Rockwell Photos |
|
Final Report: 2008 Berkeley SoS Workshop |
|
A Roadmap for Cybersecurity Research |
|
Modeling, Prediction and Diagnosis for Network Security |
|
2012 C3E Travel Guidelines |
|
Cyber Analtyics The Story Behind Cyber Data |
|
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model |
|
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection |
|
Reasoning about anomalies: a study of the analytical process of detecting and identifying anomalous behavior in maritime traffic |
|
Mixed-Initiative Security Agents |
|
Operationalizing C2 Agility |
|
MODELING CYBER ATTACKS AND THEIR EFFECTS ON DECISION PROCESS |
|
Cyber Analytics for US CERT |
|
Parametric Models for Anomaly Detection in Aggregate Traffic |
|
Practical Anomaly Detection based on Classifying Frequent Traffic Patterns |
|
When Big Data Matters |
|
Finding Data Needles in Gigabit Haystacks |
|
From Data to Knowledge to Discoveries |
|
Visualization of Complex Attacks and State of Attacked Network |
|