暂无分享,去创建一个
Hooman Alavizadeh | Dong Seong Kim | Ian Welch | Harith Al-Sahaf | Seyit Ahmet Çamtepe | Simon Yusuf Enoch | Dong Seong Kim | Julian Jang | I. Welch | S. Çamtepe | Harith Al-Sahaf | Hooman Alavizadeh | S. Y. Enoch | Julian Jang
[1] Jin B. Hong,et al. Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud , 2021, Comput. Secur..
[2] Jingyue Li,et al. The AI-Based Cyber Threat Landscape , 2020, ACM Comput. Surv..
[3] Julian Jang,et al. Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud , 2020, 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom).
[4] Yajun Guo,et al. Nudging personalized password policies by understanding users' personality , 2020, Comput. Secur..
[5] Ting Zhu,et al. GENPass: A Multi-Source Deep Learning Model for Password Guessing , 2020, IEEE Transactions on Multimedia.
[6] Meng Jiang. Improving situational awareness with collective artificial intelligence over knowledge graphs , 2020 .
[7] Interpretable Probabilistic Password Strength Meters via Deep Learning , 2020, ESORICS.
[8] Weixin Xie,et al. Private Machine Learning Classification Based on Fully Homomorphic Encryption , 2020, IEEE Transactions on Emerging Topics in Computing.
[9] Yeqian Li. Research on Network Security Situation Awareness Strategy Based on Markov Game Model , 2020, CSIA.
[10] Florian Tramèr,et al. On Adaptive Attacks to Adversarial Example Defenses , 2020, NeurIPS.
[11] Julian Jang,et al. An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud , 2019, ICISC.
[12] Guang-qiu Huang,et al. Analysis framework of network security situational awareness and comparison of implementation methods , 2019, EURASIP Journal on Wireless Communications and Networking.
[13] Artificial intelligence and offensive cyber weapons , 2019 .
[14] Changzhen Hu,et al. An Improved Prediction Model for the Network Security Situation , 2019, SmartCom.
[15] Rajeev Agrawal,et al. Combining Tensor Decompositions and Graph Analytics to Provide Cyber Situational Awareness at HPC Scale , 2019, 2019 IEEE High Performance Extreme Computing Conference (HPEC).
[16] Jinying Xu,et al. DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence Theory , 2019, ICAIS.
[17] A. Felkner,et al. A Novel Approach to National-level Cyber Risk Assessment Based on Vulnerability Management and Threat Intelligence , 2019, Journal of Telecommunications and Information Technology.
[18] Giuseppe Santucci,et al. MAD: A visual analytics solution for Multi-step cyber Attacks Detection , 2019, J. Comput. Lang..
[19] Thomas Ristenpart,et al. Beyond Credential Stuffing: Password Similarity Models Using Neural Networks , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[20] Jianxin Li,et al. Modeling and clustering attacker activities in IoT through machine learning techniques , 2019, Inf. Sci..
[21] Elias Bou-Harb,et al. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security , 2019, IEEE Communications Surveys & Tutorials.
[22] Georgios Ioannou,et al. A Markov Multi-Phase Transferable Belief Model for Cyber Situational Awareness , 2019, IEEE Access.
[23] Chip-Hong Chang,et al. UDhashing: Physical Unclonable Function-Based User-Device Hash for Endpoint Authentication , 2019, IEEE Transactions on Industrial Electronics.
[24] Shuo Wang,et al. Research on Key Technologies of Network Security Situational Awareness for Attack Tracking Prediction , 2019 .
[25] Fernando Pérez-Cruz,et al. PassGAN: A Deep Learning Approach for Password Guessing , 2017, ACNS.
[26] Robert A. Bridges,et al. Situ: Identifying and Explaining Suspicious Behavior in Networks , 2019, IEEE Transactions on Visualization and Computer Graphics.
[27] Mohamed Elhoseny,et al. Deep Learning Framework for Cyber Threat Situational Awareness Based on Email and URL Data Analysis , 2019 .
[28] Dongmei Zhao,et al. Study on network security situation awareness based on particle swarm optimization algorithm , 2018, Comput. Ind. Eng..
[29] Khaled Salah,et al. A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).
[30] Jianhua Li,et al. Big Data Analysis-Based Security Situational Awareness for Smart Grid , 2018, IEEE Transactions on Big Data.
[31] Dongqin Feng,et al. Network Security Situation Awareness for Industrial Control System Under Integrity Attacks , 2018, 2018 21st International Conference on Information Fusion (FUSION).
[32] Fannv He,et al. SCPN-based Game Model for Security Situational Awareness in the Intenet of Things , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[33] Risto Vaarandi,et al. An unsupervised framework for detecting anomalous messages from syslog log files , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[34] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[35] Ning Cao,et al. Network Security Situation Awareness Framework based on Threat Intelligence , 2018 .
[36] Yi Yang,et al. Artificial Intelligence-Based Password Brute Force Attacks , 2018 .
[37] Prabaharan Poornachandran,et al. Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis , 2018 .
[38] Igor V. Kotenko,et al. AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection , 2018, Guide to Vulnerability Analysis for Computer Networks and Systems.
[39] Alejandro Correa Bahnsen,et al. DeepPhish : Simulating Malicious AI , 2018 .
[40] James Cannady,et al. Deep learning for prioritizing and responding to intrusion detection alerts , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).
[41] Ben Y. Zhao,et al. Automated Crowdturfing Attacks and Defenses in Online Review Systems , 2017, CCS.
[42] Hao Hu,et al. Quantitative Method for Network Security Situation Based on Attack Prediction , 2017, Secur. Commun. Networks.
[43] Yufen Li,et al. Survey of Network Security Situation Awareness , 2017, ICCSE 2017.
[44] Patricia Morreale,et al. Scalable Agentless Cloud Network Monitoring , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[45] Kelly M. T. Huffer,et al. Situational awareness of network system roles (SANSR) , 2017, CISRC.
[46] Steven McElwee,et al. Active learning intrusion detection using k-means clustering selection , 2017, SoutheastCon 2017.
[47] Giuseppe Ateniese,et al. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.
[48] Ying Tan,et al. Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN , 2017, DMBD.
[49] Marcus Pendleton,et al. A Survey on Systems Security Metrics , 2016, ACM Comput. Surv..
[50] Xiaoyan Sun,et al. Enterprise-Level Cyber Situation Awareness , 2017, Theory and Models for Cyber Situation Awareness.
[51] A. AdenusiDauda,et al. Development of Threats Detection Model for Cyber Situation Awareness , 2017 .
[52] John Yen,et al. Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis , 2017, Theory and Models for Cyber Situation Awareness.
[53] Nancy J. Cooke,et al. Impact of Team Collaboration on Cybersecurity Situational Awareness , 2017, Theory and Models for Cyber Situation Awareness.
[54] Sushil Jajodia,et al. Theory and Models for Cyber Situation Awareness , 2017, Lecture Notes in Computer Science.
[55] John Yen,et al. Computer-Aided Human Centric Cyber Situation Awareness , 2017, Theory and Models for Cyber Situation Awareness.
[56] Huaglory Tianfield. Cyber Security Situational Awareness , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[57] Satish Vadlamani,et al. Interdicting attack graphs to protect organizations from cyber attacks: A bi-level defender-attacker model , 2016, Comput. Oper. Res..
[58] Tang Guangming,et al. A network security situation assessment method based on attack intention perception , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[59] Mounir Ghogho,et al. Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[60] Teemu Kanstrén,et al. A Study on the State of Practice in Security Situational Awareness , 2016, 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).
[61] Stefan Schauer,et al. Threat awareness for critical infrastructures resilience , 2016, 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM).
[62] Naoki Hayashi,et al. Proposal and Evaluation of Cyber Defense System Using Blacklist Refined Based on Authentication Results , 2016, 2016 19th International Conference on Network-Based Information Systems (NBiS).
[63] Fan Zhang,et al. Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.
[64] Xin Yao,et al. A Survey on Evolutionary Computation Approaches to Feature Selection , 2016, IEEE Transactions on Evolutionary Computation.
[65] Akhilesh Tyagi,et al. Voice Based User-Device Physical Unclonable Functions for Mobile Device Authentication , 2016, 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[66] Florian Skopik,et al. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..
[67] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[68] Wang Xing-zhu. Network Information Security Situation Assessment Based on Bayesian Network , 2016 .
[69] Mansoor Alam,et al. A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.
[70] Yuan Liu,et al. Network security risk assessment method based on HMM and attack graph model , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[71] Howon Kim,et al. Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).
[72] Mourad Debbabi,et al. Darknet as a Source of Cyber Intelligence: Survey, Taxonomy, and Characterization , 2016, IEEE Communications Surveys & Tutorials.
[73] Ravishankar K. Iyer,et al. Game Theory with Learning for Cyber Security Monitoring , 2016, 2016 IEEE 17th International Symposium on High Assurance Systems Engineering (HASE).
[74] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[75] Ananthram Swami,et al. Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[76] Ulrik Franke,et al. Cyber Situational Awareness Testing , 2016 .
[77] Yong Wang,et al. A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder , 2016, Inf..
[78] Hou Di,et al. Network security situation evaluation method based on attack intention recognition , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).
[79] Giuseppe Santucci,et al. PERCIVAL: proactive and reactive attack and response assessment for cyber incidents using visual analytics , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).
[80] Diane Staheli,et al. Unlocking user-centered design methods for building cyber security visualizations , 2015, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec).
[81] Ouissem Ben Fredj. A realistic graph-based alert correlation system , 2015, Secur. Commun. Networks.
[82] M. E. Kabay,et al. Writing Secure Code , 2015 .
[83] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[84] David Slater,et al. Malicious Behavior Detection using Windows Audit Logs , 2015, AISec@CCS.
[85] Erik Blasch,et al. Review of game theory applications for situation awareness , 2015, Defense + Security Symposium.
[86] Fuchun Sun,et al. Data Fusion-based resilient control system under DoS attacks: A game theoretic approach , 2015 .
[87] Selvakumar Manickam,et al. Network Security Situation Prediction: A Review and Discussion , 2015, SOCO 2015.
[88] Florian Skopik,et al. Cyber situational awareness through network anomaly detection: state of the art and new approaches , 2015, e & i Elektrotechnik und Informationstechnik.
[89] Giovanni Felici,et al. Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers , 2013, Int. J. Secur. Networks.
[90] Tanja Zseby,et al. Analysis of network traffic features for anomaly detection , 2014, Machine Learning.
[91] Daniel A. Keim,et al. NStreamAware: real-time visual analytics for data streams to enhance situational awareness , 2014, VizSec '14.
[92] Ulrik Franke,et al. Cyber situational awareness - A systematic review of the literature , 2014, Comput. Secur..
[93] Graeme G. Shanks,et al. A situation awareness model for information security risk management , 2014, Comput. Secur..
[94] Dong Yu,et al. Deep Learning: Methods and Applications , 2014, Found. Trends Signal Process..
[95] Mohammad S. Obaidat,et al. Honeypots deployment for the analysis and visualization of malware activity and malicious connections , 2014, 2014 IEEE International Conference on Communications (ICC).
[96] Ankit D. Patel,et al. Dynamic & hybrid honeypot model for scalable network monitoring , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[97] Moises Sudit,et al. Attack Projection , 2014, Cyber Defense and Situational Awareness.
[98] Krunal Panchal,et al. Survey of Adaptive Resonance Theory Techniques in IDS , 2014 .
[99] Shuyuan Jin,et al. Predicting Network Security Situation Based on a Combination Model of Multiple Neural Networks , 2014, Int. J. Softw. Informatics.
[100] Christopher G. Healey,et al. Visualizations and Analysts , 2014, Cyber Defense and Situational Awareness.
[101] Matthew C. Elder,et al. NICE: Network Introspection by Collaborating Endpoints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[102] B. S. Manjunath,et al. SigMal: a static signal processing based malware triage , 2013, ACSAC.
[103] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[104] Joon S. Park,et al. Game theoretic attack analysis in Online Social Network (OSN) services , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[105] Andrew Walenstein,et al. VILO: a rapid learning nearest-neighbor classifier for malware triage , 2013, Journal of Computer Virology and Hacking Techniques.
[106] Zhanghui Liu,et al. Situation element extraction of network security based on Logistic Regression and Improved Particle Swarm Optimization , 2013, 2013 Ninth International Conference on Natural Computation (ICNC).
[107] Glenn A. Fink,et al. Gamification for Measuring Cyber Security Situational Awareness , 2013, HCI.
[108] Simon N. Foley,et al. MASON: Mobile autonomic security for network access controls , 2013, J. Inf. Secur. Appl..
[109] Xin Liu,et al. The network security situation predicting technology based on the small-world echo state network , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.
[110] Genshe Chen,et al. On detection and visualization techniques for cyber security situation awareness , 2013, Defense, Security, and Sensing.
[111] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.
[112] Chunlei Yang,et al. A Strategy of Network Security Situation Autonomic Awareness , 2012 .
[113] John R. Goodall,et al. situ: Situational understanding and discovery for cyber attacks , 2012, IEEE VAST.
[114] Jeffrey M. Bradshaw,et al. Human-Agent Teamwork in Cyber Operations: Supporting Co-evolution of Tasks and Artifacts with Luna , 2012, MATES.
[115] Mengjie Zhang,et al. A Filter Approach to Multiple Feature Construction for Symbolic Learning Classifiers Using Genetic Programming , 2012, IEEE Transactions on Evolutionary Computation.
[116] Xiang Cui,et al. Network Security Situation Prediction Based on BP and RBF Neural Network , 2012, ISCTCS.
[117] Jeffrey M. Bradshaw,et al. Sol: An Agent-Based Framework for Cyber Situation Awareness , 2012, KI - Künstliche Intelligenz.
[118] Enrico Bertini,et al. StreamSqueeze: a dynamic stream visualization for monitoring of event data , 2012, Visualization and Data Analysis.
[119] Yongzheng Zhang,et al. CNSSA: A Comprehensive Network Security Situation Awareness System , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[120] David Brumley,et al. BitShred: feature hashing malware for scalable triage and semantic analysis , 2011, CCS '11.
[121] B. S. Manjunath,et al. Malware images: visualization and automatic classification , 2011, VizSec '11.
[122] Mikel Izal,et al. Botnet detection based on DNS records and active probing , 2011, Proceedings of the International Conference on Security and Cryptography.
[123] Gabriel Ghinita,et al. The optimization of situational awareness for insider threat detection , 2011, CODASPY '11.
[124] Xin Wang,et al. Security Situation Prediction Based on Dynamic BP Neural with Covariance , 2011 .
[125] Heba F. Eid,et al. Hybrid Intelligent Intrusion Detection Scheme , 2011 .
[126] Zhang Hong. Network Security Situation Prediction Model Based on HHGA-RBF Neural Network , 2011 .
[127] Tan Xiao. Network Security Situation Awareness Approach Based on Markov Game Model , 2011 .
[128] Qing Song,et al. Survey on Network Security Situation Awareness , 2011 .
[129] Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target , 2011 .
[130] Vinod Yegneswaran,et al. Employing Honeynets For Network Situational Awareness , 2010, Cyber Situational Awareness.
[131] Niki Pissinou,et al. Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring , 2010, International Performance Computing and Communications Conference.
[132] John Yen,et al. Cyber SA: Situational Awareness for Cyber Defense , 2010, Cyber Situational Awareness.
[133] Qiang Yang,et al. A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.
[134] Adam Wynne,et al. Real-time visualization of network behaviors for situational awareness , 2010, VizSec '10.
[135] Wang Huiqiang,et al. Dynamic awareness of network security situation based on stochastic game theory , 2010, The 2nd International Conference on Software Engineering and Data Mining.
[136] Xiaoqi Jia,et al. Cross-Layer Damage Assessment for Cyber Situational Awareness , 2010, Cyber Situational Awareness.
[137] John Yen,et al. RPD-based Hypothesis Reasoning for Cyber Situation Awareness , 2010, Cyber Situational Awareness.
[138] Thomas G. Dietterich,et al. Machine Learning Methods for High Level Cyber Situation Awareness , 2010, Cyber Situational Awareness.
[139] John Langford,et al. Hash Kernels for Structured Data , 2009, J. Mach. Learn. Res..
[140] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[141] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[142] Grant Vandenberghe. Network Traffic Exploration Application: A Tool to Assess, Visualize, and Analyze Network Security Events , 2008, VizSEC.
[143] Richard Lippmann,et al. GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool , 2008, VizSEC.
[144] Marc Dacier,et al. A framework for attack patterns' discovery in honeynet data , 2008 .
[145] Yoshua Bengio,et al. Classification using discriminative restricted Boltzmann machines , 2008, ICML '08.
[146] Guolong Chen,et al. PSO-BPNN-Based Prediction of Network Security Situation , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[147] Ying Liang,et al. Stochastic Game Theoretic Method of Quantification for Network Situational Awareness , 2008, 2008 International Conference on Internet Computing in Science and Engineering.
[148] Yan Chen,et al. Honeynet-based Botnet Scan Traffic Analysis , 2008, Botnet Detection.
[149] Ying Liang,et al. Quantification of Network Security Situational Awareness Based on Evolutionary Neural Network , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[150] Colin R. Reeves,et al. Evolutionary computation: a unified approach , 2007, Genetic Programming and Evolvable Machines.
[151] Toby Segaran,et al. Programming Collective Intelligence , 2007 .
[152] Erik Blasch,et al. A Markov game theoretic data fusion approach for cyber situational awareness , 2007, SPIE Defense + Commercial Sensing.
[153] Richard Lippmann,et al. An Interactive Attack Graph Cascade and Reachability Display , 2007, VizSEC.
[154] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .
[155] H. Abdi,et al. Multiple Correspondence Analysis , 2006 .
[156] William Yurcik,et al. The design of VisFlowConnect-IP: a link analysis system for IP security situational awareness , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).
[157] Malcolm I. Heywood,et al. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 , 2005, PST.
[158] R. Vaarandi. Tools and Techniques for Event Log Analysis , 2005 .
[159] Karen Spärck Jones. A statistical interpretation of term specificity and its application in retrieval , 2021, J. Documentation.
[160] William Yurcik,et al. NVisionIP: netflow visualizations of system state for security situational awareness , 2004, VizSEC/DMSEC '04.
[161] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[162] Peter Dayan,et al. Q-learning , 1992, Machine Learning.
[163] Andrew H. Sung,et al. Intrusion detection using neural networks and support vector machines , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[164] Fabio A. González,et al. An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..
[165] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[166] Thorsten Joachims,et al. Transductive Inference for Text Classification using Support Vector Machines , 1999, ICML.
[167] Russell C. Eberhart,et al. A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.
[168] Mica R. Endsley,et al. Measurement of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[169] Kurt Hornik,et al. Multilayer feedforward networks are universal approximators , 1989, Neural Networks.
[170] Mica R. Endsley,et al. Design and Evaluation for Situation Awareness Enhancement , 1988 .