PROCEEDINGS VOLUME 8408
SPIE DEFENSE, SECURITY, AND SENSING | 23-27 APRIL 2012
Cyber Sensing 2012
IN THIS VOLUME

8 Sessions, 26 Papers, 0 Presentations
Front Matter  (1)
Session 1  (5)
Session 2  (4)
Session 3  (4)
Session 4  (3)
Session 5  (4)
Session 6  (2)
Session 7  (3)
Proceedings Volume 8408 is from: Logo
SPIE DEFENSE, SECURITY, AND SENSING
23-27 April 2012
Baltimore, Maryland, United States
Front Matter
Proc. SPIE 8408, Front Matter: Volume 8408, 840801 (11 July 2012); doi: 10.1117/12.979487
Session 1
Proc. SPIE 8408, Insider threat detection enabled by converting user applications into fractal fingerprints and autonomously detecting anomalies, 840802 (7 May 2012); doi: 10.1117/12.914849
Proc. SPIE 8408, Cyber situational awareness and differential hardening, 840803 (8 May 2012); doi: 10.1117/12.915642
Proc. SPIE 8408, Finding structures in large-scale graphs, 840805 (6 July 2012); doi: 10.1117/12.978069
Proc. SPIE 8408, From measurements to metrics: PCA-based indicators of cyber anomaly, 840806 (7 May 2012); doi: 10.1117/12.918165
Proc. SPIE 8408, Anomaly detection for internet surveillance, 840807 (5 May 2012); doi: 10.1117/12.918573
Session 2
Proc. SPIE 8408, PeerShield: determining control and resilience criticality of collaborative cyber assets in networks, 840808 (7 May 2012); doi: 10.1117/12.919394
Proc. SPIE 8408, RISE: Relational-Integrity-Sensitive-Encoding and data aggregation for intrusion detection, 840809 (29 May 2012); doi: 10.1117/12.919343
Proc. SPIE 8408, Coalmine: an experience in building a system for social media analytics, 84080A (7 May 2012); doi: 10.1117/12.918933
Proc. SPIE 8408, A method for the automated detection phishing websites through both site characteristics and image analysis, 84080B (7 May 2012); doi: 10.1117/12.918956
Session 3
Proc. SPIE 8408, A solution for parallel network architectures applied to network defense appliances and sensors, 84080D (5 May 2012); doi: 10.1117/12.919470
Proc. SPIE 8408, Data fusion in cyber security: first order entity extraction from common cyber data, 84080E (8 May 2012); doi: 10.1117/12.919379
Proc. SPIE 8408, Cyber situation awareness as distributed socio-cognitive work, 84080F (7 May 2012); doi: 10.1117/12.919338
Proc. SPIE 8408, Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield, 84080G (7 May 2012); doi: 10.1117/12.919454
Session 4
Proc. SPIE 8408, Analysis of web-related threats in ten years of logs from a scientific portal, 84080H (5 May 2012); doi: 10.1117/12.919545
Proc. SPIE 8408, Scalable wavelet-based active network detection of stepping stones, 84080I (8 May 2012); doi: 10.1117/12.919571
Proc. SPIE 8408, Distributed pattern detection in cyber networks, 84080J (5 May 2012); doi: 10.1117/12.919587
Session 5
Proc. SPIE 8408, Improved near-earth object detection using dynamic logic, 84080L (29 May 2012); doi: 10.1117/12.921223
Proc. SPIE 8408, Automatic decision support in heterogeneous sensor networks, 84080M (7 May 2012); doi: 10.1117/12.921348
Proc. SPIE 8408, Multi-agent system for target-adaptive radar tracking, 84080N (7 May 2012); doi: 10.1117/12.921143
Proc. SPIE 8408, Application of dynamic logic algorithm to analyze AFRL gotcha data, 84080O (7 May 2012); doi: 10.1117/12.921646
Session 6
Proc. SPIE 8408, Human-computer symbiosis in cyberspace environments, 84080Q (7 May 2012); doi: 10.1117/12.918086
Proc. SPIE 8408, Wavefront sensor alignment and calibration techniques for laser communication systems, 84080R (7 May 2012); doi: 10.1117/12.918124
Session 7
Proc. SPIE 8408, Towards a trustworthy distributed architecture for complex sensing networks, 84080V (7 May 2012); doi: 10.1117/12.920493
Proc. SPIE 8408, Blind extraction and security analysis of spread spectrum hidden watermarks, 84080W (8 May 2012); doi: 10.1117/12.920768
Proc. SPIE 8408, Fractals, malware, and data models, 84080X (7 May 2012); doi: 10.1117/12.941769
Back to Top