Skip to main content
Science of Security Virtual Organization

Header Menu

  • Research
    • Virtual Institutes
    • Lablets
    • Projects
    • Publications
  • HotSoS
  • Competitions
    • Cybersecurity Paper Competition
    • ISEF
  • Conferences
    • HCSS
    • HotSoS
    • C3E
Not a member? Forgot your password?

Hamburger Menu

  • Home
  • Projects
  • News
  • Events

Breadcrumb

  • Home /
  • Katie Dey /
  • User Contributions
Title Date
Rockwell Photos 2018-05-16
Final Report: 2008 Berkeley SoS Workshop 2010-10-27
A Roadmap for Cybersecurity Research 2010-11-17
Modeling, Prediction and Diagnosis for Network Security 2010-11-02
2012 C3E Travel Guidelines 2012-08-07
Cyber Analtyics The Story Behind Cyber Data 2012-08-20
A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model 2012-08-20
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection 2012-08-20
Reasoning about anomalies: a study of the analytical process of detecting and identifying anomalous behavior in maritime traffic 2012-08-20
Mixed-Initiative Security Agents 2012-08-20
Operationalizing C2 Agility 2012-08-20
MODELING CYBER ATTACKS AND THEIR EFFECTS ON DECISION PROCESS 2012-08-20
Cyber Analytics for US CERT 2012-08-20
Parametric Models for Anomaly Detection in Aggregate Traffic 2012-08-20
Practical Anomaly Detection based on Classifying Frequent Traffic Patterns 2012-08-20
When Big Data Matters 2012-08-23
Finding Data Needles in Gigabit Haystacks 2012-08-23
From Data to Knowledge to Discoveries 2012-08-23
Visualization of Complex Attacks and State of Attacked Network 2012-08-23

Pagination

  • First page « First
  • Previous page ‹‹
  • …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Current page 22
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • …
  • Next page ››
  • Last page Last »
© 2025 Science of Security Virtual Organization

Footer

  • Terms
  • Follow Us on X