D. Kudithipudi, Cory E. Merkel, Michael Soltiz, G. Rose, R. Pino
{"title":"Design of Neuromorphic Architectures with Memristors","authors":"D. Kudithipudi, Cory E. Merkel, Michael Soltiz, G. Rose, R. Pino","doi":"10.1007/978-1-4614-7597-2_6","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_6","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"95 ( Pt 4) 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Applied to Cyber Operations","authors":"Misty K. Blowers, Jonathan Williams","doi":"10.1007/978-1-4614-7597-2_10","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_10","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massimiliano Albanese, R. Erbacher, S. Jajodia, Cristian Molinaro, Fabio Persia, A. Picariello, Giancarlo Sperlí, V. S. Subrahmanian
{"title":"Recognizing Unexplained Behavior in Network Traffic","authors":"Massimiliano Albanese, R. Erbacher, S. Jajodia, Cristian Molinaro, Fabio Persia, A. Picariello, Giancarlo Sperlí, V. S. Subrahmanian","doi":"10.1007/978-1-4614-7597-2_3","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_3","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alert Data Aggregation and Transmission Prioritization over Mobile Networks","authors":"H. Çam, Pierre Mouallem, Robinson E. Pino","doi":"10.1007/978-1-4614-7597-2_13","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_13","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"IM-34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126636255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems","authors":"Richard E. Harang","doi":"10.1007/978-1-4614-7597-2_2","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_2","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Fundamental Science of Cyber Security","authors":"A. Kott","doi":"10.1007/978-1-4614-7597-2_1","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_1","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Accelerated Mining of Domain Knowledge","authors":"Tanvir Atahary, Scott Douglass, T. Taha","doi":"10.1007/978-1-4614-7597-2_16","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_16","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael J. Shevenell, J. Shumaker, A. Edwards, R. Pino
{"title":"Memristors and the Future of Cyber Security Hardware","authors":"Michael J. Shevenell, J. Shumaker, A. Edwards, R. Pino","doi":"10.1007/978-1-4614-7597-2_17","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_17","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123737510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concurrent Learning Algorithm and the Importance Map","authors":"M. R. McLean","doi":"10.1007/978-1-4614-7597-2_15","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2_15","url":null,"abstract":"","PeriodicalId":172380,"journal":{"name":"Network Science and Cybersecurity","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131031059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}