Abstract is missing.
- Autonomous rule creation for intrusion detectionTodd Vollmer, Jim Alves-Foss, Milos Manic. 1-8 [doi]
- Automatic construction of anomaly detectors from graphical modelsErik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley. 9-16 [doi]
- An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generationSenhua Yu, Dipankar Dasgupta. 17-24 [doi]
- Modeling Cyber Knowledge uncertaintyDean Lee, Samuel N. Hamilton, Wendy L. Hamilton. 25-30 [doi]
- A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databasesRan Liu, Wenjian Luo, Xufa Wang. 31-38 [doi]
- Security fusion based on state machine compositionsOmar Al-Ibrahim, Suku Nair. 39-46 [doi]
- Discrimination prevention in data mining for intrusion and crime detectionSara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté. 47-54 [doi]
- Phishing detection using stochastic learning-based weak estimatorsJustin Zhan, Lijo Thomas. 55-59 [doi]
- Modeling cyber conflicts using an extended Petri Net formalismAnita Zakrzewska, Erik M. Ferragut. 60-67 [doi]
- Addressing the need for independence in the CSE modelRobert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila. 68-75 [doi]
- A scalable architecture for improving the timeliness and relevance of cyber incident notificationsJames L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas. 76-83 [doi]
- Design considerations for a case-based reasoning engine for scenario-based cyber incident notificationStephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas. 84-91 [doi]
- An approach to the automated determination of host information valueJustin M. Beaver, Robert M. Patton, Thomas E. Potok. 92-99 [doi]
- Multi agent systems on military networksDavid L. Hancock, Gary B. Lamont. 100-107 [doi]
- Hierarchical traceability of multimedia documentsAmal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas. 108-113 [doi]
- A host based DES approach for detecting ARP spoofingFerdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi. 114-121 [doi]
- Profiling file repository access patterns for identifying data exfiltration activitiesYi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna. 122-128 [doi]
- Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flowsHarkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva. 129-136 [doi]
- Trust optimization in task-oriented social networksJustin Zhan, Xing Fang, Peter Killion. 137-143 [doi]
- Wireless security situation awareness with attack identification decision supportPaul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson. 144-151 [doi]
- Exploring the state space of an application protocol: A case study of SMTPPatrick LaRoche, A. Nur Zincir-Heywood, Malcolm I. Heywood. 152-159 [doi]
- Location privacy protection on social networksJustin Zhan, Xing Fang, Naveen Bandaru. 160-163 [doi]
- Security visualization: Cyber security storm map and event correlationDenise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu. 171-178 [doi]
- Biodiversity: A security approach for ad hoc networksJennifer T. Jackson, Sadie Creese, Mark S. Leeson. 186-193 [doi]
- Genetic optimization and hierarchical clustering applied to encrypted traffic identificationCarlos Bacquet, A. Nur Zincir-Heywood, Malcolm I. Heywood. 194-201 [doi]
- Fuzzy logic based anomaly detection for embedded network security cyber sensorOndrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright. 202-209 [doi]
- A systems engineering approach for crown jewels estimation and mission assurance decision makingScott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren. 210-216 [doi]
- Intelligence, not integration: Distributed regret minimization for IDS ControlMartin Rehák, Jan Stiborek, Martin Grill. 217-224 [doi]