A Data Driven Approach for the Science of Cyber Security: Challenges and Directions
dc.contributor.author | Thuraisingham, Bhavani | |
dc.contributor.author | Kantarcioglu, Murat | |
dc.contributor.author | Hamlen, Kevin | |
dc.contributor.author | Khan, Latifur | |
dc.contributor.author | Finin, Tim | |
dc.contributor.author | Joshi, Anupam | |
dc.contributor.author | Oates, Tim | |
dc.contributor.author | Bertino, Elisa | |
dc.date.accessioned | 2018-10-30T16:59:27Z | |
dc.date.available | 2018-10-30T16:59:27Z | |
dc.date.issued | 2016-12-19 | |
dc.description | IEEE Conference on Information Reuse and Integration | en_US |
dc.description.abstract | This paper describes a data driven approach to studying the science of cyber security (SoS). It argues that science is driven by data. It then describes issues and approaches towards the following three aspects: (i) Data Driven Science for Attack Detection and Mitigation, (ii) Foundations for Data Trustworthiness and Policy-based Sharing, and (iii) A Risk-based Approach to Security Metrics. We believe that the three aspects addressed in this paper will form the basis for studying the Science of Cyber Security. | en_US |
dc.description.sponsorship | We acknowledge the support of AFOSR (contract MURI FA9550-08-1-0265) for this work. We thank Dr. Robert Herklotz for his encouragement. | en_US |
dc.description.uri | https://ieeexplore.ieee.org/document/7785719/citations?tabFilter=papers#citations | en_US |
dc.format.extent | 10 pages | en_US |
dc.genre | conference papers and proceedings pre-print | en_US |
dc.identifier | doi:10.13016/M2959CC1J | |
dc.identifier.citation | Bhavani Thuraisingham, Murat Kantarcioglu, Kevin Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, and Elisa Bertino, A Data Driven Approach for the Science of Cyber Security: Challenges and Directions, 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI) , 10.1109/IRI.2016.10 | en_US |
dc.identifier.uri | 10.1109/IRI.2016.10 | |
dc.identifier.uri | http://hdl.handle.net/11603/11792 | |
dc.language.iso | en_US | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | © 2016 IEEE | |
dc.subject | trusted computing | en_US |
dc.subject | security of data | en_US |
dc.subject | Computer security | en_US |
dc.subject | Measurement | en_US |
dc.subject | Ontologies | en_US |
dc.subject | data driven approach | en_US |
dc.subject | security metrics | en_US |
dc.subject | policy-based sharing | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.subject | science of cyber security | en_US |
dc.title | A Data Driven Approach for the Science of Cyber Security: Challenges and Directions | en_US |
dc.type | Text | en_US |