C3E Bibliography - All Documents

Topic Areas

Create a New Topic

C3E Bibliography – All Documents
Date Topic Name Document Title Author Modified By Comments

(hover over for full text)
2011-09-25 Workshop 2011 – Emergent Behavior Track Complexity Science Challenges in Cybersecurity Robert C. Armstrong, Jackson R. Mayo, Frank Siebenlist  Luanne Burns Computers and the Internet are indispensable to our modern society, but by the standards of critical infrastructure, they are notably unreliable....
2011-09-25 Workshop 2011 – Emergent Behavior Track Leveraging Complexity in Software for Cybersecurity Robert C. Armstrong, Jackson R. Mayo  Luanne Burns A method for assessing statistically quantifiable improvements in security for software vulnerabilities is presented. Drawing on concepts in complexity theory, undecidability,...
2011-09-25 Workshop 2011 – Emergent Behavior Track Self-organization in social insects Eric Bonabeau, Guy Theraulaz, Jean-Louis Deneubourg, Serge Aron and Scott Camazine  Luanne Burns Self-organization was introduced originally in the context of physics and chemistry to describe how microscopic processes give rise to macroscopic structures...
2011-09-25 Workshop 2011 – Emergent Behavior Track Swarm Intelligence Blum, Christian; Merkle, Daniel (Eds.)  Luanne Burns The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While...
2011-09-24 Network Analytics Discovering Emergent Behavior From Network Packet Data: Lessons from the Angle Project Robert L Grossman, Michal Sabala, Yunhong Gu, Anushka Anand, Matt Handley, Rajmonda Sulo and Lee Wilkinson Robert Grossman The paper describes a practical method to discover a certain class of emergent behavior in distributed network data. The paper is...
2011–09–23 Data Driven Experimental Science The Role of Experimental Science in Cybersecurity Ed Giorgio Ed Giorgio This presentation contrasts the theoretical and experimental approaches to cybersecurity research. With the emphasis on "data intensive computing" and "anomaly detection"...
2011-09-22 Workshop 2011 – Emergent Behavior Track The Promise and Peril of Big Data David Bollier  Luanne Goldrich According to a recent report1, the amount of digital content on the Internet is now close to five hundred billion gigabytes....
2011-09-22 Workshop 2011 What is Data Science? Mike Loukides  Luanne Burns The Web is full of “data-driven apps.” Almost any e-commerce application is a data-driven application. There’s a database behind a web...
2011-09-22 Workshop 2011 Ant-Based Cyber Security Jereme N. Haack, Glenn A. Fink, Wendy M. Maiden, A. David McKinnon, Steven J. Templeton  Luanne Burns We describe a swarming-agent-based, mixedinitiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem...
2011-09-22 Workshop 2011 Big Data, Analytics and the Path From Insights to Value Steve LaValle, Eric Lesser, Rebecca Shockely, Michael S. Hopkins, and Nina Kruschwitz  Luanne Burns How the smartest organizations are embedding analytics to transform information into insight and then action. Findings and recommendations from the first...
2011-09-22 Workshop 2011 Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society Randal E. Bryant, Rnady H. Katz, Edward D. Lazowska  Luanne Burns Advances in digital sensors, communications, computation, and storage have created huge collections of data, capturing information of value to business, science,...
2011-09-22 Workshop 2011 Understanding High–Dimensional Spaces David Skillcorn  Luanne Burns High-dimensional spaces arise naturally as a way of modelling datasets with many attributes. Such a dataset can be directly represented in...
2011-09-20 Workshop 2011 & Intrusion Detection Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer and Vern Paxson  John Gerth This is a thoughtful analysis of why, despite extensive research, one rarely finds network intrusion detection systems based on machine-learning deployed...
2011-09-16 Workshop 2011 Cyber Intelligence...setting the landscape for an emerging discipline INSA  Luanne Burns Evolving information systems technology has turned the cyber arena into a multi-dimensional attack space that extends the conventional landscape to a...
2011-09-16 Workshop 2011 – Emergent Behavior Track The Calculi of Emergence: Computation, Dynamics, and Induction James P. Crutchfield  Luanne Burns Defining structure and detecting the emergence of complexity in nature are inherently subjective, though essential, scientific activities. Despite the difficulties, these...
2011-09-16 Workshop 2011 – Emergent Behavior Track Directions in Security Metrics Research Wayne Jansen  Luanne Burns More than 100 years ago, Lord Kelvin insightfully observed that measurement is vital to deep knowledge and understanding in physical science....
2011-09-16 Workshop 2011 – Emergent Behavior Track Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology LAWRENCE CARIN, GEORGE CYBENKO, JEFF HUGHES  Luanne Burns Organizations in both the private and public sectors have been struggling to determine the appropriate investments to make for protecting their...
2011-09-16 Workshop 2011 – Emergent Behavior Track Other References for Emergent Behavior Track Antonio Sanfilippo  Luanne Burns <This is a list of other books and referencesof read-ahead materials for the Emergent Behavior track sessions.
2011-09-16 Workshop 2011 – Emergent Behavior Track Gaming security by obscurity Dusko Pavlovic  Luanne Burns The present paper explores some ways to refine the current models of the attacker, and of the defender, by taking into...
2011-09-16 Workshop 2011 – Emergent Behavior Track Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy Gerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver  Luanne Burns a crucial ingredient tomanyweb sites and services today. However, many users who provide content do not realize that their uploads may...
2011-09-16 Workshop 2011 – Emergent Behavior Track Public Security: simulations need to replace conventional wisdom Kay Hamacher, Stefan Katzenbeisser  Luanne Burns Is more always better? Is conventional wisdom always the right guideline in the development of security policies that have large opportunity...
2011-09-01 Workshop 2011 Self-Organizing Resilient Network Sensing (SornS) with Very Large Scale Anomaly Detection Rick Dove  Rick Dove Abstract—Anomaly detection promises to find elements of abnormality in a field of data. Computational barriers constrain anomaly detection to sparse subsets...
2011-08-06 Workshop 2011 The Prediction of Abnormal and Malicious Behavior: Automated Behavior Analysis (ABA) Gary M. Jackson  Luanne Burns ABA as a set of methodologies consists of specific tools for constructing predictive models that may be embedded in specific adversarial...
2011-07-16 Workshop 2011 Department of Defense Strategy for Operating in Cyberspace   Luanne Burns <At July 15, 2011 SCORE meeting, Jack, the DoD Representative, mentioned that the DoD just released an unclassified version of the...
2011-07-16 Workshop 2011 Pentagon Strategy Prepares For War In Cyberspace   Luanne Burns <NPR report July 15, 2011
2011-07-14 Workshop 2011 Cyberspace Defense Technician Todd M. Boudreau  Luanne Burns The current methods are completely inadequate for a variety of reasons. First, we cannot afford to allow adversarial activity to occur...
2011-07-14 Workshop 2011 Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor Ondrej Linda, Milos Manic, Todd Vollmer, Jason Wright  Luanne Burns This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented...
2011-07-14 Workshop 2011 Evolutionary Approach for Network Anomaly Detection Using Effective Classification Chandrasekar,Vasudevan,Yogesh  Luanne Burns This work discusses about the ways of implementing Evolutionary Approach for Network based Anomaly Detection Systems using Effective Classification. It involves...
2011-07-14 Workshop 2011 Cyber Profiling for Insider Threat Detection Walter Udoeyop, University of Tennessee Research and Creative Exchange  Luanne Burns Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses....
2011-07-14 Workshop 2011 Automatic Construction of Anomaly Detectors from Graphical Models M. Ferragut, David M. Darmon, Craig A. Shue, and Stephen Kelley  Luanne Burns Detection of rare or previously unseen attacks in cyber security presents a central challenge: how does one search for a sufficiently...
2011-07-14 Workshop 2011 Cyber Infrastructure Protection Tarek Saadawi and Louis Jordan  Luanne Burns The Internet, as well as other telecommunication networks and information systems, have become an integrated part of our daily lives, and...
2011-07-14 Workshop 2011 Doing intrusion detection using embedded sensors proposal Zamboni  Luanne Burns Intrusion detection systems have usually been developed using large host-based components. These components impose an extra load on the system where...
2011-07-14 Workshop 2011 Intrusion detection systems have usually been developed using large host-based components. Schales, Christodorescu,Stoecklin, Rao,Venema, Sailer  Luanne Burns In this paper, IBM presents a highly-scalable, run-time extensible, and dynamic cybersecurity analytics platform. It is specifically designed and implemented to...
2011-07-14 Workshop 2011 Holistic Network Defense: Fusing Host and Network Features for Attack Clarification Jenny W. Ji  Luanne Burns Defending the cyberspace domain has taken a higher priority as the internet has become an enabler and integrated component of the...
2011-07-14 Workshop 2011 Trust Management and Security in Satellite Telecommand Processing Mark C. Duncan  Luanne Burns New standards and initiatives in satellite system architecture are moving the space industry to more open and efficient mission operations. Primarily,...
2011-07-14 Workshop 2011 Spear Phishing Attack Detection David T. Merritt  Luanne Burns This thesis addresses the problem of identifying email spear phishing attacks, which are indicative of cyber espionage. Spear phishing consists of...
2011-07-14 Workshop 2011 Mission Cyber Security Situation Management Gabriel Jakobson  Luanne Burns Interesting Powerpoint that looks at cyber attack detection more scientifically (scroll down to the cyber security section p. 43)
2011-07-14 Workshop 2011 Network profiling for high assurance survivability Mike Burmester  Luanne Burns with the Center for Security and Assurance in IT, Florida State University
2011-07-14 Workshop 2011 NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior Taylor, Stephen Brooks and John McHugh   Luanne Burns NetBytes Host Viewer is an interactive visualization tool designed to show the historical network flow data per port of an individual...
2011-07-14 Workshop 2011 Intrusion Detection Systems & Multisensor Data Fusion Creating Cyberspace Situational Awareness Tim Bass  Luanne Burns Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awarenes
2011-07-14 Workshop 2011 Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell, Nageswara S. Rao, Mallikarjun Shankar  Luanne Burns The sheer number and sophistication of cyber attacks are making our nation’s critical computer networks increasingly vulnerable. At the same time,...
2011-07-14 Workshop 2011 A Comprehensive Survey of Data Mining-based Fraud Detection Research   Luanne Burns This survey paper categorizes, compares, and summarizes from almost all published technical and review articles in automated fraud detection within the...
2011-07-14 Workshop 2011 The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature Ngai, Hu, Wong, Chen, Sun  Luanne Burns This paper thus represents the first systematic, identifiable and comprehensive academic literature review of the data mining techniques that have been...
2011-07-14 Workshop 2011 Transaction Mining for Fraud Detection in ERP Systems Khan, Roheena Q. and Corney, Malcolm W. and Clark, Andrew J. and Mohay, George M.  Luanne Burns In this paper, a role mining inspired approach is presented to represent user behavior in Enterprise Resource Planning (ERP) systems, primarily...
2011-07-14 Workshop 2011 Outlier Detection Techniques for Wireless Sensor Networks: A Survey Yang Zhang, Nirvana Meratnia, and Paul Havinga  Luanne Burns In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered...
2011-07-14 Workshop 2011 The Emerging Frontiers of Risk Management   Luanne Burns This paper goes into detail about modern norms and expectations regarding fraud and detection methods. It then assesses how to manage...
2011-07-14 Workshop 2011 Stopping Fraud Where it Starts The Value of Analytics in the Onboarding Process   Luanne Burns Difficult economic conditions appear to have reversed the trend of decreasing fraud incidence. According to Javelin’s 2009 Identity Fraud Survey Report,...
2011-07-14 Workshop 2011 RAC Game Changer: Predictive Modeling   Luanne Burns Similar in nature to technology already being used by credit card companies to detect fraud, predictive modeling is expected to identify...
2011-07-14 Workshop 2011 Fraud Detection Methods   Luanne Burns Online electronic fraud has become increasingly problematic to many companies offering services on the web. This blogger is trying to generalize...
2011-07-14 Workshop 2011 Businesses must use multi-layer authentication   Luanne Burns Most single-layer authentication methods are broken and more are being broken all the time, says Gartner analyst Avivah Litan.
2011-07-14 Workshop 2011 DOE Lab Shuts Down Email, Weak Access after Sophisticated Cyber-Attack   Luanne Burns Cyber-attackers hit another Department of Energy research laboratory last week, forcing IT managers to shut down all of the facility’s computer...
2011-07-14 Workshop 2011 New cyberattacks target small businesses   Luanne Burns Since early June, one gang has been using a uniquely insidious type of automated attack to inject malicious code on some...
2011-07-14 Workshop 2011 Cyber-criminals Increasingly Launch Spear Phishing Assaults: Cisco   Luanne Burns Cisco recently released a report entitled "E-mail Attacks: This Time It's Personal," which finds that there's been a threefold increase in...
2011-07-14 Workshop 2011 Citi: Millions stolen in May hack attack   Luanne Burns Citigroup acknowledged that a hack attack last month stole millions of dollars from customers' credit card accounts. Citigroup told CNN that...
2011-07-14 Workshop 2011 Brazil suffers its biggest cyber attack-yet   Luanne Burns The service interruption of government websites and the disclosure of the supposedly personal data of top-ranking politicians claimed by hacking collective...
2011-07-14 Workshop 2011 Not all Hack for the Heck of it   Luanne Burns Interesting article about the future of cyber-attacks, specifically hacking as a paying job. What is grating the American authorities and security...
2011-07-14 Workshop 2011 Darpa Gets Big Bucks for ‘Cyber Tech’ (Whatever That Means)   Luanne Burns News on developments in anomalous behavior detection methods: In May, it was revealed in fiscal reports regarding the 2012 defense budget...
2010-08-18 Workshop 2010 Data Analysis Challenges D. Meiron et al.  Luanne Burns JASON was asked to recommend ways in which the DOD/IC can handle present and future sensor data in fundamentally different ways
2010-08-18 Workshop 2010 On the Efficacy of Data Mining for Security Applications Ted E .Senator  Luanne Burns Data mining applications for security have been proposed, developed, used, and criticized frequently in the recent past. This paper examines several...
2010-08-18 Workshop 2010 A Combinatorial Analysis of Link Discovery John Cheng, Ted Senator  Luanne Burns Link discovery and analysis, or connecting the dots, is a key component of intelligence analysis. Little principled analysis of this process...
2010-08-13 Workshop 2010 Detecting Fraud in the Real World Cahill, Lambert, Pinheiro, Sun  John Gerth One in a series of papers from Bell Labs about the development of their phone fraud detection system. It is a...
2010-08-13 Workshop 2010 Reducing Transaction Databases, Without Lagging Behind or Losing Information Chen, Lambert, Pinheiro, Sun  John Gerth A companion to "Detecting Fraud in the Real World", this Bell Labs paper details how individualized multi-dimensional signatures can be adaptively...
2010-08-12 Workshop 2010 Modeling Human Reasoning About Meta-Information Guarino, Pfautz, Cox & Roth  Sean Guarino An essential aspect of developing models of cyberspace behaviors - particularly online human behavior - is capturing the essential qualifiers, or...
2010-08-12 Workshop 2010 Verizon 2010 DBIR Verizon + US Secret Service  John Gerth This annual report provides a wealth of statistics about the overall nature of breaches. A highlight of this year's report was...
2010–09–12 Workshop 2010 Cybersecurity and National Policy Dan Geer John Gerth Has cogent definitions of the policy issues and problems.
2010-08-12 Workshop 2010 IMPOSING COSTS ON CYBER ATTACKERS

 
Stephen J. Lukasik  Luanne Burns This is the third in a series of short papers dealing with cyber attacks and cyber attackers. The first “mapped the...
2010-08-11 Workshop 2010 A FRAMEWORK FOR THINKING ABOUT CYBER CONFLICT AND CYBER DETERRENCE, WITH POSSIBLE DECLARATORY POLICIES FOR THESE DOMAINS Stephen J. Lukasik  Luanne Burns Deterring Cyber Attacks, The Role of Declaratory Policy in Cyber Defense
2010-08-11 Workshop 2010 PROTECTING USERS OF THE CYBER COMMONS Stephen J. Lukasik  Luanne Burns Progress in protecting users of the cyber commons, popularly called "cyberspace," has been slow since network services became a consumer offering...
2010-08-04 Workshop 2010 International and Domestic Defense Against Cyber Attacks Steve Lukasik, Ph.D.  Luanne Burns Critical infrastructure systems provide attractive targets to agents intent on causing substantial damage to the U.S. economy. Infrastructure systems have features...
2010-07-15 Workshop 2010 A Framework for Analyst Focus from Computed Significance David Skillicorn  David Skillicorn This is a high-level think piece of how algorithmic approaches can make analysts' lives easier by helping to generate hypotheses and...
2010-07-07 Workshop 2010 Cyber Shockwave   Luanne Burns On February 16, 2010, a bipartisan group of former senior administration and national security officials participated in a simulated cyber attack...
2010-06-30 Workshop 2010 The Comprehensive National Cybersecurity Initiative National Security Council  Luanne Burns President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation,...
2010-06-24 Workshop 2010 The Hacker's Profiling Project Raoul Chiesa, Stefania Ducci and Silvio Ciappi  Luanne Burns The HPP project has the following main objectives: Analyze the hacking phenomenon-technological, social and economic-in all its aspects, using both a...
2010-06-24 Workshop 2010 Modelling Cyber Security: Approaches, Methodology, Strategies Edited by: U. Gori  Luanne Burns Cyberterrorism and cybercrime are on the rise. One new webpage was infected every 4.5 seconds by malicious email attachments in 2008,...
2010-06-24 Workshop 2010 CYBER WARFARE AND THE CRIME OF AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY ON TOMORROW'S BATTLEFIELD JONATHAN A. OPHARDT1  Luanne Burns As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow...
2010-06-24 Workshop 2010 SHADOWS IN THE CLOUD:

 
JOINT REPORT:Information Warfare Monitor  Luanne Burns Crime and espionage form a dark underworld of cyberspace. Whereas crime is usually the first to seek out new opportunities and...
2009–09–30 Network Analytics Edge Density Marcus Perry and others Marty Clever and fast.
2009–09–30 Network Analytics Change Point Estimation Perry and others Marty Helps to find when/where things happened.
2009–08–24 Deception Computing Under Occupation K. Kursawe and S. Katzenbeisser Steven Borbash Directly relates to a theme of this workshop
2009–08–04 Behaviors NY Times article about "behavior" Natalie Angier George Cybenko What do people mean by "behavior"....this is an example from biology
2009-08-03 Cyber Threat 2009 Cyber Threats and Trends   Richard Howard This document presents cyber security threats for 2009 and predicts cyber security disruptors that may emerge in 10 to 15 years.
2009-07-31 Cyber Threat Microsoft Security Intelligence Report Microsoft Malware Protection Center  Steven Lipner Recent summary of the prevalance of cyber attacks and vulnerabilities worldwide.
2009–07–28 Cyber Security Strategy and Policy Castle Warrior: redefining 21st century network defense Monty McDougal David Skillicorn This seems like a helpful way to think about some of the issues (a keynote at the Intelligence and Security Informatics...
2009–07–23 Intelligent Systems Intelligent Multi–Agent Information Security System N. Kussul , A. Shelestov , A. Sidorenko , S. Skakun , Y. Veremeenko Luanne Burns The system includes different types of intelligent agents. The most important one is user agent based on neural network model of...
2009–07–23 Agile Systems Agile Monitoring for Cyber Defense Doyle, Kohane, Long, Shrobe, Szolovits Luanne Burns Monitoring, Analysis, and Interpretation Tool
2009–07–23 Agile Systems Agile Monitoring for Cyber Defense Doyle, Kohane, Long, Shrobe, Szolovits Luanne Burns Monitoring, Analysis, and Interpretation Tool
2009–07–23 Game Theory Challenges in Applying Game Theory to the Domain of Information Warfare? Hamilton, Miller, Ott, Saydjari Luanne Burns There are significant advantages to utilizing game theory in the domain of information warfare. The algorithms sculpted to create programs capable...
2009–07–23 Dasgupta Immuno-Inspired Autonomic System for Cyber Defense Dipankar Dasgupta Dipankar Dasgupta This presentation contrasts the theoretical and experimental approaches to cybersecurity research. With the emphasis on 'data intensive computing' and 'anomaly detection'...
2009–07–23 Intelligent Systems Intelligent Multi–Agent Information Security System N. Kussul , A. Shelestov , A. Sidorenko , S. Skakun , Y. Veremeenko Luanne Burns The system includes different types of intelligent agents. The most important one is user agent based on neural network model of...
2009–07–23 Intrusion Detection Traffic and Attack Pattern Analysis for Multiagent Distributed Intrusion Detection System Grzegorz Kołaczek Krzysztof Juszczyszyn Luanne Burns The role of traffic anomalies detection is discussed, then it has been clarified how some specific values characterizing network communication can...
2009–07–13 Network Analytics A Bibliography on Network Analytics Salvatore J Stolfo Salvatore Stolfo A bibliography of recent papers cast in the "CV5 famework" : Audit and analysis of network traffic (or host events) and...
2011–09–23 Masquerader/Insider Attack Masquerade Attack Detection Using a Search–Behavior Malek Ben Salem and Salvatore J. Stolfo Salvatore J. Stolfo Masquerade attacks are unfortunately a familiar security problem that is a consquence of identity theft. Detecting masqueraders is very hard. Prior...
2009–07–23 Deception Baiting Inside Attackers Using Decoy N. Kussul, A. Shelestov, A. Sidorenko, V. Pasechnik, S. Skakun, Y. Veremeyenko, N. Levchenko Luanne Burns It is proposed an agent approach for creation of intelligent intrusion detection system. The system allows detecting known type of attacks...
2009–07–09 Cybersecurity Strategy and Policy Cyberspace Policy Review   Sean Fahey The review team of government cybersecurity experts engaged and received input from a broad cross-section of industry, academia, the civil liberties...
2009–07–09 Cybersecurity Strategy and Policy National Cyberspace Strategy (2003)   Sean Fahey The National Strategy to Secure Cyberspace is a call for national awareness and action by individuals and institutions throughout the United...
2009–07–09 Cybersecurity Strategy and Policy     Sean Fahey Some recent laws do provide regulatory incentives for corporate management to address cybersecurity issues. Potential models for additional action include...
2009-07-09 Cyber Threat Terrorist Capability for Cyberattack (2007)   Sean Fahey This report examines possible terrorists? objectives and computer vulnerabilities that might lead to an attempted cyberattack against the critical infrastructure of...
2009-07-09 Cyber Threat Symantec Global Internet Security Threat Report (2008)   Sean Fahey The Symantec Global Internet Security Threat Report provides a six-month update of worldwide Internet threat activity. It includes analysis of network-based...
2009–07–09 Cybersecurity Strategy and Policy CSIS Securing Cybersecurity for the 44th President   Sean Fahey The aim of the report is to identify recommendations that the next administration can implement quickly to make a noticeable improvement...
2009-07-09 Cyber Threat GAO - Cybercrime (2008)   Sean Fahey GAO?s objectives were to (1) determine the impact of cybercrime on our nation?s economy and security; (2) describe key federal entities,...
2009–07–09 Cybenko The Theory of Trackability with Applications to Sensor Networks Crespi, Cybenko, Jiang George Cybenko Develops concepts for what kinds of processes are trackable and which are not, such as in cyberattacks.
2009–07–09 Cybenko Process Query Systems George Cybenko and Vincent H. Berk George Cybenko Algorithms for disambiguating sensor reports and assigning them to different processes, a problem that arises in large–scale cyber monitoring.
2009–07–09 Cybenko Cybersecurity Strategies: The QuERIES Methodology   George Cybenko Novel cyber risk assessment methodology using information markets
2009–07–09 Cybenko A Language of Life: Characterizing People using Cell Phone Tracks Alexy Khrabrov and George Cybenko George Cybenko Computational approach for fingerprinting behaviors that can be used to uniquely characterize individuals or attack signatures
2009–07–09 Dasgupta Password Security Through Negative Authentication Dipankar Dasgupta and Sudip Saha Dipankar Dasgupta Authentication systems generally adopt the approach of checking an authentication request in a list of stored profiles of identification and verification...
2009–07–09 Dasgupta Characterizing Comment Spam in the Blogosphere Through Content Analysis Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta Dipankar Dasgupta Spams are no longer limited to emails and webpages. The increasing penetration of spam in the form of comments in blogs....
2009-07-06 Cyber Threat Mission Oriented Risk and Design Analysis of Critical Information Systems Donald L. Buckshaw, et al.  William Streilein This paper summarizes some interesting and useful work in risk analysis of cyber systems. It provides a methodology for assessing risk...
2009–06–25 Cybersecurity Strategy and Policy Sami Saydjari on Cyberspace Operations Sami Saydjari Luanne Burns ViodiTV coverage of 2009 Cyberspace Symposium sponsored by HEM Productions. Sami Saydjari, President, Cyber Defense Agency talks of critical infrastructures.
2009-06-21 Workshop description Workshop 1-pager   Curt B The basic outline of the conference and description of the workshop