Self-Organizing Resilient Network Sensing (SornS) with Very Large Scale Anomaly Detection Read more about Self-Organizing Resilient Network Sensing (SornS) with Very Large Scale Anomaly Detection
Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy Read more about Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy
Other References for Emergent Behavior Track Read more about Other References for Emergent Behavior Track
Outlier Detection Techniques for Wireless Sensor Networks: A Survey Read more about Outlier Detection Techniques for Wireless Sensor Networks: A Survey
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Read more about Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
Public Security: simulations need to replace conventional wisdom Read more about Public Security: simulations need to replace conventional wisdom
Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology Read more about Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior Read more about NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior
Network profiling for high assurance survivability Read more about Network profiling for high assurance survivability