working group-early warning systems, InProceedings biskup et al, p.1493, 2008. ,
A Wavelet Entropy-Based Change Point Detection on Network Traffic: A Case Study of Heartbleed Vulnerability, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, pp.995-1000, 2014. ,
DOI : 10.1109/CloudCom.2014.78
The Matter of Heartbleed, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14, pp.475-488, 2014. ,
DOI : 10.1145/2663716.2663755
Traffic data repository at the wide project, Proceedings of the Annual Conference on USENIX Annual Technical Conference. ATEC '00, pp.51-51, 2000. ,
Towards an Early Warning System for Network Attacks Using Bayesian Inference, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp.399-404, 2015. ,
DOI : 10.1109/CSCloud.2015.35
URL : https://curve.coventry.ac.uk/open/items/32435e13-d633-46c8-921f-1cbf6671753d/1/CSCloud_2015_PostReview.pdf
Cyber warfare: Issues and challenges, Computers & Security, vol.49, pp.70-94, 2015. ,
DOI : 10.1016/j.cose.2014.11.007
Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks, 2010 IEEE Second International Conference on Social Computing, pp.981-986, 2010. ,
DOI : 10.1109/SocialCom.2010.145
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks, Computers & Electrical Engineering, vol.47, pp.47-327, 2015. ,
DOI : 10.1016/j.compeleceng.2015.07.007
Effective monitoring of slow suspicious activites on computer networks, 2013. ,
Information security continuous monitoring (ISCM) for federal information systems and organizations, 2011. ,
DOI : 10.6028/NIST.SP.800-137
Monitoring and early warning for internet worms, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.190-199, 2003. ,
DOI : 10.1145/948109.948136
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.7686
Towards Early Warning Systems ??? Challenges, Technologies and Architecture, Critical Information Infrastructures Security, pp.151-164, 2010. ,
DOI : 10.1007/978-3-642-14379-3_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.572.4677
Toward early warning against Internet worms based on critical-sized networks, Security and Communication Networks, vol.3, issue.2-3, pp.78-88, 2013. ,
DOI : 10.1002/sec.534
Measuring the Internet's threat level: A global-local approach, 2014 IEEE Symposium on Computers and Communications (ISCC), pp.1-6, 2014. ,
DOI : 10.1109/ISCC.2014.6912624
Cyber situational awareness ??? A systematic review of the literature, Computers & Security, vol.46, pp.18-31, 2014. ,
DOI : 10.1016/j.cose.2014.06.008
Wireless security situation awareness with attack identification decision support, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp.144-151, 2011. ,
DOI : 10.1109/CICYBS.2011.5949399
A case for trusted sensors: Encryptors with Deep Packet Inspection capabilities, MILCOM 2012, 2012 IEEE Military Communications Conference, pp.1-6, 2012. ,
DOI : 10.1109/MILCOM.2012.6415703
A decision-support model for information systems based on situational awareness, Multimedia Information Networking and Security , 2009. MINES '09. International Conference on, pp.405-408, 2009. ,
Integrated situational awareness for cyber attack detection, analysis, and mitigation, Sensors and Systems for Space Applications V, pp.83850-83850, 2012. ,
DOI : 10.1117/12.919261
Situation awareness for networked systems, 2011 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp.123-130, 2011. ,
DOI : 10.1109/COGSIMA.2011.5753430
A survey of coordinated attacks and collaborative intrusion detection, Computers & Security, vol.29, issue.1, pp.124-140, 2010. ,
DOI : 10.1016/j.cose.2009.06.008
The internet motion sensor-a distributed blackhole monitoring system Symantec: Cyber security: Deepsight intelligence, In: NDSS, vol.25, 2005. ,
Carmentis: A co-operative approach towards situation awareness and early warning for the internet, In: IMF, pp.55-66, 2006. ,
Applying machine learning techniques for detection of malicious code in network traffic Advances in Artificial Intelligence, pp.44-50, 2007. ,
Intelligent Network-Based Early Warning Systems, Critical Information Infrastructures Security, pp.103-111, 2006. ,
DOI : 10.1007/11962977_9
Anonymity and Privacy in Distributed Early Warning Systems, Critical Information Infrastructures Security, pp.81-92, 2011. ,
DOI : 10.1007/978-3-642-21694-7_7
Evaluation of state of the art ids message exchange protocols, International Conference on Communication and Network Security (ICCNS), 2013. ,
Beyond centralism: The herold approach to sensor networks and early warning systems, Proceedings of First European Workshop of Internet Early Warning and Network Intelligence, 2010. ,
Detection in Sensor Networks: The Saddlepoint Approximation, IEEE Transactions on Signal Processing, vol.55, issue.1, pp.327-340, 2007. ,
DOI : 10.1109/TSP.2006.882104
Towards optimal sensor placement strategies for early warning systems, In: Sicherheit, pp.191-204, 2010. ,
Distributed detection and data fusion, 1997. ,
DOI : 10.1007/978-1-4612-1904-0
A perceptuallyrelevant model-based cyber threat prediction method for enterprise mission assurance, Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), 2011 IEEE First International Multi-Disciplinary Conference on, pp.60-65, 2011. ,
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise, Information Systems Frontiers, vol.10, issue.1/2, pp.17-34, 2013. ,
DOI : 10.1007/s10796-010-9268-7
Situational awareness of a coordinated cyber attack, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, pp.114-129, 2005. ,
DOI : 10.1117/12.606980
The jdl model of data fusion applied x2014; a review paper, Sensor Data Fusion: Trends, Solutions, Applications (SDF), 2012 Workshop on, pp.116-119, 2012. ,
Space-Time Signal Processing for Distributed Pattern Detection in Sensor Networks, Selected Topics in Signal Processing, pp.38-49, 2013. ,
DOI : 10.1109/JSTSP.2012.2237381
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.309.4864
A Collaborative Approach to Situational Awareness for CyberSecurity, Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.216-222, 2012. ,
DOI : 10.4108/icst.collaboratecom.2012.250794
Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. In: Insider Threats in Cyber Security, pp.85-113, 2010. ,
DOI : 10.1007/978-1-4419-7133-3_5
problems in web-based open source information processing for it early warning, 2011. ,
Agile visual analytics for banking cyber “big data”, 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), pp.299-300, 2012. ,
DOI : 10.1109/VAST.2012.6400507
situ: Situational understanding and discovery for cyber attacks, 2012 IEEE Conference on Visual Analytics Science and Technology (VAST), pp.307-308, 2012. ,
DOI : 10.1109/VAST.2012.6400503
Cyber situational awareness through operational streaming analysis, 2011, MILCOM 2011 Military Communications Conference, pp.1152-1157, 2011. ,
DOI : 10.1109/MILCOM.2011.6127455
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.375.1974
Cauldron missioncentric cyber situational awareness with defense in depth, Military Communications Conference, pp.1339-1344, 2011. ,
Transforming traditional security strategies into an early warning system for advanced threats. http://www.emc.com/collateral/software/solution- overview/h11031-transforming-traditional-security-strategies-so.pdf, 2012. ,
Uncertainty and Risk Management in Cyber Situational Awareness, pp.51-68, 2010. ,
DOI : 10.1007/978-1-4419-0140-8_4
Monitoring for Slow Suspicious Activities Using a Target Centric Approach, pp.163-168, 2013. ,
DOI : 10.1007/978-3-642-45204-8_12
Low rank approximation: algorithms, implementation, applications, 2011. ,
DOI : 10.1007/978-1-4471-2227-2
Towards detecting anomalous user behavior in online social networks, Proceedings of the 23rd USENIX Security Symposium (USENIX Security), 2014. ,
Sensing for suspicion at scale: A bayesian approach for cyber conflict attribution and reasoning, Cyber Conflict (CYCON), 2012 4th International Conference on, pp.1-19, 2012. ,
Effective network security monitoring: from attribution to target-centric monitoring, Telecommunication Systems, vol.17, issue.2, pp.1-12, 2015. ,
DOI : 10.1007/s11235-015-0071-0