Cyber Adaptive Learning System Laboratory (CALSys Lab)

Publications

Get a copy of our most recent publication with Cambridge

Authors:

  • Ericsson Marin, California State Polytechnic University, Pomona
  • Mohammed Almukaynizi, King Saud University, Saudi Arabia
  • Soumajyoti Sarkar, Arizona State University
  • Eric Nunes, Arizona State University
  • Jana Shakarian, Cyber Reconnaissance, Inc.
  • Paulo Shakarian, Cyber Reconnaissance, Inc.

Table of Contents:

Foreword Edward G. Amoroso
Preface
1. Introduction
2. Background
Part I. Understanding the Behavior of Malicious Hackers:
3. Mining key-hackers
4. Reasoning about hacker engagement
5. Uncovering communities of malware and exploit vendors
Part II. Predicting Imminent Cyber Threats:
6. Identifying exploits in the wild proactively
7. Predicting enterprise-targeted external cyber-attacks
8. Bringing social network analysis to aid in cyber-attack prediction
9. Finding at-risk systems without software vulnerability identifiers (CVE's)
10. Final considerations.