Algorithm for Threat Detection Kickoff Workshop
نویسندگان
چکیده
Data collection and dissemination capabilities surrounding all kinds of activity have advanced tremendously. This raw data must be turned into information, the information used to build knowledge. This knowledge is used to inform anomaly detection, prediction, and the ultimately to generate actionable intelligence. Data Sciences give us the theory and the tools necessary to produce and verify what we are after. We still have make skillful and creative use of these tools to formulate our problems in such a way that we will get the right answer to the right question. Work in this area at Penn State University has left us with some lessons learned and useful organizing principles to accomplish the formulation of Algorithmic Threat Detection problems and the execution of applied research in this area.
منابع مشابه
Cross Entropy-Based High-Impedance Fault Detection Algorithm for Distribution Networks
The low fault current of high-impedance faults (HIFs) is one of the main challenges for the protection of distribution networks. The inability of conventional overcurrent relays in detecting these faults results in electric arc continuity that it causes the fire hazard and electric shock and poses a serious threat to human life and network equipment. This paper presents an HIF detection algori...
متن کاملAre NFL Coaches Risk and Loss Averse? Evidence from Their Use of Kickoff Strategies
Quantitative analysis of football play calling suggests that NFL coaches do not choose their strategies optimally. They tend to be overly cautious. One possible explanation for this finding is that NFL coaches are averse to risk and loss. We propose a prospect theory based model of coaches' utility and estimate the model's parameters using kickoff data from the 2009 NFL season. Using an outcome...
متن کاملFraming ontology
• Linguistic instruments in knowledge engineering, Tilburg 1991; • Knowledge sharing and reuse, ECAI’92, Vienna 1992; • International workshop on formal ontology in conceptual analysis and knowledge representation, Padua 1993; • Knowledge sharing and information interchange, IJCAI’93, Chambery 1993; • Parts and wholes: conceptual part-whole relations and formal mereology, ECAI’94, Amsterdam 199...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملSecond Annual Cyber Security and Information Infrastructure Research Workshop May 10 - 11 , 2006 BEYOND THE MAGINOT LINE
Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...
متن کامل