| C3E Keysight Discovery .pptx |
|
| c3e-2014-atlanta.pdf |
|
| Confidence In Analytics Final Presentation |
|
| Causal Entropic Forces _ Alex Wissner-Gross |
|
| Emerging Methods for Optimal Space-Time Cyber Analysis - Alex Wissner-Gross |
|
| Test Event |
|
| C3E 2013 Weekly Planning Meeting |
|
| C3E 2013 Fall Workshop - TEST Event 1.0 |
|
| 2013 Computational CyberSecurity In Compromised Environments (C3E) Workshop |
|
| 2013 Computational CyberSecurity In Compromised Environments (C3E) Workshop - Test 2.0 |
|
| 2013 Computational CyberSecurity In Compromised Environments (C3E) Workshop - Test 3.0 |
|
| January 2014 Computational CyberSecurity In Compromised Environments (C3E) Workshop |
|
| Challenge Problem Summary.pdf |
|
| Frontiers in Massive Data Analysis |
|
| The Fragility of Interdependency |
|
| Intelligence Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains |
|
| 2012 Final Report |
|
| C3E 2013 Midyear Event Summary_Final.docx |
|
| C3E 2013 Midyear Event Summary_Final.docx |
|
| C3E 2013 Midyear Event Agenda V2 7_26Apr13.docx |
|
| Copy of C3E - Traveler Jan 13-15.xlsx |
|
| NSF DIRECT DEPOSIT FORM (3).docx |
|
| Travel_Information_v3_29Oct13.docx |
|
| Report to the President: Immediate Opportunities for Strengthening the Nations Cybersecurity |
|