![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Cyber Situational Awareness 2010
- Sushil Jajodia
, Peng Liu, Vipin Swarup, Cliff Wang:
Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2
Part 1 / Overview of Cyber Situational Awareness
- Paul Barford, Marc Dacier
, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia
, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. 3-13 - George P. Tadda, John S. Salerno:
Overview of Cyber Situation Awareness. 15-35
Part 2 / The Reasoning and Decision Making Aspects
- John Yen, Michael D. McNeese, Tracy Mullen, David L. Hall, Xiaocong Fan, Peng Liu:
RPD-based Hypothesis Reasoning for Cyber Situation Awareness. 39-49 - Jason H. Li, Xinming Ou, Siva Raj Rajagopalan:
Uncertainty and Risk Management in Cyber Situational Awareness. 51-68
Part 3 / Part III Macroscopic Cyber Situational Awareness
- Paul Barford, Yan Chen, Anup Goyal, Zhichun Li, Vern Paxson, Vinod Yegneswaran:
Employing Honeynets For Network Situational Awareness. 71-102 - Marc Dacier
, Corrado Leita, Olivier Thonnard, Hau-Van Pham, Engin Kirda:
Assessing Cybercrime Through the Eyes of the WOMBAT. 103-136
Part 4 / Part IV Enterprise Cyber Situational Awareness
- Sushil Jajodia
, Steven Noel:
Topological Vulnerability Analysis. 139-154 - Peng Liu, Xiaoqi Jia, Shengzhi Zhang
, Xi Xiong, Yoon-chan Jhi, Kun Bai, Jason H. Li:
Cross-Layer Damage Assessment for Cyber Situational Awareness. 155-176
Part 5 / Part V Microscopic Cyber Situational Awareness
- Matt Fredrikson, Mihai Christodorescu, Jonathon T. Giffin, Somesh Jha:
A Declarative Framework for Intrusion Analysis. 179-200 - Emre Can Sezer, Chongkyung Kil, Peng Ning:
Automated Software Vulnerability Analysis. 201-223
Part 6 / Part VI The Machine Learning Aspect
- Thomas G. Dietterich, Xinlong Bao, Victoria Keiser, Jianqiang Shen:
Machine Learning Methods for High Level Cyber Situation Awareness. 227-247
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.