Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Shanchieh Yang"'
Publikováno v:
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining.
Autor:
Gordon Werner, Shanchieh Yang
Publikováno v:
2022 International Conference on Computer Communications and Networks (ICCCN).
Publikováno v:
KDD
Despite significant contributions to various aspects of cybersecurity, cyber-attacks remain on the unfortunate rise. Increasingly, internationally recognized entities such as the National Science Foundation and National Science & Technology Council h
Publikováno v:
2014 ASEE Annual Conference & Exposition Proceedings.
Publikováno v:
DS-RT
Recognizing the need for proactive analysis of cyber adversary behavior, this paper presents a new event-driven simulation model and implementation to reveal the efforts needed by attackers who have various entry points into a network. Unlike previou
Autor:
Shao-Hsusan Su, Stephen Moskal, Aunshul Rege, Katorah Williams, Alyssa Mendlein, Shanchieh Yang
Publikováno v:
IWSPA@CODASPY
Advanced Persistent Threats (APTs) are professional, sophisticated threats that pose a serious concern to our technologically-dependent society. As these threats become more common, conventional response-driven cyberattack management needs to be subs
Publikováno v:
ISI
Cyber attacks against organizations are occurring with increasing regularity. Defensive systems are in place that can detect malicious traffic within a network. However, these systems can only provide analysis after malicious activity has occurred. W
Publikováno v:
2018 IEEE International Symposium on Technologies for Homeland Security (HST).
Cyber defense can no longer be limited to intrusion detection methods. These systems require malicious activity to enter an internal network before an attack can be detected. Having advanced, predictive knowledge of future attacks allow a potential v
Publikováno v:
CISRC
Cyber attacks occur on a near daily basis and are becoming exponentially more common. While some research aims to detect the characteristics of an attack, little focus has been given to patterns of attacks in general. This paper aims to exploit tempo
Publikováno v:
IEEE Communications Magazine. 48:146-152
The human cognitive process of situation awareness is limited to the amount of data and the level of complexity between the data elements. Situation assessment, encompassing automated threat and impact assessment, shall assist human analysts by estim