Advances in Cyber Security

Contributors: Hira Agrawal, Preet Bharara, Tom Bowen, Dyann Bradbury, Vincent Buskens, D. Frank Hsu, Kuan-Tsae Huang, Kevin Kelly, Kathleen Kiernan, Ruby Lee, Andrew Lewman, Nick Mankovich, Dorothy Marinucci, Eileen Monsma, Robert Mueller III, Sanjai Narain, Paul Niewbeerta, Adam Palmer, Howard Schmidt, Melvin Soudijn, Edward Stroz, Akio Sugeno, Paul Syverson, Kazuo Takaragi, Kwai-Jan Wu

[1]  Stefan Savage,et al.  Privacy-preserving network forensics , 2011, Commun. ACM.

[2]  Sergey Yekhanin,et al.  Private information retrieval , 2010, CACM.

[3]  David Alan Grier Not for All Markets , 2011, Computer.

[4]  Jon Kleinberg,et al.  Authoritative sources in a hyperlinked environment , 1999, SODA '98.

[5]  Ari Schwartz,et al.  Identity management and privacy , 2011, Commun. ACM.

[6]  J. Coleman Foundations of Social Theory , 1990 .

[7]  D. Frank Hsu,et al.  Combinatorial Fusion Analysis: Methods and Practices of Combining Multiple Scoring Systems , 2006 .

[8]  Albert-László Barabási,et al.  Controllability of complex networks , 2011, Nature.

[9]  P. Pin,et al.  Marginal contribution, reciprocity and equity in segregated groups: Bounded rationality and self-organization in social networks , 2007 .

[10]  Salvatore J. Stolfo,et al.  Anomaly Detection in Computer Security and an Application to File System Accesses , 2005, ISMIS.

[11]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[12]  Xiaofan Wang,et al.  Evolution of a large online social network , 2009 .

[13]  Martin Hilbert,et al.  The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.

[14]  Aleksandar Ivanov,et al.  Using Prediction Markets to Harness Collective Wisdom for Forecasting , 2009 .

[15]  Paloma Martínez,et al.  Toward an Equal Opportunity Web: Applications, Standards, and Tools that Increase Accessibility , 2011, Computer.

[16]  Gregory Goth,et al.  Turning data into knowledge , 2010, Commun. ACM.

[17]  Jeffrey M. Voas,et al.  In Trust We Trust , 2010, Computer.

[18]  Jacob West,et al.  Secure Programming with Static Analysis , 2007 .

[19]  Avi Goldfarb,et al.  Online advertising, behavioral targeting, and privacy , 2011, Commun. ACM.

[20]  Moises Sudit,et al.  Cyber attack modeling and simulation for network security analysis , 2007, 2007 Winter Simulation Conference.

[21]  H. S. Kim,et al.  Commercial Antivirus Software Effectiveness: An Empirical Study , 2011, Computer.

[22]  Tim Bass,et al.  Intrusion detection systems and multisensor data fusion , 2000, CACM.

[23]  Peng Ning,et al.  Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.

[24]  Dennis J. McFarland,et al.  Brain–computer interfaces for communication and control , 2002, Clinical Neurophysiology.

[25]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[26]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.

[27]  I. Bremmer Democracy in Cyberspace , 2010, Coding Democracy.

[28]  Kimberly Peretti Data Breaches: What the Underground World of Carding Reveals , 2009 .

[29]  Vassilis Kostakos,et al.  Inferring social networks from physical interactions: a feasibility study , 2010, Int. J. Pervasive Comput. Commun..

[30]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[31]  J.D. Day,et al.  The OSI reference model , 1983 .

[32]  Samuel Greengard,et al.  Social games, virtual goods , 2011, Commun. ACM.

[33]  A. van de Rijt,et al.  Dynamics of Networks if Everyone Strives for Structural Holes1 , 2008, American Journal of Sociology.

[34]  José Luis Gómez Barroso,et al.  Asymmetries and shortages of the network neutrality principle , 2011, CACM.

[35]  Ruby B. Lee,et al.  New cache designs for thwarting software cache-based side channel attacks , 2007, ISCA '07.

[36]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[37]  V. Buskens,et al.  Embedded trust: Control and learning , 2002 .

[38]  Alex Wright,et al.  Web science meets network science , 2011, Commun. ACM.

[39]  David B. Johnson Scalable support for transparent mobile host internetworking , 1995, Wirel. Networks.

[40]  Niels Provos,et al.  Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.

[41]  Monya Baker,et al.  From promising to practical: tools to study networks of neurons , 2010, Nature Methods.

[42]  N. Lin SOCIAL NETWORKS AND STATUS ATTAINMENT , 1999 .

[43]  Soumitra Dutta,et al.  What's your personal social media strategy? , 2010, Harvard business review.

[44]  Tommi Mikkonen,et al.  Reports of the Web's Death Are Greatly Exaggerated , 2011, Computer.

[45]  Dennis P. Groth,et al.  Why an informatics degree? , 2010, Commun. ACM.

[46]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .

[47]  Joel F. Brenner Why isn't cyberspace more secure? , 2010, Commun. ACM.

[48]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[49]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[50]  Gary Anthes,et al.  Security in the cloud , 2010, Commun. ACM.

[51]  Edward R. Tufte,et al.  Envisioning Information , 1990 .

[52]  Salvatore J. Stolfo,et al.  Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.

[53]  I. N. A. C. I. J. H. Fowler Book Review: Connected: The surprising power of our social networks and how they shape our lives. , 2009 .

[54]  Marcel Fafchamps,et al.  The formation of risk sharing networks , 2007 .

[55]  Matt Welsh,et al.  Sensor networks for the sciences , 2010, Commun. ACM.

[56]  Ruby B. Lee,et al.  Hardware-rooted trust for secure key management and transient trust , 2007, CCS '07.