Internet Security Threat Report Volume XII: Worms, Bots, and BotNets John McCumber Strategic Programs GTC- Southwest.
Syslog Protocols
NetBSD syslogd with IETF Syslog Protocols
Big Data Security Analytics (BDSA) with Randy Franklin
(Cyber Operations) Presidential Policy Directive [PPD-20]
Contra Terror in Nicaragua: Report of a Fact-Finding Mission- September 1984-January 1985, Reed Brody, U.S. support for the Contras : hearing before the Subcommittee on Western Hemisphere
Ginn Hale - The Rifter 8 - The Silent City
DNC Times - April -May 2015
1 SOS: Secure Overlay Services Angelos Keromytis, Dept. of Computer Science Vishal Misra, Dept. of Computer Science Dan Rubenstein, Dept. of Electrical.
Cyber Situation Awareness from a Cyber Security Perspective Sushil Jajodia, Massimiliano Albanese George Mason University Peng Liu Pennsylvania State University.
Machine Learning in Intrusion Detection Systems (IDS)
ARO-MURI on Cyber-Situation Awareness Review Meeting Phoenix AZ, 2013