


default search action
Network Science and Cybersecurity 2014
- Robinson E. Pino:
Network Science and Cybersecurity. Advances in Information Security 55, Springer 2014, ISBN 978-1-4614-7596-5 - Alexander Kott:
Towards Fundamental Science of Cyber Security. 1-13 - Richard E. Harang:
Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems. 15-37 - Massimiliano Albanese
, Robert F. Erbacher, Sushil Jajodia
, Cristian Molinaro
, Fabio Persia, Antonio Picariello
, Giancarlo Sperlì, V. S. Subrahmanian:
Recognizing Unexplained Behavior in Network Traffic. 39-62 - Bruce McCormick:
Applying Cognitive Memory to CyberSecurity. 63-73 - Yan M. Yufik:
Understanding Cyber Warfare. 75-91 - Dhireesha Kudithipudi, Cory E. Merkel, Michael Soltiz, Garrett S. Rose
, Robinson E. Pino:
Design of Neuromorphic Architectures with Memristors. 93-103 - Garrett S. Rose
, Dhireesha Kudithipudi, Ganesh Khedkar, Nathan R. McDonald, Bryant T. Wysocki, Lok-Kwong Yan:
Nanoelectronics and Hardware Security. 105-123 - Kent W. Nixon, Yiran Chen, Zhi-Hong Mao, Kang Li
:
User Classification and Authentication for Mobile Device Based on Gesture Recognition. 125-135 - Bryant T. Wysocki, Nathan R. McDonald, Clare Thiem, Garrett S. Rose
, Mario Gomez II:
Hardware-Based Computational Intelligence for Size, Weight, and Power Constrained Environments. 137-153 - Misty K. Blowers, Jonathan Williams:
Machine Learning Applied to Cyber Operations. 155-175 - Xueyang Wang, Ramesh Karri
:
Detecting Kernel Control-Flow Modifying Rootkits. 177-187 - Simon Y. Berkovich:
Formation of Artificial and Natural Intelligence in Big Data Environment. 189-203 - Hasan Çam, Pierre A. Mouallem, Robinson E. Pino:
Alert Data Aggregation and Transmission Prioritization over Mobile Networks. 205-220 - Steve Hutchinson:
Semantic Features from Web-Traffic Streams. 221-237 - M. R. McLean:
Concurrent Learning Algorithm and the Importance Map. 239-250 - Tanvir Atahary, Scott Douglass, Tarek M. Taha:
Hardware Accelerated Mining of Domain Knowledge. 251-271 - Michael J. Shevenell, Justin L. Shumaker, Arthur H. Edwards, Robinson E. Pino:
Memristors and the Future of Cyber Security Hardware. 273-285

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.