A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
MetadataShow full item record
Type of Work10 pages
conference papers and proceedings pre-print
Citation of Original PublicationBhavani Thuraisingham, Murat Kantarcioglu, Kevin Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, and Elisa Bertino, A Data Driven Approach for the Science of Cyber Security: Challenges and Directions, 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI) , 10.1109/IRI.2016.10
RightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
© 2016 IEEE
security of data
data driven approach
UMBC Ebiquity Research Group
science of cyber security
This paper describes a data driven approach to studying the science of cyber security (SoS). It argues that science is driven by data. It then describes issues and approaches towards the following three aspects: (i) Data Driven Science for Attack Detection and Mitigation, (ii) Foundations for Data Trustworthiness and Policy-based Sharing, and (iii) A Risk-based Approach to Security Metrics. We believe that the three aspects addressed in this paper will form the basis for studying the Science of Cyber Security.
Showing items related by title, author, creator and subject.
Hendre, Amit (2014-01-01)Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. On one end, cloud providers ...
Khanna, Kush; Panigrahi, Bijaya Ketan; Joshi, Anupam (IET, 2017-10-02)False data injection attacks can pose serious threats to the operation and control of power grid. The smarter the power grid gets, the more vulnerable it becomes to cyber attacks. Various detection methods of cyber attacks ...
Hendre, Amit; Joshi, Karuna Pande (IEEE, 2015-06-27)Cloud services are becoming an essential part of many organizations. Cloud providers have to adhere to security and privacy policies to ensure their users' data remains confidential and secure. Though there are some ongoing ...