PROCEEDINGS VOLUME 8757
SPIE DEFENSE, SECURITY, AND SENSING | 29 APRIL - 3 MAY 2013
Cyber Sensing 2013
Proceedings Volume 8757 is from: Logo
SPIE DEFENSE, SECURITY, AND SENSING
29 April - 3 May 2013
Baltimore, Maryland, United States
Front Matter: Volume 8757
Proc. SPIE 8757, Front Matter: Volume 8757, 875701 (7 June 2013); doi: 10.1117/12.2032137
Analysis of Cyber Attacks
Proc. SPIE 8757, On localization attacks against cloud infrastructure, 875703 (28 May 2013); doi: 10.1117/12.2015626
Proc. SPIE 8757, Quantitative analysis of intrusion detection systems: Snort and Suricata, 875704 (28 May 2013); doi: 10.1117/12.2015616
Proc. SPIE 8757, ICS logging solution for network-based attacks using Gumistix technology, 875705 (28 May 2013); doi: 10.1117/12.2015958
Security of Internet and Clouds
Proc. SPIE 8757, A framework for network-wide semantic event correlation, 875708 (28 May 2013); doi: 10.1117/12.2016126
Proc. SPIE 8757, Efficient identity management and access control in cloud environment, 875709 (28 May 2013); doi: 10.1117/12.2018032
Proc. SPIE 8757, Software analysis in the semantic web, 87570A (28 May 2013); doi: 10.1117/12.2016122
Novel Cyber Sensors
Proc. SPIE 8757, Remote suspect identification and the impact of demographic features on keystroke dynamics, 87570B (28 May 2013); doi: 10.1117/12.2015542
Proc. SPIE 8757, Dynamic malware analysis using IntroVirt: a modified hypervisor-based system, 87570D (28 May 2013); doi: 10.1117/12.2015545
Novel Algorithms for Cyber Sensing
Proc. SPIE 8757, The two stages hierarchical unsupervised learning system for complex dynamic scene recognition, 87570E (20 June 2013); doi: 10.1117/12.2018754
Proc. SPIE 8757, Performance comparison of the Prophecy (forecasting) Algorithm in FFT form for unseen feature and time-series prediction, 87570F (6 June 2013); doi: 10.1117/12.2015417
Proc. SPIE 8757, A multi-resolution fractal additive scheme for blind watermarking of 3D point data, 87570G (28 May 2013); doi: 10.1117/12.2009020
Algorithms for Attack Detection
Proc. SPIE 8757, A study of malware detection on smart mobile devices, 87570H (28 May 2013); doi: 10.1117/12.2016114
Proc. SPIE 8757, Complex scenes and situations visualization in hierarchical learning algorithm with dynamic 3D NeoAxis engine, 87570J (20 June 2013); doi: 10.1117/12.2018833
Lessons Learned and Future Ideas
Proc. SPIE 8757, Secure it now or secure it later: the benefits of addressing cyber-security from the outset, 87570L (28 May 2013); doi: 10.1117/12.2015465
Proc. SPIE 8757, Digital microarray analysis for digital artifact genomics, 87570N (6 June 2013); doi: 10.1117/12.2030990
Back to Top