default search action
CICS 2011: Paris, France
- 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011. IEEE 2011, ISBN 978-1-4244-9904-5
Intrusion / Anamoly Detection
- Todd Vollmer, Jim Alves-Foss, Milos Manic:
Autonomous rule creation for intrusion detection. 1-8 - Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley:
Automatic construction of anomaly detectors from graphical models. 9-16 - Senhua Yu, Dipankar Dasgupta:
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. 17-24
Poster Session
- Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton:
Modeling Cyber Knowledge uncertainty. 25-30 - Ran Liu, Wenjian Luo, Xufa Wang:
A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. 31-38 - Omar Al-Ibrahim, Suku Nair:
Security fusion based on state machine compositions. 39-46 - Sara Hajian, Josep Domingo-Ferrer, Antoni Martínez-Ballesté:
Discrimination prevention in data mining for intrusion and crime detection. 47-54 - Justin Zhan, Lijo Thomas:
Phishing detection using stochastic learning-based weak estimators. 55-59
Mission Assurance
- Anita Zakrzewska, Erik M. Ferragut:
Modeling cyber conflicts using an extended Petri Net formalism. 60-67 - Robert K. Abercrombie, Erik M. Ferragut, Frederick T. Sheldon, Michael R. Grimaila:
Addressing the need for independence in the CSE model. 68-75 - James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas:
A scalable architecture for improving the timeliness and relevance of cyber incident notifications. 76-83 - Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas:
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. 84-91 - Justin M. Beaver, Robert M. Patton, Thomas E. Potok:
An approach to the automated determination of host information value. 92-99 - David L. Hancock, Gary B. Lamont:
Multi agent systems on military networks. 100-107
Social Media and Data Security
- Amal Ben Hamida, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas:
Hierarchical traceability of multimedia documents. 108-113 - Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi:
A host based DES approach for detecting ARP spoofing. 114-121 - Yi Hu, Charles E. Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna:
Profiling file repository access patterns for identifying data exfiltration activities. 122-128 - Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. 129-136 - Justin Zhan, Xing Fang, Peter Killion:
Trust optimization in task-oriented social networks. 137-143 - Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin, Clifton Watson:
Wireless security situation awareness with attack identification decision support. 144-151
Topics on Cyber Security
- Patrick LaRoche, Nur Zincir-Heywood, Malcolm I. Heywood:
Exploring the state space of an application protocol: A case study of SMTP. 152-159 - Justin Zhan, Xing Fang, Naveen Bandaru:
Location privacy protection on social networks. 160-163 - Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu:
Security visualization: Cyber security storm map and event correlation. 171-178
Bio-Cognitive Approaches
- Jennifer T. Jackson, Sadie Creese, Mark S. Leeson:
Biodiversity: A security approach for ad hoc networks. 186-193 - Carlos Bacquet, Nur Zincir-Heywood, Malcolm I. Heywood:
Genetic optimization and hierarchical clustering applied to encrypted traffic identification. 194-201 - Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright:
Fuzzy logic based anomaly detection for embedded network security cyber sensor. 202-209 - Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren:
A systems engineering approach for crown jewels estimation and mission assurance decision making. 210-216 - Martin Rehák, Jan Stiborek, Martin Grill:
Intelligence, not integration: Distributed regret minimization for IDS Control. 217-224
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.