The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The events of 2016 created a growing concern over the weaponization of information. Weaponized information is actually a symptom of a larger problem, namely, data fidelity. This group of researchers began considering the impact and issues that associate with data fidelity in cyber security. Presently, a fundamental universal assumption existing in cyber security solutions is that the entered data...
The examination of digital events through the prism of a quantitatively represented cultural framework allows for a new perspective on existing cyber security issues and events. When the cultural framework is applied to a large set of data, simple statistical analysis can be applied, allowing the researchers to quantify, characterize, and model specific aspects of human behavior.
This paper discusses the use of an ontology to characterize network behavior features. Efficient and timely threat detection requires careful examination of network packets as well as integration of observed packet level behaviors into a coherent view of the network. We focus on a method to capture the semantic properties of packet transmission at different levels of granularity, making the case for...
Maintaining situational awareness in dynamic and complex systems, such as information and communications networks, is essential to protecting assets and increasing mission assurance. Network monitoring tools generate tremendous amounts of data, overwhelming network defenders with alerts.
In cyber analysis, it is highly desirable to support the analysis of junior analysts by leveraging the experiences of experts. But, there are two major challenges to achieve this goal. First, it is very costly to capture the experience of experts for the complex task of cyber analysis using traditional approaches such as protocol analysis. Second, it is difficult to identify previous experiences of...
Little is known of the ability of baldcypress (Taxodium distichum (L.) L.C. Rich.) in a suppressed sub-canopy position to respond to increases in light. We measured 3 years of diameter growth response of long-suppressed baldcypress saplings to canopy gap creation in a hydrologically altered, water tupelo-dominated backswamp of the lower Roanoke River floodplain in eastern North Carolina. Baldcypress...
Cyber analysis is a difficult task for analysts due to huge amounts of noise-abundant monitoring data and increasing complexity of the reasoning tasks. Therefore, experience from experts can provide guidance for analysts' analytical reasoning and contribute to training. Despite its great potential benefits, experience has not been effectively leveraged in the existing reasoning support systems due...
Water samples have been taken daily at 1030 EST from three locations within North Inlet (South Carolina) since June of 1980 in order to evaluate the tidal, seasonal, and eventually annual variability in carbon concentrations within this system and generate hypotheses explaining the observed trends. Dissolved organic carbon (DOC) concentrations within North Inlet (South Carolina) vary inversely with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.