Title Date
CyberSTEM Camp 2017
Intermediate CyberSTEM Camp (2017)
Final Report
Trust Management and Security in Satellite Telecommand Processing
A Bibliography on Network Analytics
A Language of Life: Characterizing People using Cell Phone Tracks
Agile Monitoring for Cyber Defense
Baiting Inside Attackers Using Decoy Documents
C3E 2009 Workshop Overview
castle_warrior-_redefining_21st_century_network_defense.pdf
Challenges in Applying Game Theory to the Domain of Information Warfare
Characterizing Comment Spam in the Blogosphere through Content Analysis
Computing Under Occupation
Creating a National Framework for Cybersecurity: An Analysis of Issues and Options
Securing Cyberspace for the 44th Presidency
Cybersecurity Strategies: The QuERIES Methodology
GAO - Cybercrime
Identifying the Time of Step Change in the Mean of Autocorrelated Processes
Immuno-Inspired Autonomic System for Cyber Defense
Inference on Edge Density in Undirected Binary Networks
Intelligent Multi-Agent Information Security System
Masquerade Attack Detection Using a Search-Behavior Modeling Approach
Mission Oriented Risk and Design Analysis of Critical Information Systems
MULTI-AGENT SECURITY SYSTEM BASED ON NEURAL NETWORK MODEL OF USER'S BEHAVIOR
The National Strategy To Secure Cyberspace