Title Date
Intrusion Detection Systems & Multisensor Data Fusion Creating Cyberspace Situational Awareness
Intrusion detection systems have usually been developed using large host-based components
Leveraging Complexity in Software for Cybersecurity
Mission Cyber Security Situation Management
NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior
HoTSoS_Booklet.pdf
Network profiling for high assurance survivability
Other References for Emergent Behavior Track
Outlier Detection Techniques for Wireless Sensor Networks: A Survey
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
Public Security: simulations need to replace conventional wisdom
Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology
Self-organization in social insects
Self-Organizing Resilient Network Sensing (SornS) with Very Large Scale Anomaly Detection
Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy
Spear Phishing Attack Detection
Stopping Fraud Where it Starts The Value of Analytics in the Onboarding Process
The application of data mining techniques in financial fraud detection: A classification framework and an academic review of lit
The Calculi of Emergence: Computation, Dynamics, and Induction
The Prediction of Abnormal and Malicious Behavior: Automated Behavior Analysis (ABA)
The Promise and Peril of Big Data
Transaction Mining for Fraud Detection in ERP Systems
Understanding High-Dimensional Spaces
What is Data Science?
UMD Cyber Defense Training Camp (2017)