Cyber situation awareness: Modeling the security analyst in a cyber-attack scenario through instance-based learning
V Dutt, YS Ahn, C Gonzalez - Data and Applications Security and Privacy …, 2011 - Springer
In a corporate network, the situation awareness (SA) of a security analyst is of particular
interest. A security analyst is in charge of observing the online operations of a corporate …
interest. A security analyst is in charge of observing the online operations of a corporate …
Computational awareness: another way towards intelligence
Q Zhao - International Joint Conference on Computational …, 2011 - Springer
Artificial intelligence (AI) has been a dream of researchers for decades. In 1982, Japan
launched the 5 th generation computer project, expecting to create AI in computers, but …
launched the 5 th generation computer project, expecting to create AI in computers, but …
Scalable detection of cyber attacks
Attackers can exploit vulnerabilities to incrementally penetrate a network and compromise
critical systems. The enormous amount of raw security data available to analysts and the …
critical systems. The enormous amount of raw security data available to analysts and the …
[图书][B] Challenges to adversarial interplay under high uncertainty: staged-world study of a cyber security event
M Branlat - 2011 - search.proquest.com
The vulnerability of critical and valued digital infrastructures and the difficulty of defending
networks against attacks are a growing concern throughout domains. While numerous …
networks against attacks are a growing concern throughout domains. While numerous …
Deciding when to escape a mine emergency: Modeling accumulation of evidence about emergencies through Instance-based Learning
V Dutt, M Yu, C Gonzalez - Proceedings of the Human …, 2011 - journals.sagepub.com
A decision to stop work and escape a mine in a mine emergency depends on the
accumulation of evidence about the emergency over time. This evidence comes as situation …
accumulation of evidence about the emergency over time. This evidence comes as situation …
16 LIFE AS A CORPORATE LIBRARIAN AT THE SOFTWARE ENGINEERING INSTITUTE
SL Rosenthal, MJ Harvey - Best Practices for Corporate Libraries, 2011 - torrossa.com
As a corporate library, the Software Engineering Institute (SEI) Library is an integral part of
the organization. SEI librarians collaborate with researchers on technical projects, contribute …
the organization. SEI librarians collaborate with researchers on technical projects, contribute …
[引用][C] Modelling the security analyst's role: effects of similarity and past experience on cyber attack detection
A Kaur, V Dutt, C Gonzalez - Data and Applications Security and Privacy …, 2011 - Springer