| CyberSTEM Camp 2017 |
|
| Intermediate CyberSTEM Camp (2017) |
|
| Final Report |
|
| Trust Management and Security in Satellite Telecommand Processing |
|
| A Bibliography on Network Analytics |
|
| A Language of Life: Characterizing People using Cell Phone Tracks |
|
| Agile Monitoring for Cyber Defense |
|
| Baiting Inside Attackers Using Decoy Documents |
|
| C3E 2009 Workshop Overview |
|
| castle_warrior-_redefining_21st_century_network_defense.pdf |
|
| Challenges in Applying Game Theory to the Domain of Information Warfare |
|
| Characterizing Comment Spam in the Blogosphere through Content Analysis |
|
| Computing Under Occupation |
|
| Creating a National Framework for Cybersecurity: An Analysis of Issues and Options |
|
| Securing Cyberspace for the 44th Presidency |
|
| Cybersecurity Strategies: The QuERIES Methodology |
|
| GAO - Cybercrime |
|
| Identifying the Time of Step Change in the Mean of Autocorrelated Processes |
|
| Immuno-Inspired Autonomic System for Cyber Defense |
|
| Inference on Edge Density in Undirected Binary Networks |
|
| Intelligent Multi-Agent Information Security System |
|
| Masquerade Attack Detection Using a Search-Behavior Modeling Approach |
|
| Mission Oriented Risk and Design Analysis of Critical Information Systems |
|
| MULTI-AGENT SECURITY SYSTEM BASED ON NEURAL NETWORK MODEL OF USER'S BEHAVIOR |
|
| The National Strategy To Secure Cyberspace |
|