is a consquence of identity theft. Detecting masqueraders is very hard. Prior... | |
2009–07–23 | Deception | Baiting Inside Attackers Using Decoy | N. Kussul, A. Shelestov, A. Sidorenko, V. Pasechnik, S. Skakun, Y. Veremeyenko, N. Levchenko | Luanne Burns | It is proposed an agent approach for creation of intelligent intrusion detection system. The system allows detecting known type of attacks... | |
2009–07–09 | Cybersecurity Strategy and Policy | Cyberspace Policy Review | Sean Fahey | The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties... | ||
2009–07–09 | Cybersecurity Strategy and Policy | National Cyberspace Strategy (2003) | Sean Fahey | The National Strategy to Secure Cyberspace is a call for national awareness and action by individuals and institutions throughout the United... | ||
2009–07–09 | Cybersecurity Strategy and Policy | Sean Fahey | Some recent laws do provide regulatory incentives for corporate management to address cybersecurity issues. Potential models for additional action include... | |||
2009-07-09 | Cyber Threat | Terrorist Capability for Cyberattack (2007) | Sean Fahey | This report examines possible terrorists? objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of... | ||
2009-07-09 | Cyber Threat | Symantec Global Internet Security Threat Report (2008) | Sean Fahey | The Symantec Global Internet Security Threat Report provides a six-month update of worldwide Internet threat activity. It includes analysis of network-based... | ||
2009–07–09 | Cybersecurity Strategy and Policy | CSIS Securing Cybersecurity for the 44th President | Sean Fahey | The aim of the report is to identify recommendations that the next administration can implement quickly to make a noticeable improvement... | ||
2009-07-09 | Cyber Threat | GAO - Cybercrime (2008) | Sean Fahey | GAO?s objectives were to (1) determine the impact of cybercrime on our nation?s economy and security; (2) describe key federal entities,... | ||
2009–07–09 | Cybenko | The Theory of Trackability with Applications to Sensor Networks | Crespi, Cybenko, Jiang | George Cybenko | Develops concepts for what kinds of processes are trackable and which are not, such as in cyberattacks. | |
2009–07–09 | Cybenko | Process Query Systems | George Cybenko and Vincent H. Berk | George Cybenko | Algorithms for disambiguating sensor reports and assigning them to different processes, a problem that arises in large–scale cyber monitoring. | |
2009–07–09 | Cybenko | Cybersecurity Strategies: The QuERIES Methodology | George Cybenko | Novel cyber risk assessment methodology using information markets | ||
2009–07–09 | Cybenko | A Language of Life: Characterizing People using Cell Phone Tracks | Alexy Khrabrov and George Cybenko | George Cybenko | Computational approach for fingerprinting behaviors that can be used to uniquely characterize individuals or attack signatures | |
2009–07–09 | Dasgupta | Password Security Through Negative Authentication | Dipankar Dasgupta and Sudip Saha | Dipankar Dasgupta | Authentication systems generally adopt the approach of checking an authentication request in a list of stored profiles of identification and verification... | |
2009–07–09 | Dasgupta | Characterizing Comment Spam in the Blogosphere Through Content Analysis | Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta | Dipankar Dasgupta | Spams are no longer limited to emails and webpages. The increasing penetration of spam in the form of comments in blogs.... | |
2009-07-06 | Cyber Threat | Mission Oriented Risk and Design Analysis of Critical Information Systems | Donald L. Buckshaw, et al. | William Streilein | This paper summarizes some interesting and useful work in risk analysis of cyber systems. It provides a methodology for assessing risk... | |
2009–06–25 | Cybersecurity Strategy and Policy | Sami Saydjari on Cyberspace Operations | Sami Saydjari | Luanne Burns | ViodiTV coverage of 2009 Cyberspace Symposium sponsored by HEM Productions. Sami Saydjari, President, Cyber Defense Agency talks of critical infrastructures. | |
2009-06-21 | Workshop description | Workshop 1-pager | Curt B | The basic outline of the conference and description of the workshop |