On building cybersecurity expertise in critical infrastructure protection (English)
- New search for: Mishra, Sumita
- New search for: Raj, Rajendra K.
- New search for: Romanowski, Carol J.
- New search for: Schneider, Jennifer
- New search for: Critelli, Anthony
- New search for: Mishra, Sumita
- New search for: Raj, Rajendra K.
- New search for: Romanowski, Carol J.
- New search for: Schneider, Jennifer
- New search for: Critelli, Anthony
- Conference paper / Electronic Resource
-
Title:On building cybersecurity expertise in critical infrastructure protection
-
Contributors:Mishra, Sumita ( author ) / Raj, Rajendra K. ( author ) / Romanowski, Carol J. ( author ) / Schneider, Jennifer ( author ) / Critelli, Anthony ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2015-04-01
-
Size:888062 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Title page| 2015
- 1
-
Copyright page| 2015
- 1
-
Scenario-based design for a cloud forensics portalJackson, Curtis / Agrawal, Rajeev / Walker, Jessie / Grosky, William et al. | 2015
- 1
-
Real-time prediction of gas contaminant concentration from a ground intruder using a UAVGatsonis, Nikolaos A. / Demetriou, Michael A. / Egorova, Tatiana et al. | 2015
- 1
-
Scalable framework for emergency response Decision Support SystemsSati, Shalini et al. | 2015
- 1
-
Computing on Masked Data to improve the security of big dataGadepally, Vijay / Hancock, Braden / Kaiser, Benjamin / Kepner, Jeremy / Michaleas, Pete / Varia, Mayank / Yerukhimovich, Arkady et al. | 2015
- 1
-
Analysis of the effect of using non-composite multi-channel raw color images on face recognition accuracy with arbitrary large off-the-plane rotationsVoynichka, Iliana V. / Megherbi, Dalila B. et al. | 2015
- 1
-
An investigation on touch biometrics: Behavioral factors on screen size, physical context and application contextTao Feng, / Xi Zhao, / DeSalvo, Nick / Tzu-Hua Liu, / Zhimin Gao, / Xi Wang, / Weidong Shi, et al. | 2015
- 1
-
Standoff detection of thermal and fast neutronsHutcheson, Anthony L. / Phlips, Bernard F. / Wulf, Eric A. / Mitchell, Lee J. / Woolf, Richard S. et al. | 2015
- 1
-
Protecting privacy, civil rights and civil liberties using data labeling and segmentationSchmoyer, Timothy R. / Doyle, Bill / Dufel, Michael / Higa-Smith, Karyn et al. | 2015
- 1
-
Rank-based score normalization for multi-biometric score fusionMoutafis, Panagiotis / Kakadiaris, Ioannis A. et al. | 2015
- 1
-
Acoustic system for Low Flying Aircraft detectionSalloum, Hady / Sedunov, Alexander / Sedunov, Nikolay / Sutin, Alexander / Masters, David et al. | 2015
- 1
-
Automated failure detection and attribution in virtual environmentsGuttman, Rotem D. / Hammerstein, Joshua A. / Mattson, Jeffrey A. / Schlackman, Andrew L. et al. | 2015
- 1
-
Scalable malware forensics using phylogenetic analysisJilcott, Steven et al. | 2015
- 1
-
A new X-ray backscatter technology for aviation security applicationsKolkoori, Sanjeevareddy / Wrobel, Norma / Ewert, Uwe et al. | 2015
- 1
-
Node attributes and edge structure for large-scale big data network analytics and community detectionChopade, Pravin / Zhan, Justin / Bikdash, Marwan et al. | 2015
- 1
-
Safety in view: A public safety visual analytics tool based on CCTV camera angles of viewHanye Xu, / Tay, James / Malik, Abish / Afzal, Shehzad / Ebert, David S. et al. | 2015
- 1
-
AESOP: Adaptive Event detection SOftware using Programming by exampleThangali, Ashwin / Prasad, Harsha / Kethamakka, Sai / Demirdjian, David / Checka, Neal et al. | 2015
- 1
-
Interactive visual analytic tools for forensic analysis of mass casualty incidents using DIORAMA systemGanz, Aura / Schafer, James / Tang, Jingyan / Yang, Zhuorui / Yi, Jun / Ciottone, Gregory et al. | 2015
- 1
-
Gamma-ray and fast neutron imager with thermal neutron detection capability for detecting shielded and bare nuclear materialsEnqvist, Andreas / Veige, Adam / Walker, James K. / Farley, Richard / Noh, Young et al. | 2015
- 1
-
Big RF for homeland security applicationsNeel, James / Baban, Shaswar / Mellen, Neal / Akbar, Ihsan / Sheehe, Charles / Schutz, Bob / Cook, Peter et al. | 2015
- 1
-
BotTalker: Generating encrypted, customizable C&C tracesZhang, Han / Papadopoulos, Christos et al. | 2015
- 1
-
Robust face recognition-based search and retrieval across image stills and videoBrady, Kevin et al. | 2015
- 1
-
A Cyber Mission Impact assessment toolMusman, Scott / Temin, Aaron et al. | 2015
- 1
-
Power systems for remote sensors on the northern borderSimpson, Lin J. / Kandt, Alicen et al. | 2015
- 1
-
Identifying firsthand accounts of emergencies from social mediaOverbey, Lucas A. / Williams, Bryan / Batson, Scott C. / Williams, LaKeisha / Greco, Benjamin / Bartynski, Seth / Gonzalez, Ana Carmen et al. | 2015
- 1
-
Iris matching algorithm on many-core platformsLiu, Chen / Petroski, Benjamin / Cordone, Guthrie / Torres, Gildo / Schuckers, Stephanie et al. | 2015
- 1
-
Security after login: Identity change detection on smartphones using sensor fusionFeng, Tao / Zhao, Xi / DeSalvo, Nick / Gao, Zhimin / Wang, Xi / Shi, Weidong et al. | 2015
- 1
-
Geolocation analysis using Maxent and plant sample dataChristou, C.T. / Jacyna, G.M. / Goodman, F.J. / Deanto, D. G. / Masters, D. et al. | 2015
- 1
-
To be or not to be IID: Can Zipf's Law help?Behe, Leo / Wheeler, Zachary / Nelson, Christie / Knopp, Brian / Pottenger, William M. et al. | 2015
- 1
-
Cybersecurity risks of RFID for mines and unexploded ordnanceAxelrod, C. Warren et al. | 2015
- 1
-
40nW subthreshold event detector chip for seismic sensorsAntao, Uldric / Choma, John / Dibazar, Alireza / Berger, Theodore et al. | 2015
- 1
-
Encrypted targetable Digital Television datacastDesourdis, Robert I. / O'Brien, Mark et al. | 2015
- 1
-
The rise of unaccompanied alien children: Assessing the performance of a transition center with queuing theoryRubio-Herrero, Javier et al. | 2015
- 1
-
Situation awareness requirements for a critical infrastructure monitoring operatorRummukainen, Lauri / Oksama, Lauri / Timonen, Jussi / Vankka, Jouko et al. | 2015
- 1
-
Static analysis for web service security - Tools & techniques for a secure development life cycleMasood, Adnan / Java, Jim et al. | 2015
- 1
-
Quality assessment of color images affected by transmission error, quantization noise, and noneccentricity pattern noiseSamani, Arash / Panetta, Karen / Agaian, Sos et al. | 2015
- 1
-
Assessing strategies for controlling viral rumor propagation on social media - a simulation approachSathanur, Arun V / Sui, Miao / Jandhyala, Vikram et al. | 2015
- 1
-
Context-based models to overcome operational challenges in maritime securityAyala, Diego Fernando Martinez / Sidoti, David / Mishra, Manisha / Han, Xu / Pattipati, Krishna et al. | 2015
- 1
-
Multi scale multi directional shear operator for personal recognition using Conjunctival vasculatureTankasala, Sriram Pavan / Doynov, Plamen et al. | 2015
- 1
-
Applied Vulnerability Detection SystemSmith, Jeffrey / Krikeles, Basil / Wittenberg, David K. / Taveniku, Mikael et al. | 2015
- 1
-
Standoff human identification using body shapeMatzner, Shari / Heredia-Langner, Alejandro / Amidan, Brett / Boettcher, Evelyn J. / Lochtefeld, Darrell / Webb, Timothy et al. | 2015
- 1
-
Study on detector geometry for active non-destructive inspection system of SNMs by nuclear resonance fluorescenceNegm, Hani Hussein / Ohgaki, Hideaki / Daito, Izuru / Hori, Toshitada / Kii, Toshiteru / Zen, Heishun / Hajima, Ryoichi / Hayakawa, Takehito / Shizuma, Toshiyuki / Fujimoto, Shinya et al. | 2015
- 1
-
High energy X-ray imaging technology for the detection of dangerous materials in air freight containersKolkoori, Sanjeevareddy / Wrobel, Norma / Hohendorf, Stefan / Ewert, Uwe et al. | 2015
- 1
-
Streaming data analytics for anomalies in graphsEberle, William / Holder, Lawrence et al. | 2015
- 1
-
On modeling the emergency management process: Conceptualizing disaster planning and recoveryTanner, April L. / Pendleton, Antranella / Robinson, Devonte / Wicks, Lacey et al. | 2015
- 1
-
A SOUND approach to security in mobile and cloud-oriented environmentsFigueroa, Michael / Uttecht, Karen / Rosenberg, Jothy et al. | 2015
- 1
-
Code Pulse: Real-time code coverage for penetration testing activitiesRadwan, Hassan / Prole, Kenneth et al. | 2015
- 1
-
Using real-time chemical plume models in virtual training systemsMoses, Adam / Obenschain, Keith / Boris, Jay / Patnaik, Gopal et al. | 2015
- 1
-
Global Pattern Search at ScaleCrouser, R. Jordan / Schmidt, Matthew C. / Kelley, Stephen / Miller, Benjamin / Hook, Daniel / Edwards, Lauren / Milosavljevic, Maja / Michel, Elizabeth / Ferme, Elizabeth / Carrington, Robert et al. | 2015
- 1
-
A proven method for identifying security gaps in international postal and transportation critical infrastructureAllen, Julia H. / Curtis, Pamela D. / Mehravari, Nader / Crabb, Gregory et al. | 2015
- 1
-
The states of dilation in iris recognition (a preliminary study)Clark, A. D. / Gejji, R. S. / Ridley, A. D. / Ross, A. A. et al. | 2015
- 1
-
Joint ship classification and learningEstabridis, Katia et al. | 2015
- 1
-
Speeding power restorationMoran, Thomas / Molnar, John J. / Desourdis, Robert I. / Kurgan, Walter M. / Cloutier, Jean-Francois et al. | 2015
- 1
-
High event rate, pulse shape discrimination algorithm for CLYCJohnson, Erik B. / Whitney, Chad / Vogel, Sam / Christian, James F. / Holbert, Keith / Chandhran, Premkumar et al. | 2015
- 1
-
Quantifying the impact of data loss incidents on publicly-traded organizationsHsieh, Tien-Shih / Noyes, Daniel / Liu, Hong / Fiondella, Lance et al. | 2015
- 1
-
An efficient multi-stage hyper-spectral aerial image registration technique in the presence of differential spatial and temporal sensor uncertainty with application to large critical infrastructures & key resources (CIKR) surveillanceVakil, Mohammad I. / Megherbi, Dalila B. / Malas, John A. et al. | 2015
- 1
-
Evaluating and improving cybersecurity capabilities of the energy critical infrastructureCurtis, Pamela D. / Mehravari, Nader et al. | 2015
- 1
-
License plate reader, data acquisition and analysisRawat, Pramud et al. | 2015
- 1
-
An RFID-based technology for electronic component and system Counterfeit detection and TraceabilityYang, Kun / Forte, Domenic / Tehranipoor, Mark et al. | 2015
- 1
-
On the uniqueness of fingerprints via mining of statistically rare featuresMunagani, Indira / Hsiao, Michael S. / Abbott, A. Lynn et al. | 2015
- 1
-
Analyzing real time terrorism dataToure, Ibrahim / Gangopadhyay, Aryya et al. | 2015
- 1
-
Applying a space-based security recovery scheme for critical homeland security cyberinfrastructure utilizing the NASA Tracking and Data Relay (TDRS) based Space NetworkShaw, Harry C. / McLaughlin, Brian / Stocklin, Frank / Fortin, Andre / Israel, David / Dissanayake, Asoka / Gilliand, Denise / LaFontaine, Richard / Broomandan, Richard / Hyunh, Nancy et al. | 2015
- 1
-
Person re-identification using geometry constrained human trajectory modelingMantini, Pranav / Shah, Shishir K. et al. | 2015
- 1
-
Experimental designs for testing metal detectors at a large sports stadiumNelson, Christie / Kantor, Paul / Nakamura, Brian / Ricks, Brian / Whytlaw, Ryan / Egan, Dennis / Matlin, Alisa / Roberts, Fred / Tobia, Michael / Young, Michael et al. | 2015
- 1
-
Quantitative evaluation of moving target technologyDonovan, Paula J. / McLamb, Jeffrey W. / Okhravi, Hamed / Riordan, James / Wright, Charles V. et al. | 2015
- 1
-
Sherlock's Toolkit: A forensic DNA analysis systemRicke, D. / Shcherbina, A. / Chiu, N. / Schwoebel, E. / Harper, J. / Petrovick, M. / Boettcher, T. / Zook, C. / Bobrow, J. / Wack, E. et al. | 2015
- 1
-
Mitigating the impact of transportation network disruptions on evacuationBasavaraj, Veeresh / Noyes, Daniel / Fiondella, Lance / Lownes, Nicholas et al. | 2015
- 1
-
Big data biology-based predictive models Via DNA-metagenomics binning for WMD events applicationsSaghir, Helal / Megherbi, Dalila B. et al. | 2015
- 1
-
Understanding the subject-specific effects of pupil dilation on iris recognition in the NIR spectrumGejji, R. S. / Clark, A. D. / Crihalmeanu, S. / Rossy, A. A. et al. | 2015
- 1
-
Comparing and combining underfoot pressure features for shod and unshod gait biometricsConnor, Patrick C. et al. | 2015
- 1
-
Modelling and real-time analysis of critical infrastructure using discrete event systems on graphsPuuska, Samir / Kansanen, Kasper / Rummukainen, Lauri / Vankka, Jouko et al. | 2015
- 1
-
Genetic Algorithm for hardware Trojan detection with ring oscillator network (RON)Karimian, Nima / Tehranipoor, Fatemeh / Rahman, Md. Tauhidur / Kelly, Shane / Forte, Domenic et al. | 2015
- 1
-
On building cybersecurity expertise in critical infrastructure protectionMishra, Sumita / Raj, Rajendra K. / Romanowski, Carol J. / Schneider, Jennifer / Critelli, Anthony et al. | 2015
- 1
-
PIGLT: A Pollen Identification and Geolocation system for forensic applicationsGoodman, F.J. / Doughty, J.W. / Gary, C. / Christou, C.T. / Hu, B.B. / Hultman, E.A. / Deanto, D.G. / Masters, D. et al. | 2015
- 1
-
3D printed rapid disaster responseKai-Dee Chu, / Lacaze, Alberto / Murphy, Karl / Mottern, Edward / Corley, Katrina / Frelk, James et al. | 2015
- 1
-
Rapid sequence identification of potential pathogens using techniques from sparse linear algebraDodson, Stephanie / Ricke, Darrell O. / Kepner, Jeremy / Chiu, Nelson / Shcherbina, Anna et al. | 2015
- 1
-
Predicting cybersecurity using quality dataWoody, Carol / Ellison, Robert / Nichols, William et al. | 2015
- 1
-
Measurement of locality specific resilienceSchneider, Jennifer / Romanowski, Carol / Raj, Rajendra K. / Mishra, Sumita / Stein, Kent et al. | 2015
- 1
-
Perimeter security intruder tracking and classification using an array of low cost ultra-wideband (UWB) radarsMahler, Henry / Flynn, Brian et al. | 2015
- 1
-
Quantifying mixed uncertainties in cyber attacker payoffsChatterjee, Samrat / Halappanavar, Mahantesh / Tipireddy, Ramakrishna / Oster, Matthew / Saha, Sudip et al. | 2015
- 1
-
Securing applications with DyninstReffett, Chris / Fleck, Dan et al. | 2015
- 1
-
Study of authentication with IoT testbedCrossman, Matthew A. / Hong Liu, et al. | 2015
- 1
-
Securing the supply chain for commodity IT devices by automated scenario generationJilcott, Steven et al. | 2015