| Intrusion Detection Systems & Multisensor Data Fusion Creating Cyberspace Situational Awareness |
|
| Intrusion detection systems have usually been developed using large host-based components |
|
| Leveraging Complexity in Software for Cybersecurity |
|
| Mission Cyber Security Situation Management |
|
| NetBytes Viewer: An Entity-based NetFlow Visualization Utility for Identifying Intrusive Behavior |
|
| HoTSoS_Booklet.pdf |
|
| Network profiling for high assurance survivability |
|
| Other References for Emergent Behavior Track |
|
| Outlier Detection Techniques for Wireless Sensor Networks: A Survey |
|
| Outside the Closed World: On Using Machine Learning For Network Intrusion Detection |
|
| Public Security: simulations need to replace conventional wisdom |
|
| Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology |
|
| Self-organization in social insects |
|
| Self-Organizing Resilient Network Sensing (SornS) with Very Large Scale Anomaly Detection |
|
| Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy |
|
| Spear Phishing Attack Detection |
|
| Stopping Fraud Where it Starts The Value of Analytics in the Onboarding Process |
|
| The application of data mining techniques in financial fraud detection: A classification framework and an academic review of lit |
|
| The Calculi of Emergence: Computation, Dynamics, and Induction |
|
| The Prediction of Abnormal and Malicious Behavior: Automated Behavior Analysis (ABA) |
|
| The Promise and Peril of Big Data |
|
| Transaction Mining for Fraud Detection in ERP Systems |
|
| Understanding High-Dimensional Spaces |
|
| What is Data Science? |
|
| UMD Cyber Defense Training Camp (2017) |
|