


default search action
CICS 2011: Paris, France
- 2011 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2011, Paris, France, April 12-13, 2011. IEEE 2011, ISBN 978-1-4244-9904-5

Intrusion / Anamoly Detection
- Todd Vollmer, Jim Alves-Foss, Milos Manic:

Autonomous rule creation for intrusion detection. 1-8 - Erik M. Ferragut, David M. Darmon, Craig Aaron Shue, Stephen Kelley:

Automatic construction of anomaly detectors from graphical models. 9-16 - Senhua Yu, Dipankar Dasgupta:

An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation. 17-24
Poster Session
- Dean Lee, Samuel N. Hamilton, Wendy L. Hamilton:

Modeling Cyber Knowledge uncertainty. 25-30 - Ran Liu, Wenjian Luo, Xufa Wang:

A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases. 31-38 - Omar Al-Ibrahim

, Suku Nair:
Security fusion based on state machine compositions. 39-46 - Sara Hajian, Josep Domingo-Ferrer

, Antoni Martínez-Ballesté:
Discrimination prevention in data mining for intrusion and crime detection. 47-54 - Justin Zhan, Lijo Thomas:

Phishing detection using stochastic learning-based weak estimators. 55-59
Mission Assurance
- Anita Zakrzewska, Erik M. Ferragut:

Modeling cyber conflicts using an extended Petri Net formalism. 60-67 - Robert K. Abercrombie

, Erik M. Ferragut, Frederick T. Sheldon
, Michael R. Grimaila:
Addressing the need for independence in the CSE model. 68-75 - James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas:

A scalable architecture for improving the timeliness and relevance of cyber incident notifications. 76-83 - Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas:

Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. 84-91 - Justin M. Beaver

, Robert M. Patton
, Thomas E. Potok
:
An approach to the automated determination of host information value. 92-99 - David L. Hancock, Gary B. Lamont:

Multi agent systems on military networks. 100-107
Social Media and Data Security
- Amal Ben Hamida

, Mohamed Koubàa, Chokri Ben Amar, Henri Nicolas:
Hierarchical traceability of multimedia documents. 108-113 - Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi

:
A host based DES approach for detecting ARP spoofing. 114-121 - Yi Hu, Charles E. Frank, James Walden

, Emily Crawford, Dhanuja Kasturiratna:
Profiling file repository access patterns for identifying data exfiltration activities. 122-128 - Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:

Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. 129-136 - Justin Zhan, Xing Fang, Peter Killion:

Trust optimization in task-oriented social networks. 137-143 - Paul K. Harmer, Ryan W. Thomas, Brady Christel, Richard K. Martin

, Clifton Watson:
Wireless security situation awareness with attack identification decision support. 144-151
Topics on Cyber Security
- Patrick LaRoche, Nur Zincir-Heywood

, Malcolm I. Heywood
:
Exploring the state space of an application protocol: A case study of SMTP. 152-159 - Justin Zhan, Xing Fang, Naveen Bandaru:

Location privacy protection on social networks. 160-163 - Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, Qishi Wu:

Security visualization: Cyber security storm map and event correlation. 171-178
Bio-Cognitive Approaches
- Jennifer T. Jackson, Sadie Creese, Mark S. Leeson

:
Biodiversity: A security approach for ad hoc networks. 186-193 - Carlos Bacquet, Nur Zincir-Heywood

, Malcolm I. Heywood
:
Genetic optimization and hierarchical clustering applied to encrypted traffic identification. 194-201 - Ondrej Linda, Milos Manic, Todd Vollmer, Jason L. Wright

:
Fuzzy logic based anomaly detection for embedded network security cyber sensor. 202-209 - Scott Musman, Mike Tanner, Aaron Temin, Evan Elsaesser, Lewis Loren:

A systems engineering approach for crown jewels estimation and mission assurance decision making. 210-216 - Martin Rehák, Jan Stiborek

, Martin Grill:
Intelligence, not integration: Distributed regret minimization for IDS Control. 217-224

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














