Axelsson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur. 3, 3 (August 2000), 186-205.
Anderson Co., Fort Washington, PA (Apr. 1980).
Bojinov et al., Address space randomization for mobile devices, in Proc Fourth ACM Conf. on Wireless Network Security, 127-138, 2011 Barrantes, E., et al., Randomized Instruction Set Emulation, ACM Transactions on Information and System Security, 8(1), 3-30, February 2005.
Bartol, N., et al., “Measuring Cyber Security and Information Assurance: A State of the Art Report,” Defense Technical Information Center, May 2009.
Boyce, M., Duma, K., Hettinger, L., Malone, T., Wilson, D., Lockett Reynolds, J. (2011).
Human performance in cyber security: A research agenda. Proceedings of the Human Factors and Ergonomics Society 55th Annual Meeting. 55:1115.
Bau, J., and Mitchell, J.C., “Security Modeling and Analysis,” Security & Privacy, IEEE, May-June 2011 Bostrom, H., et al.: On the definition of information fusion as a field of research. In: Technical report, University of Skovde, School of Humanities and Informatics, Skovde, Sweden (2007) http://www.his.se/PageFiles/18815/Information%20Fusion%20Definition.pdf Cam, H., "PeerShield: determining control and resilience criticality of collaborative cyber assets in networks", Proc. SPIE 8408, Cyber Sensing 2012, 840808 (May 1, 2012) Cartwright, Nancy (1983), How the Laws of Physics Lie. Oxford: Oxford University Press.
Dempsey, K., et.al., “Information Security Continuous Monitoring (ISCM_ for Federal Information Systems and Organizations,” NIST Special Publication 800-137, September 2011 Frigg, R., Models in Science, Stanford Encyclopedia of Philosophy, 2012; http://plato.stanford.edu/entries/models-science/ Ge, Linqiang; Liu, Hui; Zhang, Difan; Yu, Wei; Hardy, Rommie; Reschly, Robert; On effective sampling techniques for host-based intrusion detection in MANET, MILITARY COMMUNICATIONS CONFERENCE, 2012 - MILCOM 2012 Gil, Santiago, Alexander Kott, and Albert-László Barabási. "A genetic epidemiology approach to cyber-security." Scientific reports 4 (2014).
Harang, R.E.; Glodek, W.J.; "Identification of anomalous network security token usage via clustering and density estimation," 46th Annual Conference on Information Sciences Ownby, Michael, and Alexander Kott. Reading the mind of the enemy: predictive analysis and command effectiveness. CCRT Symposium, 2006.
Animesh Patcha and Jung-Min Park. 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51, 12 (August 2007), 3448-3470. [OpenAIRE]