| Rockwell Photos |
|
| Final Report: 2008 Berkeley SoS Workshop |
|
| A Roadmap for Cybersecurity Research |
|
| Modeling, Prediction and Diagnosis for Network Security |
|
| 2012 C3E Travel Guidelines |
|
| Cyber Analtyics The Story Behind Cyber Data |
|
| A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model |
|
| Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection |
|
| Reasoning about anomalies: a study of the analytical process of detecting and identifying anomalous behavior in maritime traffic |
|
| Mixed-Initiative Security Agents |
|
| Operationalizing C2 Agility |
|
| MODELING CYBER ATTACKS AND THEIR EFFECTS ON DECISION PROCESS |
|
| Cyber Analytics for US CERT |
|
| Parametric Models for Anomaly Detection in Aggregate Traffic |
|
| Practical Anomaly Detection based on Classifying Frequent Traffic Patterns |
|
| When Big Data Matters |
|
| Finding Data Needles in Gigabit Haystacks |
|
| From Data to Knowledge to Discoveries |
|
| Visualization of Complex Attacks and State of Attacked Network |
|