Title Date
CYBER WARFARE AND THE CRIME OF AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY ON TOMORROW’S BATTLEFIELD
Data Analysis Challenges
Detecting Fraud in the Real World
Imposing Costs On Cyber Attackers
Modeling Human Reasoning About Meta-Information
On the Efficacy of Data Mining for Security Applications
PROTECTING USERS OF THE CYBER COMMONS
Reducing Transaction Databases, Without Lagging Behind or Losing Information
Shadows in the Cloud
A Comprehensive Survey of Data Mining-based Fraud Detection Research
Ant-Based Cyber Security
Automatic Construction of Anomaly Detectors from Graphical Models
Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society
Big Data, Analytics and the Path From Insights to Value
Complexity Science Challenges in Cybersecurity
Cyber Infrastructure Protection
Cyber Intelligence...setting the landscape for an emerging discipline
Cyber Profiling for Insider Threat Detection
Cyberspace Defense Technician
Directions in Security Metrics Research
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security
Doing Intrusion Detection Using Embedded Sensors Proposal
Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor
Gaming Security by Obscurity
Holistic Network Defense: Fusing Host and Network Features for Attack Clarification