Information overflow is a significant and as yet unresolved problem for military, homeland security and law enforcement. Furthermore, quantity is only one part of the intelligence problem: identifying which pieces of information belong together, and assessing the credibility of not only individual pieces of information but also of their correlations to one another complicates things. Automatically sifting, sorting and fusing information garnered from multiple sources into recognizable patterns of behavior and potential threats would provide a distinct operational advantage. This advantage would be clearly increased if the time needed for processing was close to real-time. A number of systems for deeper analysis of potential threats using te...
This thesis is about the weak signals of the future cyber threats that armed forces may face. The re...
A small effort was conducted at Sandia National Laboratories to explore the use of a number of moder...
Security analysts working in the modern threat landscape face excessive events and alerts, a high vo...
This paper presents a model for early warning system to detect terrorist threats. The model is based...
The complexity and dynamics of current military operations demand reliable and up-to-date intelligen...
HUMINT reports, as well as all other kinds of texts, can be pre-analyzed automatically in order to i...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
Technical ReportPolicy leaders have identified a need for a mathematical based computational system ...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
Abstract. Three issues usually are associated with threat prevention intelligent surveillance system...
XLab is an early warning system that addresses a broad range of national security threats using a fl...
We present the architecture of an automatic early warning system (EWS) that aims at providing predi...
Abstract. We present the architecture of an automatic early warning system (EWS) that aims at provid...
This thesis is about the weak signals of the future cyber threats that armed forces may face. The re...
A small effort was conducted at Sandia National Laboratories to explore the use of a number of moder...
Security analysts working in the modern threat landscape face excessive events and alerts, a high vo...
This paper presents a model for early warning system to detect terrorist threats. The model is based...
The complexity and dynamics of current military operations demand reliable and up-to-date intelligen...
HUMINT reports, as well as all other kinds of texts, can be pre-analyzed automatically in order to i...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
The current transformation processes aim at robustly networked forces in order to enable them to exe...
Cybersecurity threats have surged in the past decades. Experts agree that conventional security meas...
Technical ReportPolicy leaders have identified a need for a mathematical based computational system ...
International audienceAlert correlation plays an increasingly crucial role in nowadays computer secu...
Abstract. Three issues usually are associated with threat prevention intelligent surveillance system...
XLab is an early warning system that addresses a broad range of national security threats using a fl...
We present the architecture of an automatic early warning system (EWS) that aims at providing predi...
Abstract. We present the architecture of an automatic early warning system (EWS) that aims at provid...
This thesis is about the weak signals of the future cyber threats that armed forces may face. The re...
A small effort was conducted at Sandia National Laboratories to explore the use of a number of moder...
Security analysts working in the modern threat landscape face excessive events and alerts, a high vo...