Cyber Warfare
暂无分享,去创建一个
Sushil Jajodia | Paulo Shakarian | Vipin Swarup | Cliff Wang | George Mason | S. Jajodia | P. Shakarian | Cliff X. Wang | G. Mason | Vipin Swarup
[1] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .
[2] Paul E. Johnson,et al. Detecting deception: adversarial problem solving in a low base-rate world , 2001, Cogn. Sci..
[3] Rafal Rohozinski,et al. Stuxnet and the Future of Cyber War , 2011 .
[4] J. G. Hollands,et al. Engineering Psychology and Human Performance , 1984 .
[5] Jeffrey K. Bassett,et al. An Agent-Based Model of Conflict in East Africa And the Effect of Watering Holes , 2010 .
[6] Nancy J. Cooke,et al. Effects of Teamwork versus Group Work on Signal Detection in Cyber Defense Teams , 2013, HCI.
[7] E. Adelson. Lightness Perception and Lightness Illusions , 1999 .
[8] Uffe Kock Wiil,et al. Notice of Violation of IEEE Publication PrinciplesDetecting New Trends in Terrorist Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.
[9] Richard Rothenberg,et al. From Whole Cloth : Making up the terrorist network , 2002 .
[10] Hamid M Salim,et al. Cyber safety : a systems thinking and systems theory approach to managing cyber security risks , 2014 .
[11] Barton Whaley. Toward a general theory of deception , 1982 .
[12] Phillip Gowlett,et al. Moving Forward with Computational Red Teaming , 2011 .
[13] Ralph Langner. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[14] John Wylie Lloyd,et al. Foundations of Logic Programming , 1987, Symbolic Computation.
[15] Wei Xu,et al. Toward worm detection in online social networks , 2010, ACSAC '10.
[16] Igor Kotenko. AGENT-BASED MODELING AND SIMULATION OF CYBERWARFARE BETWEEN MALEFACTORS AND SECURITY AGENTS IN INTERNET , 2005 .
[17] Cleotilde Gonzalez,et al. Instance‐based Learning: A General Model of Repeated Binary Choice , 2012 .
[18] Allan R. Millett,et al. Military Innovation in the Interwar Period , 1999 .
[19] Joseph T. Coyne,et al. Robust Intelligence (RI) under uncertainty: Mathematical and conceptual foundations of autonomous hybrid (human-machine-robot) teams, organizations and systems , 2013 .
[20] I. Kotenko,et al. Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[21] Varvara Mitliaga,et al. Networks and Netwars - The Future of Terror, Crime, and Militancy , 2002, Int. J. Law Inf. Technol..
[22] Samuel B. Griffith. The Chinese People's Liberation Army , 1968 .
[23] Neil C. Rowe. Counterplanning deceptions to foil cyber-attack plans , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[24] Michael K. Martin,et al. Instance-Based Decision Making Model of Repeated Binary Choice , 2007 .
[25] Eduardo B. Andrade,et al. The Curious Case of Behavioral Backlash: Why Brands Produce Priming Effects and Slogans Produce Reverse Priming Effects , 2011 .
[26] David Liben-Nowell,et al. The link-prediction problem for social networks , 2007 .
[27] Richard W. Bloom,et al. Foundations of Psychological Profiling: Terrorism, Espionage, and Deception , 2013 .
[28] Marc Sageman,et al. Understanding terror networks. , 2004, International journal of emergency mental health.
[29] Sushil Jajodia,et al. Cyber Situational Awareness - Issues and Research , 2009, Cyber Situational Awareness.
[30] Robyn M. Dawes,et al. Everyday Irrationality: How Pseudo- Scientists, Lunatics, And The Rest Of Us Systematically Fail To Think Rationally , 2001 .
[31] Ion Juvina,et al. The Effects of Individual and Context on Aggression in Repeated Social Interaction , 2011, HCI.
[32] C. Lebiere,et al. Instance-Based Cognitive Models of Decision-Making , 2005 .
[33] Lucas Kello. The Meaning of the Cyber Revolution: Perils to Theory and Statecraft , 2013, International Security.
[34] N.C. Rowe,et al. A model of deception during cyber-attacks on information systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[35] Cleotilde Gonzalez,et al. Balancing Fairness and Efficiency in Repeated Societal Interaction , 2013, CogSci.
[36] D McMorrow,et al. Science of Cyber-Security , 2010 .
[37] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[38] Jure Leskovec,et al. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks , 2011, SDM.
[39] Hossein Saidi,et al. Malware propagation in Online Social Networks , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[40] David T. Lykken,et al. Detecting deception , 1997, Behavioral and Brain Sciences.
[41] R. Hertwig,et al. The role of information sampling in risky choice , 2006 .
[42] E. J. Epstein,et al. Deception: The Invisible War Between the KGB and the CIA , 1989 .
[43] Harold H. Kelley,et al. Lewin, Situations, and Interdependence , 1991 .
[44] Jon R. Lindsay,et al. Stuxnet and the Limits of Cyber Warfare , 2013 .
[45] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[46] Abu Bakr Naji,et al. The Management of Savagery: The Most Critical Stage Through Which the Umma Will Pass , 2004 .
[47] Marc Dacier,et al. Assessing Cybercrime Through the Eyes of the WOMBAT , 2010, Cyber Situational Awareness.
[48] S. Kaplan,et al. On The Quantitative Definition of Risk , 1981 .
[49] Jacob Goldberger,et al. Unifying Unknown Nodes in the Internet Graph Using Semisupervised Spectral Clustering , 2008, 2008 IEEE International Conference on Data Mining Workshops.
[50] Barton Whaley. Detecting Deception: A Bibliography of Counterdeception across Time, Cultures, and Disciplines; Second Edition , 2006 .
[51] Stephen J. Ressler. Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research , 2006 .
[52] Kristan J. Wheaton. Teaching Strategic Intelligence Through Games , 2011 .
[53] Kim Hartmann,et al. The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[54] Charles V. Wright,et al. Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security , 2010, RAID.
[55] Frank J. Stech,et al. Active cyber defense with denial and deception: A cyber-wargame experiment , 2013, Comput. Secur..
[56] D. Alberts,et al. DoD Command and Control Research Program , 1998 .
[57] Evan Mawdsley,et al. A war to be won: fighting the Second World War , 2004 .
[58] U. Netlogo Wilensky,et al. Center for Connected Learning and Computer-Based Modeling , 1999 .
[59] S. Borgatti,et al. The centrality of groups and classes , 1999 .
[60] S. Macdonald. Propaganda and Information Warfare in the Twenty-First Century: Altered Images and Deception Operations , 2006 .
[61] Jeffrey M. Bradshaw,et al. Human Dimension in Cyber Operations Research and Development Priorities , 2013, HCI.
[62] Fred S. Feer,et al. Thinking-Red-in-Wargaming Workshop: Opportunities for Deception and Counterdeception in the Red Planning Process , 1989 .
[63] Myriam Abramson. Learning Temporal User Profiles of Web Browsing Behavior , 2014 .
[64] Cleotilde Gonzalez,et al. Modeling Strategic Dynamics Under Alternative Information Conditions , 2013 .
[65] D. Kahneman. Thinking, Fast and Slow , 2011 .
[66] H. Kelley,et al. The social psychology of groups , 1960 .
[67] W. Lowrance,et al. Of Acceptable Risk: Science and the Determination of Safety , 1976 .
[68] Scott Gerwehr,et al. Unweaving the Web: Deception and Adaptation in Future Urban Operations , 2003 .
[69] Rami Puzis,et al. TONIC: Target Oriented Network Intelligence Collection for the Social Web , 2013, AAAI.
[70] Guillermo Ricardo Simari,et al. Computing Generalized Specificity , 2003, J. Appl. Non Class. Logics.
[71] Robert F. Minehart. Information Warfare: The Organizational Dimension. , 1996 .
[72] Stephen J. Heuser. Operational Deception and Counter Deception. , 1996 .
[73] Barton Whaley,et al. Detecting deception: Practice, practitioners, and theory , 2000 .
[74] Bradford S. Bell,et al. Team Learning: A Theoretical Integration and Review , 2012 .
[75] Robert W. Proctor,et al. An Instance-Based Learning Model of Stimulus-Response Compatibility Effects in Mixed Location-Relevant and Location-Irrelevant Tasks , 2009 .
[76] Paulo Shakarian,et al. Annotated probabilistic temporal logic , 2011, TOCL.
[77] J. Haines,et al. Achieving Cyber Survivability in a Contested Environment Using a Cyber Moving Target , 2011 .
[78] M. Lewis. Flash Boys: A Wall Street Revolt , 2014 .
[79] Alice F. Healy,et al. A cognitive modeling account of simultaneous learning and fatigue effects , 2011, Cognitive Systems Research.
[80] D. M. Clarke. The human contribution: unsafe acts, accidents and heroic recoveries , 2011 .
[81] Jeffrey Pfeffer,et al. Special Issue: Frontiers of Organization Science, Part 1 of 2: Building Organization Theory from First Principles: The Self-Enhancement Motive and Understanding Power and Influence , 2005, Organ. Sci..
[82] J. March. Learning to be risk averse. , 1996 .
[83] Alexander Kott,et al. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions , 2010 .
[84] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[85] Philip A. McNair,et al. Counterdeception and the Operational Commander. , 1997 .
[86] Ralph Hertwig,et al. What impacts the impact of rare events , 2008 .
[87] Huan Liu,et al. Near real time assessment of social media using geo-temporal network analytics , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[88] V. S. Subrahmanian,et al. Focused most probable world computations in probabilistic logic programs , 2012, Annals of Mathematics and Artificial Intelligence.
[89] R. V. Jones. Enduring principles Some Lessons in Intelligence , .
[90] Anita Williams Woolley,et al. Playing Offense vs. Defense: The Effects of Team Strategic Orientation on Team Process in Competitive Environments , 2011, Organ. Sci..
[91] Cristian Molinaro,et al. Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems , 2013, TOCL.
[92] D. A. Kenny,et al. Data analysis in social psychology. , 1998 .
[93] A. Roth,et al. Predicting How People Play Games: Reinforcement Learning in Experimental Games with Unique, Mixed Strategy Equilibria , 1998 .
[94] Cleotilde Gonzalez,et al. Accounting for the integration of descriptive and experiential information in a repeated prisoner's dilemma using an instance-based learning model , 2013 .
[95] Robert H. Scales,et al. Future Warfare: Anthology - Revised Edition , 2014 .
[96] Paulo Shakarian,et al. Belief revision in structured probabilistic argumentation , 2015, Annals of Mathematics and Artificial Intelligence.
[97] Joshua Glasser,et al. Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data , 2013, 2013 IEEE Security and Privacy Workshops.
[98] Guillermo Ricardo Simari,et al. Defeasible logic programming: an argumentative approach , 2003, Theory and Practice of Logic Programming.
[99] J. Graves. The descent of man , 2004, Nature.
[100] Cleotilde Gonzalez,et al. Instance-based learning in dynamic decision making , 2003, Cogn. Sci..
[101] David Patrick Duggan,et al. Categorizing threat : building and using a generic threat matrix. , 2007 .
[102] W. Earl Boebert. A Survey of Challenges in Attribution , 2011 .
[103] Wei Wang,et al. Detecting Targeted Attacks By Multilayer Deception , 2013, J. Cyber Secur. Mobil..
[104] Bryan Krekel,et al. Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation , 2009 .
[105] Tansu Alpcan,et al. Network Security , 2010 .
[106] R. Hertwig,et al. Decisions from Experience and the Effect of Rare Events in Risky Choice , 2004, Psychological science.
[107] E. Xing,et al. Mixed Membership Stochastic Block Models for Relational Data with Application to Protein-Protein Interactions , 2006 .
[108] Frederick Mosteller,et al. Stochastic Models for Learning , 1956 .
[109] Samuel N. Hamilton,et al. Adversary Modeling and Simulation in Cyber Warfare , 2008, SEC.
[110] T. Başar,et al. An Intrusion Detection Game with Limited Observations , 2005 .
[111] Robert B. Ahdieh,et al. Beyond Individualism in Law and Economics , 2009 .
[112] Barton Whaley,et al. The one percent solution: Costs and benefits of military deception , 2007 .
[113] L. Demause,et al. Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power , 2013 .
[114] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[115] N. Rowe. A Taxonomy of Deception in Cyberspace , 2006 .
[116] S. Yetiv,et al. National Security through a Cockeyed Lens: How Cognitive Bias Impacts U.S. Foreign Policy , 2013 .
[117] A. Roth,et al. Learning in Extensive-Form Games: Experimental Data and Simple Dynamic Models in the Intermediate Term* , 1995 .
[118] Mark S. Boddy,et al. Course of Action Generation for Cyber Security Using Classical Planning , 2005, ICAPS.
[119] J. Glowniak,et al. History, structure, and function of the Internet. , 1998, Seminars in nuclear medicine.
[120] Cleotilde Gonzalez,et al. Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning , 2011, DBSec.
[121] Guillermo Ricardo Simari,et al. A Mathematical Treatment of Defeasible Reasoning and its Implementation , 1992, Artif. Intell..
[122] Katia P. Sycara,et al. Game Theoretic Modeling and Computational Analysis of N-Player Conflicts over Resources , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[123] S. Stephenson,et al. The Dynamics of Military Revolution, 1300-2050 , 2003 .
[124] Ron Sun,et al. The CLARION Cognitive Architecture , 2017 .
[125] Cleotilde Gonzalez. Learning to Make Decisions in Dynamic Environments: ACT-R Plays the Beer Game , 2004, ICCM.
[126] Wendy K. Smith,et al. Managing Strategic Contradictions: A Top Management Model for Managing Innovation Streams , 2005 .
[127] Mohammad Al Hasan,et al. Link prediction using supervised learning , 2006 .
[128] Paul S. Fischbeck,et al. Estimating the Shape of Covert Networks , 2003 .
[129] Marc Dacier,et al. On a multicriteria clustering approach for attack attribution , 2010, SKDD.
[130] Koyel Ghosh,et al. Dynamical entropy via entropy of non-random matrices: application to stability and complexity in modelling ecosystems. , 2013, Mathematical biosciences.
[131] Denver E McPherson,et al. Deception Recognition: Rethinking the Operational Commander's Approach , 2010 .
[132] Richards J. Heuer,et al. Strategic Deception and Counterdeception , 1981 .
[133] Charu C. Aggarwal,et al. Social Network Data Analytics , 2011 .
[134] Marie Faerber,et al. Winning The Next War Innovation And The Modern Military , 2016 .
[135] Frank J. Stech,et al. Midway Revisited: Detecting Deception by Analysis of Competing Hypothesis , 2007 .
[136] Cleotilde Gonzalez,et al. Instance-based Learning Models of Training , 2010 .
[137] Sarit Kraus,et al. Diffusion Centrality in Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[138] Jack M. Feldman,et al. Self-generated validity and other effects of measurement on belief, attitude, intention, and behavior. , 1988 .
[139] Paulo Shakarian,et al. Introduction to Cyber-Warfare: A Multidisciplinary Approach , 2013 .
[140] Richards J. Heuer,et al. Psychology of Intelligence Analysis , 1999 .
[141] Sarit Kraus,et al. Identifying Missing Node Information in Social Networks , 2011, AAAI.
[142] Paulo Shakarian,et al. Annotated Probabilistic Temporal Logic: Approximate Fixpoint Implementation , 2012, TOCL.
[143] Barton Whaley,et al. Stratagem: Deception and Surprise in War , 2007 .
[144] Dipankar Dasgupta,et al. Game theory for cyber security , 2010, CSIIRW '10.
[145] K. Dill,et al. Principles of maximum entropy and maximum caliber in statistical physics , 2013 .
[146] A. Woolley. Which Side Are You On? How Offensive and Defensive Strategic Orientation Impact Task Focus and Information Search in Teams , 2009 .
[147] George Backus,et al. Modeling the Interaction Between Leaders and Society During Conflict Situations , 2009 .