Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Rebecca Cathey"'
Publikováno v:
IEEE BigData
Hackers make extensive use of online communities, sharing knowledge, tools, as well as performing coordination and recruitment activities. In order to detect such behaviors, this paper proposes a set of indicators which analyze online communication p
Publikováno v:
IEEE BigData
Social media platforms are commonly employed for collecting Open Source Intelligence (OSNIT) on criminals, and assessing the risk they pose to the environment they live in. However, since no prior research has investigated the relationships between h
Publikováno v:
DASC/PiCom/DataCom/CyberSciTech
Cyber security experts in the U.S. and around the globe assess potential threats to their organizations by evaluating potential attackers' skills, knowledge, resources, access to the target organization and motivation to offend (i.e. SKRAM). Unfortun
Publikováno v:
The Journal of Supercomputing. 44:146-178
XML is a flexible and powerful tool that enables information and security sharing in heterogeneous environments. Scalable technologies are needed to effectively manage the growing volumes of XML data. A wide variety of methods exist for storing and s
Publikováno v:
MILCOM
We explore techniques for eliciting a behavioral description from an Android smartphone app in a controlled manner. A description of app behavior is useful for performing subsequent analysis such as model checking, for example to verify the app satis
Publikováno v:
MILCOM
As the presence of malware increases in binary applications, behavior analysis is rapidly becoming necessary. We examine the application of execution path clustering and information pedigree analysis to analyze the behaviors of an application. An exe
Publikováno v:
Next Generation Information Technologies and Systems ISBN: 9783642049408
NGITS
NGITS
Yizkor Books contain firsthand accounts of events that occurred before, during, and after the Holocaust. These books were published with parts in thirteen languages, across six continents, spanning a period of more than 60 years and are an important
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::27fb3b0e40d1bd570a6f0eaafa4f9312
https://doi.org/10.1007/978-3-642-04941-5_3
https://doi.org/10.1007/978-3-642-04941-5_3
Publikováno v:
CISS
We present a unified linear program formulation for optimal content delivery in content delivery networks (CDNs), taking into account various costs and constraints associated with content dissemination from the origin server to storage nodes, data st
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ed34403ddf8aa81d52be46b0d01fa523
https://resolver.caltech.edu/CaltechAUTHORS:20100510-112135867
https://resolver.caltech.edu/CaltechAUTHORS:20100510-112135867
Publikováno v:
CIKM
Yizkor Book collections contain firsthand commemorative accounts of events from the era surrounding the rise and fall of Nazi Germany, including documents from before, during, and after the Holocaust. Prior to our effort, information regarding the co
Publikováno v:
ISI
The growing trend of using XML to share security data requires scalable technology to effectively manage the volume and variety of data. Although a wide variety of methods exist for storing and searching XML, the two most common techniques are conven