Cyber situation awareness: Modeling the security analyst in a cyber-attack scenario through instance-based learning

V Dutt, YS Ahn, C Gonzalez - Data and Applications Security and Privacy …, 2011 - Springer
In a corporate network, the situation awareness (SA) of a security analyst is of particular
interest. A security analyst is in charge of observing the online operations of a corporate …

Computational awareness: another way towards intelligence

Q Zhao - International Joint Conference on Computational …, 2011 - Springer
Artificial intelligence (AI) has been a dream of researchers for decades. In 1982, Japan
launched the 5 th generation computer project, expecting to create AI in computers, but …

Scalable detection of cyber attacks

M Albanese, S Jajodia, A Pugliese… - … Systems–Analysis and …, 2011 - Springer
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise
critical systems. The enormous amount of raw security data available to analysts and the …

[图书][B] Challenges to adversarial interplay under high uncertainty: staged-world study of a cyber security event

M Branlat - 2011 - search.proquest.com
The vulnerability of critical and valued digital infrastructures and the difficulty of defending
networks against attacks are a growing concern throughout domains. While numerous …

Deciding when to escape a mine emergency: Modeling accumulation of evidence about emergencies through Instance-based Learning

V Dutt, M Yu, C Gonzalez - Proceedings of the Human …, 2011 - journals.sagepub.com
A decision to stop work and escape a mine in a mine emergency depends on the
accumulation of evidence about the emergency over time. This evidence comes as situation …

16 LIFE AS A CORPORATE LIBRARIAN AT THE SOFTWARE ENGINEERING INSTITUTE

SL Rosenthal, MJ Harvey - Best Practices for Corporate Libraries, 2011 - torrossa.com
As a corporate library, the Software Engineering Institute (SEI) Library is an integral part of
the organization. SEI librarians collaborate with researchers on technical projects, contribute …

[引用][C] Modelling the security analyst's role: effects of similarity and past experience on cyber attack detection

A Kaur, V Dutt, C Gonzalez - Data and Applications Security and Privacy …, 2011 - Springer