Share Email Print
cover

Proceedings of SPIE Volume 8408

Cyber Sensing 2012
Editor(s): Igor V. Ternovskiy; Peter Chin
Format Member Price Non-Member Price
Softcover $105.00 * $105.00 *

*Available as a photocopy reprint only. Allow two weeks reprinting time plus standard delivery time. No discounts or returns apply.


Volume Details

Volume Number: 8408
Date Published: 25 June 2012
Softcover: 24 papers (280) pages
ISBN: 9780819490865

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 8408
Author(s): Proceedings of SPIE
Insider threat detection enabled by converting user applications into fractal fingerprints and autonomously detecting anomalies
Author(s): Holger M. Jaenisch; James Handley
Show Abstract
Cyber situational awareness and differential hardening
Author(s): Anurag Dwivedi; Dan Tebben
Show Abstract
From measurements to metrics: PCA-based indicators of cyber anomaly
Author(s): Farid Ahmed; Tommy Johnson; Sonia Tsui
Show Abstract
Anomaly detection for internet surveillance
Author(s): Henri Bouma; Stephan Raaijmakers; Arvid Halma; Harry Wedemeijer
Show Abstract
PeerShield: determining control and resilience criticality of collaborative cyber assets in networks
Author(s): Hasan Cam
Show Abstract
RISE: Relational-Integrity-Sensitive-Encoding and data aggregation for intrusion detection
Author(s): Hasan Cam
Show Abstract
Coalmine: an experience in building a system for social media analytics
Author(s): Joshua S. White; Jeanna N. Matthews; John L. Stacy
Show Abstract
A method for the automated detection phishing websites through both site characteristics and image analysis
Author(s): Joshua S. White; Jeanna N. Matthews; John L. Stacy
Show Abstract
A solution for parallel network architectures applied to network defense appliances and sensors
Author(s): Eric C. Naber; Paul G. Velez; Amanpreet S. Johal
Show Abstract
Data fusion in cyber security: first order entity extraction from common cyber data
Author(s): Nicklaus A. Giacobe
Show Abstract
Cyber situation awareness as distributed socio-cognitive work
Author(s): Michael Tyworth; Nicklaus A. Giacobe; Vincent Mancuso
Show Abstract
Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield
Author(s): Nurgul Yasar; Fatih Mustafa Yasar; Yucel Topcu
Show Abstract
Analysis of web-related threats in ten years of logs from a scientific portal
Author(s): Rafael D. C. Santos; André R. A. Grégio; Jordan Raddick; Vamsi Vattki; Alex Szalay
Show Abstract
Scalable wavelet-based active network detection of stepping stones
Author(s): Joseph I. Gilbert; David J. Robinson; Jonathan W. Butts; Timothy H. Lacey
Show Abstract
Distributed pattern detection in cyber networks
Author(s): Randy C. Paffenroth; Philip C. Du Toit; Louis L. Scharf; Anura P. Jayasumana; Vidarshana W. Banadara; Ryan Nong
Show Abstract
Improved near-earth object detection using dynamic logic
Author(s): Thomas G. Allen; Alan C. O'Connor; Igor Ternovskiy
Show Abstract
Automatic decision support in heterogeneous sensor networks
Author(s): Robert Kozma; Timothy Tanigawa; Orges Furxhi; Sergi Consul
Show Abstract
Multi-agent system for target-adaptive radar tracking
Author(s): Alan C. O'Connor
Show Abstract
Application of dynamic logic algorithm to analyze AFRL gotcha data
Author(s): Freeman C. Lin; Leonid I. Perlovsky
Show Abstract
Human-computer symbiosis in cyberspace environments
Author(s): J. Carter; E. Levin; A. Sergeyev
Show Abstract
Wavefront sensor alignment and calibration techniques for laser communication systems
Author(s): Aleksandr V. Sergeyev; Eugene Levin; Michael C. Roggemann
Show Abstract
Towards a trustworthy distributed architecture for complex sensing networks
Author(s): Heidi Schubert; Jahn A. Luke
Show Abstract
Blind extraction and security analysis of spread spectrum hidden watermarks
Author(s): John A. Marsh; Gerard F. Wohlrab
Show Abstract
Fractals, malware, and data models
Author(s): Holger M. Jaenisch; Andrew N. Potter; Deborah Williams; James W. Handley
Show Abstract
Finding structures in large-scale graphs
Author(s): Sang Peter Chin; Elizabeth Reilly; Linyuan Lu
Show Abstract

© SPIE. Terms of Use
Back to Top