[PDF][PDF] High-level information fusion: an overview.

PH Foo, GW Ng - J. Adv. Inf. Fusion, 2013 - isif.org
In general, data and information fusion can provide enhancement to the outcomes of
processes for solving various application problems. Some advantages of carrying out DIF …

Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory

V Dutt, YS Ahn, C Gonzalez - Human Factors, 2013 - journals.sagepub.com
Objective: To determine the effects of an adversary's behavior on the defender's accurate
and timely detection of network threats. Background: Cyber attacks cause major work …

Siber güvenliğin milli güvenlik açısından önemi ve alınabilecek tedbirler

MNÖVA Kaya - Güvenlik Stratejileri Dergisi, 2013 - dergipark.org.tr
Teknoloji insanların günlük yaşamına her alanda daha fazla nüfuz etmektedir. İnternet,
kolaylık sağlayan bir araç olmanın ötesine geçmiş ve birçok alanda kullanılması zorunlu bir …

Human factors in cyber warfare: Alternative perspectives

BA Knott, VF Mancuso, K Bennett… - Proceedings of the …, 2013 - journals.sagepub.com
There has been a dramatic increase in the total number of reported cyber security breaches
and attacks in recent years. In response, government, and corporate entities have invested …

Network security situation prediction based on bp and rbf neural network

Y Zhang, S Jin, X Cui, X Yin, Y Pang - … 2012, Beijing, China, May 28–June …, 2013 - Springer
With tremendous complex attacks on the network, network analysts not only need to
understand but also predict the situation of network security. In the field of network security …

Managing information technology security in the context of cyber crime trends

DE Neghina, E Scarlat - International journal of computers …, 2013 - univagora.ro
Cyber-attacks can significantly hurt an organization's IT environment, leading to serious
operational disruptions, from simply damaging the first layers of IT security up to identity …

Trustworthy incident information sharing in social cyber defense alliances

F Skopik, Q Li - 2013 IEEE Symposium on Computers and …, 2013 - ieeexplore.ieee.org
The Internet threat landscape is fundamentally changing today. A major shift away from
hobby hacking towards well-organized cyber crimes can be observed. The aim of these …

Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection

V Dutt, A Kaur - … Journal of Trust Management in Computing …, 2013 - inderscienceonline.com
Cyber attacks, the disruption of normal functioning of computers in a network due to
malicious events (threats), are becoming widespread and the role of security analysts is …

Cybernetics: Where shall we go?

DP Filev, Q Zhao, J Brine - 2013 IEEE International Conference …, 2013 - ieeexplore.ieee.org
Cybernetics, as defined by Plato and later by Ampère is the science of governance. In the
1940s, Wiener used cybernetics as an umbrella term to refer to control and communication …

A cyber security architecture for military networks using a cognitive network approach

A Kärkkäinen - 2013 - doria.fi
Cyber security is one of the main topics that are discussed around the world today. The
threat is real, and it is unlikely to diminish. People, business, governments, and even armed …