Abstract is missing.
- Active Perception for Cyber Intrusion Detection and DefenseJ. Benton, Robert P. Goldman, Mark H. Burstein, Joseph Mueller, Paul Robertson, Dan Cerys, Andreas Hoffman, Rusty Bobrow. [doi]
- Validating an Agent-Based Model of Human Password BehaviorBruno Korbar, Jim Blythe, Ross Koppel, Vijay Kothari, Sean W. Smith. [doi]
- UCO: A Unified Cybersecurity OntologyZareen Syed, Ankur Padia, Tim Finin, M. Lisa Mathews, Anupam Joshi. [doi]
- Bayesian Networks with Prior Knowledge for Malware PhylogeneticsDiane Oyen, Blake Anderson, Christine M. Anderson-Cook. [doi]
- Toward Argumentation-Based Cyber AttributionEric Nunes, Paulo Shakarian, Gerardo I. Simari. [doi]
- Socio-Cultural Modeling for Cyber Threat ActorsPaulo Shakarian, Jana Shakarian. [doi]
- Discovering Human and Machine Readable Descriptions of Malware FamiliesBlake Anderson, David A. McGrew, Subharthi Paul. [doi]
- Bandits for Cybersecurity: Adaptive Intrusion Detection Using HoneypotsMarcus Paul Gutierrez, Christopher Kiekintveld. [doi]
- Inter-Temporal Incentives in Security Information Sharing AgreementsParinaz Naghizadeh, Mingyan Liu. [doi]