Share Email Print


Cyber Sensing 2013
Editor(s): Igor V. Ternovskiy; Peter Chin
For the purchase of this volume in printed format, please visit

Volume Details

Volume Number: 8757
Date Published: 10 June 2013

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 8757
Author(s): Proceedings of SPIE
On localization attacks against cloud infrastructure
Author(s): Linqiang Ge; Wei Yu; Mohammad Ali Sistani
Show Abstract
Quantitative analysis of intrusion detection systems: Snort and Suricata
Author(s): Joshua S. White; Thomas Fitzsimmons; Jeanna N. Matthews
Show Abstract
ICS logging solution for network-based attacks using Gumistix technology
Author(s): Jeremy R. Otis; Dustin Berman; Jonathan Butts; Juan Lopez Jr.
Show Abstract
A framework for network-wide semantic event correlation
Author(s): Robert T. Hall; Joshua Taylor; Joshua S. White
Show Abstract
Efficient identity management and access control in cloud environment
Author(s): Jonathan Gloster
Show Abstract
Software analysis in the semantic web
Author(s): Joshua Taylor; Robert T. Hall
Show Abstract
Remote suspect identification and the impact of demographic features on keystroke dynamics
Author(s): Robert A. Dora; Patrick D. Schalk; John E. McCarthy; Scott A. Young
Show Abstract
Dynamic malware analysis using IntroVirt: a modified hypervisor-based system
Author(s): Joshua S. White; Stephen R. Pape; Adam T. Meily; Richard M. Gloo
Show Abstract
The two stages hierarchical unsupervised learning system for complex dynamic scene recognition
Author(s): James Graham; Alan O'Connor; Igor V. Ternovskiy; Roman Ilin
Show Abstract
Performance comparison of the Prophecy (forecasting) Algorithm in FFT form for unseen feature and time-series prediction
Author(s): Holger Jaenisch; James Handley
Show Abstract
A multi-resolution fractal additive scheme for blind watermarking of 3D point data
Author(s): Mark Rahmes; Kathy Wilder; Kevin Fox
Show Abstract
A study of malware detection on smart mobile devices
Author(s): Wei Yu; Hanlin Zhang; Guobin Xu
Show Abstract
Complex scenes and situations visualization in hierarchical learning algorithm with dynamic 3D NeoAxis engine
Author(s): James Graham; Igor V. Ternovskiy
Show Abstract
Secure it now or secure it later: the benefits of addressing cyber-security from the outset
Author(s): Mohammed M. Olama; James Nutaro
Show Abstract
Digital microarray analysis for digital artifact genomics
Author(s): Holger Jaenisch; James Handley; Deborah Williams
Show Abstract

© SPIE. Terms of Use
Back to Top