Intrusion Detection Systems & Multisensor Data Fusion Creating Cyberspace Situational Awareness |
|
Intrusion detection systems have usually been developed using large host-based components |
|
Leveraging Complexity in Software for Cybersecurity |
|
Mission Cyber Security Situation Management |
|
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior |
|
HoTSoS_Booklet.pdf |
|
Network profiling for high assurance survivability |
|
Other References for Emergent Behavior Track |
|
Outlier Detection Techniques for Wireless Sensor Networks: A Survey |
|
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection |
|
Public Security: simulations need to replace conventional wisdom |
|
Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology |
|
Self-organization in social insects |
|
Self-Organizing Resilient Network Sensing (SornS) with Very Large Scale Anomaly Detection |
|
Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy |
|
Spear Phishing Attack Detection |
|
Stopping Fraud Where it Starts The Value of Analytics in the Onboarding Process |
|
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of lit |
|
The Calculi of Emergence: Computation, Dynamics, and Induction |
|
The Prediction of Abnormal and Malicious Behavior: Automated Behavior Analysis (ABA) |
|
The Promise and Peril of Big Data |
|
Transaction Mining for Fraud Detection in ERP Systems |
|
Understanding High-Dimensional Spaces |
|
What is Data Science? |
|
UMD Cyber Defense Training Camp (2017) |
|