Pub Date : 2014-07-01DOI: 10.1007/978-3-319-10374-7_4
Misty K. Blowers, Stefan Fernandez, Brandon Froberg, Jonathan Williams, George Corbin, Kevin Nelson
{"title":"Data Mining in Cyber Operations","authors":"Misty K. Blowers, Stefan Fernandez, Brandon Froberg, Jonathan Williams, George Corbin, Kevin Nelson","doi":"10.1007/978-3-319-10374-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_4","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_3
Massimiliano Albanese, H. Çam, S. Jajodia
{"title":"Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance","authors":"Massimiliano Albanese, H. Çam, S. Jajodia","doi":"10.1007/978-3-319-10374-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_3","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_8
S. Berkovich
{"title":"Sustainability Problems and a Novelty in the Concept of Energy","authors":"S. Berkovich","doi":"10.1007/978-3-319-10374-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_8","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_6
L. Perlovsky, O. Shevchenko
{"title":"Dynamic Logic Machine Learning for Cybersecurity","authors":"L. Perlovsky, O. Shevchenko","doi":"10.1007/978-3-319-10374-7_6","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_6","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"1792 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_11
R. Pino, A. Oblea, K. Campbell
{"title":"Memristor SPICE Model Simulation and Device Hardware Correlation","authors":"R. Pino, A. Oblea, K. Campbell","doi":"10.1007/978-3-319-10374-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_11","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130949631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_10
T. Taha, Raqibul Hasan, C. Yakopcic, M. R. McLean
{"title":"Low Power Neuromorphic Architectures to Enable Pervasive Deployment of Intrusion Detection Systems","authors":"T. Taha, Raqibul Hasan, C. Yakopcic, M. R. McLean","doi":"10.1007/978-3-319-10374-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_10","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126806615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_1
Y. Yufik
{"title":"Situational Awareness, Sensemaking, and Situation Understanding in Cyber Warfare","authors":"Y. Yufik","doi":"10.1007/978-3-319-10374-7_1","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_1","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_7
Wei Yu, Linqiang Ge, Guobin Xu, Xinwen Fu
{"title":"Towards Neural Network Based Malware Detection on Android Mobile Devices","authors":"Wei Yu, Linqiang Ge, Guobin Xu, Xinwen Fu","doi":"10.1007/978-3-319-10374-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_7","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122229368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_13
J. Lyke, A. Edwards
{"title":"Cyber Security Considerations for Reconfigurable Systems","authors":"J. Lyke, A. Edwards","doi":"10.1007/978-3-319-10374-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_13","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"468 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115869139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-3-319-10374-7_12
R. Pino, Youngok Pino
{"title":"Reconfigurable Memristor Based Computing Logic","authors":"R. Pino, Youngok Pino","doi":"10.1007/978-3-319-10374-7_12","DOIUrl":"https://doi.org/10.1007/978-3-319-10374-7_12","url":null,"abstract":"","PeriodicalId":445381,"journal":{"name":"Cybersecurity Systems for Human Cognition Augmentation","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114345624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}