Showing 1 - 8 of 8 results for the CERT CC
In this presentation, Roman Danyliw provides an overview of data sharing, and discusses related concerns and observations.
This paper presents the results of a study of non-signature-based approaches to detecting malicious activity in computer network traffic.
In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.
Jonathan Spring, Sarah Kern, and Alec Summers propose a model of global capability advancement, the adversarial capability chain (ACC).
This study was designed to profile cyber actors, and to examine the time interval between cyber and kinetic events in order to gain greater insights into nation-state cyber responses to kinetic events.
In this 2013 webinar, Roman Danyliw discusses how cyber security organizations react to new technologies or adversaries.
In this webinar, Rich Pethia discusses how cybersecurity has changed over the past 20 years.
In this 2013 webinar, Dr. Greg Shannon describes advances in software engineering to build systems with predictable and improved quality, cost, and schedule.