| CYBER WARFARE AND THE CRIME OF AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY ON TOMORROW’S BATTLEFIELD |
|
| Data Analysis Challenges |
|
| Detecting Fraud in the Real World |
|
| Imposing Costs On Cyber Attackers |
|
| Modeling Human Reasoning About Meta-Information |
|
| On the Efficacy of Data Mining for Security Applications |
|
| PROTECTING USERS OF THE CYBER COMMONS |
|
| Reducing Transaction Databases, Without Lagging Behind or Losing Information |
|
| Shadows in the Cloud |
|
| A Comprehensive Survey of Data Mining-based Fraud Detection Research |
|
| Ant-Based Cyber Security |
|
| Automatic Construction of Anomaly Detectors from Graphical Models |
|
| Big-Data Computing: Creating revolutionary breakthroughs in commerce, science, and society |
|
| Big Data, Analytics and the Path From Insights to Value |
|
| Complexity Science Challenges in Cybersecurity |
|
| Cyber Infrastructure Protection |
|
| Cyber Intelligence...setting the landscape for an emerging discipline |
|
| Cyber Profiling for Insider Threat Detection |
|
| Cyberspace Defense Technician |
|
| Directions in Security Metrics Research |
|
| Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security |
|
| Doing Intrusion Detection Using Embedded Sensors Proposal |
|
| Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor |
|
| Gaming Security by Obscurity |
|
| Holistic Network Defense: Fusing Host and Network Features for Attack Clarification |
|