CYBER WARFARE AND THE CRIME OF AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY ON TOMORROW’S BATTLEFIELD |
|
Data Analysis Challenges |
|
Detecting Fraud in the Real World |
|
Imposing Costs On Cyber Attackers |
|
Modeling Human Reasoning About Meta-Information |
|
On the Efficacy of Data Mining for Security Applications |
|
PROTECTING USERS OF THE CYBER COMMONS |
|
Reducing Transaction Databases, Without Lagging Behind or Losing Information |
|
Shadows in the Cloud |
|
A Comprehensive Survey of Data Mining-based Fraud Detection Research |
|
Ant-Based Cyber Security |
|
Automatic Construction of Anomaly Detectors from Graphical Models |
|
Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society |
|
Big Data, Analytics and the Path From Insights to Value |
|
Complexity Science Challenges in Cybersecurity |
|
Cyber Infrastructure Protection |
|
Cyber Intelligence...setting the landscape for an emerging discipline |
|
Cyber Profiling for Insider Threat Detection |
|
Cyberspace Defense Technician |
|
Directions in Security Metrics Research |
|
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security |
|
Doing Intrusion Detection Using Embedded Sensors Proposal |
|
Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor |
|
Gaming Security by Obscurity |
|
Holistic Network Defense: Fusing Host and Network Features for Attack Clarification |
|