Search For:

Displaying 1-10 out of 10 total
Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor
Found in: IEEE Security and Privacy
By Lee Hively,Frederick Sheldon,Anna Cinzia Squicciarini
Issue Date:July 2011
pp. 14-23
The cybersecurity landscape consists of an ad hoc patchwork of solutions. Optimal cybersecurity is difficult for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, practical time-space-energy constrain...
 
Measuring Reliability as a Mean Failure Cost
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Ali Mili, Frederick Sheldon
Issue Date:November 2007
pp. 403-404
No summary available.
   
Managing Secure Survivable Critical Infrastructures to Avoid Vulnerabilities
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By Frederick Sheldon, Tom Potok, Andy Loebl, Axel Krings, Paul Oman
Issue Date:March 2004
pp. 293-296
Information systems now form the backbone of nearly every government and private system — from targeting weapons to conducting financial transactions. Increasingly these systems are networked together allowing for distributed operations, sharing of databas...
 
Challenging the Mean Time to Failure: Measuring Dependability as a Mean Failure Cost
Found in: Hawaii International Conference on System Sciences
By Ali Mili, Frederick Sheldon
Issue Date:January 2009
pp. 1-10
As a measure of system reliability, the mean time to failure falls short on many fronts: it ignores the variance in stakes among stakeholders; it fails to recognize the structure of complex specifications as the aggregate of overlapping requirements; it fa...
   
A Vision for Scalable Trustworthy Computing
Found in: IEEE Security and Privacy
By Lee Hively, Frederick Sheldon, Anna Cinzia Squicciarini
Publication Date: August 2010
pp. N/A
The cybersecurity landscape consists of an ad hoc patchwork of solutions [1]. Optimal cybersecurity is considered “hard,” for various reasons: complexity, immense data and processing requirements, resource-agnostic cloud computing, pr...
 
Anomaly detection in multiple scale for insider threat analysis
Found in: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11)
By Frederick Sheldon, Yoohwan Kim
Issue Date:October 2011
pp. 1-1
Insiders now pose the greatest risk to organizations' information infrastructure when they have the incentive, opportunity, rationalization and the capability to circumvent rules. Cost estimates approach $1000 B/year from modification of data, security mec...
     
Secure cryptographic key management system (CKMS) considerations for smart grid devices
Found in: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11)
By Frederick Sheldon, Tracy Ricci, Uditha Navaratne, Athula Kulatunga, Elisa Bertino, Hal Aldridge, Michael Duren, Robert Abercrombie
Issue Date:October 2011
pp. 1-1
Mobile phone programming can provide an authentic and engaging hook into computer science. With App Inventor, developed by Google and recently moved to MIT, programming Android apps is as easy as clicking blocks together. App Inventor has been used success...
     
Has the cyber warfare threat been overstated?: a cheap talk game-theoretic analysis on the Google-hacking claim?
Found in: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11)
By Axel Krings, Frederick Sheldon, Hongju (Daisy) Chen, Jiajin Zhang, Zhanshan (Sam) Ma
Issue Date:October 2011
pp. 1-1
Mobile phone programming can provide an authentic and engaging hook into computer science. With App Inventor, developed by Google and recently moved to MIT, programming Android apps is as easy as clicking blocks together. App Inventor has been used success...
     
Secure VM for monitoring industrial process controllers
Found in: Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11)
By Frederick Sheldon, Mohd. Hassan Ali, Bob Schlicher, Dipankar Dasgupta, Marco Carvalho, Robert Abercrombie
Issue Date:October 2011
pp. 1-1
Mobile phone programming can provide an authentic and engaging hook into computer science. With App Inventor, developed by Google and recently moved to MIT, programming Android apps is as easy as clicking blocks together. App Inventor has been used success...
     
DOE grass roots panel
Found in: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09)
By Daniel Quinlan, Deborah Frincke, Frederick Sheldon, John McHugh, Robert Armstrong, Thomas Longstaff
Issue Date:April 2009
pp. 1-7
Option pricing is one of the challenging areas of computational finance. In this paper an attempt is made to apply Particle Swarm Optimization (PSO) for pricing options. PSO is one of the novel global search algorithm based on swarm intelligence. It is sho...
     
 1