Filters








1,987 Hits in 6.4 sec

The Panacea Threat Intelligence and Active Defense Platform [article]

Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather (+4 others)
2020 arXiv   pre-print
The novelty of the Panacea system is that uses NLP for cyber defense and engages the attacker using bots to elicit evidence to attribute to the attacker and to waste the attacker's time and resources.  ...  We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks.  ...  All statements of fact, opinion or conclusions contained herein are those of the authors and should not be construed as representing the official views or policies of DARPA, AFRL, Army, or the U.S.  ... 
arXiv:2004.09662v1 fatcat:pxmy4zfgnncyhld7zvv3ouz3p4

Active Defense Against Social Engineering: The Case for Human Language Technology

Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh (+6 others)
2020 International Conference on Language Resources and Evaluation  
The novelty of the Panacea system is that uses NLP for cyber defense and engages the attacker using bots to elicit evidence to attribute to the attacker and to waste the attacker's time and resources.  ...  We describe Panacea, a system that supports natural language processing (NLP) components for active defenses against social engineering attacks.  ...  All statements of fact, opinion or conclusions contained herein are those of the authors and should not be construed as representing the official views or policies of DARPA, AFRL, Army, or the U.S.  ... 
dblp:conf/lrec/DaltonAABCCDDHI20 fatcat:qc7itugvnndm3i4l3nc56ja5xa

Cyber-Terrorism in The Context of Proselytizing, Coordination, Security, and Mobility

Iqbal Ramadhan
2020 Journal of Islamic World and Politics  
The simplicity and flexibility of information and technology have made human life more comfortable.  ...  Terrorist groups have been using these things to disseminate terror, recruit new members, fundraise, and mobilize their activities. Technology provides  ...  Aronson explained that intelligence gathering tends to come in the act of cyber spying activity.  ... 
doi:10.18196/jiwp.4252 fatcat:waorumilafgqpmhlltoxp35fv4

Halting Boko Haram / Islamic State's West Africa Province Propaganda in Cyberspace with Cybersecurity Technologies

Sunday Ogunlana
2019 Journal of Strategic Security  
Intelligence agencies such as the Department of State Security Services, Nigeria Intelligence Agency, Directorate of Defense Intelligence, and the Office of the National Security Adviser coordinate and  ...  As such, the role of cybersecurity technologies in tackling myriad cyber threats, including terrorists' activities in online platforms cannot be overemphasized.  ... 
doi:10.5038/1944-0472.12.1.1707 fatcat:hglppo35hjfp7ntvajzeqytcae

Choosing IT Platforms In The Age Of Stuxnet

Mohammad Dadashzadeh
2017 Journal of Cybersecurity Research (JCR)  
This paper addresses the question of choosing/investing in IT (hardware/software) platforms that avoid quick obsolescence and the underlying dilemmas of choosing proprietary software versus open source  ...  software, and governmental access to private data on managed services for national security reasons.  ...  Nevertheless, the importance of actively gathered intelligence on emerging/disruptive technologies as an input to the IT planning process (see Figure 1 ) cannot be overstated as it infuses maneuverability  ... 
doi:10.19030/jcr.v2i1.10076 fatcat:5wlg6wjagvhoxbdq3lnqffn7wa

Ballistic Missile Defense

Derek Leebaert, Ashton B. Carter, David N. Schwartz
1984 Journal of policy analysis and management  
Active defenses can never be considered in and of themselves a panacea for countering the proliferation of ballistic missiles and weapons of mass destruction.  ...  For these reasons, active defenses are playing a central and vital role in U.S. defense planning well into the next century.  ... 
doi:10.2307/3324576 fatcat:lw7detk3t5edxosywlzfmhs5ne

Ballistic missile defense

Geoffrey A. Landis
1984 Physics today  
Active defenses can never be considered in and of themselves a panacea for countering the proliferation of ballistic missiles and weapons of mass destruction.  ...  For these reasons, active defenses are playing a central and vital role in U.S. defense planning well into the next century.  ... 
doi:10.1063/1.2915898 fatcat:4znezj2mcfhxxjliwedcvqhi7y

Ballistic Missile Defense

Andrew J. Pierre, Ashton B. Carter, David N. Schwartz
1984 Foreign Affairs  
Active defenses can never be considered in and of themselves a panacea for countering the proliferation of ballistic missiles and weapons of mass destruction.  ...  For these reasons, active defenses are playing a central and vital role in U.S. defense planning well into the next century.  ... 
doi:10.2307/20041923 fatcat:ra3ceunocvelvogl7lkz5dmbqq

Ballistic Missile Defense [chapter]

David Hafemeister
2016 Nuclear Proliferation and Terrorism in the Post-9/11 World  
Active defenses can never be considered in and of themselves a panacea for countering the proliferation of ballistic missiles and weapons of mass destruction.  ...  For these reasons, active defenses are playing a central and vital role in U.S. defense planning well into the next century.  ... 
doi:10.1007/978-3-319-25367-1_5 fatcat:xkett4u5zzgc7ozqva22j57b54

Cooperative airborne monitoring: Opening the skies to promote peace, protect the environment, and cope with natural disasters

Dan Lindley
2006 Contemporary Security Policy  
(or other homeland) defense activities, and is just another form of spying, the U.S. has a program called the Defense Treaty Inspection Readiness Program (DTIRP) devoted to mitigating this problem.  ...  Geological Survey and the Defense Threat Reduction Agency, demonstrating the inherent flexibility of airborne monitoring capabilities. 45 U.S.  ... 
doi:10.1080/13523260600821517 fatcat:kyi7xkl6l5caxooi3soiiu7v5y

Laying an Intellectual Foundation for Cyberdeterrence: Some Initial Steps [chapter]

Herbert Lin
2013 The Secure Information Society  
This paper considers the basic question of how to effectively prevent, discourage, and inhibit hostile activity against important U.S. information systems and networks.  ...  Section 2.1 describes a broad context for cybersecurity, establishing its importance and characterizing the threat.  ...  In practice, active defense is possible only for certain kinds of cyberattack (e.g., denial-of-service attacks) and even then only when the necessary intelligence information on the appropriate targets  ... 
doi:10.1007/978-1-4471-4763-3_2 fatcat:f2b3uizcl5amjgmjp3ozni4p44

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies or Organizations

Ari Schwartz, Sejal Shah, Matthew MacKenzie, Sheena Thomas, Tara Potashnik, Bri Law
2017 Michigan Journal of Law Reform  
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights  ...  into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information  ...  a panacea.  ... 
doi:10.36646/mjlr.50.4.automating fatcat:vkv7ypwhbjfl7nfkmuzzu6ijqy

A Stable Nuclear Future? The Impact of Autonomous Systems and Artificial Intelligence [article]

Michael C. Horowitz, Paul Scharre, Alexander Velez-Green
2019 arXiv   pre-print
This paper evaluates the relative impact of autonomous systems and artificial intelligence in three areas: nuclear command and control, nuclear delivery platforms and vehicles, and conventional applications  ...  Additionally, the potential deployment of uninhabited, autonomous nuclear delivery platforms and vehicles could raise the prospect for accidents and miscalculation.  ...  While the system had to be operated by a person, once activated and initiated, the system offered the United States the ability to transmit the message even if, subsequent to activation, U.S. command centers  ... 
arXiv:1912.05291v2 fatcat:asnyt6i2rnanxjdubi5sfzirp4

Closing the Gap Between Law Enforcement and National Security Intelligence: Comparative Approaches

Diego Esparza, Thomas C. Bruneau
2019 The international journal of intelligence and counter intelligence  
of such agencies to detect, prevent, investigate, apprehend, and respond to criminal and terrorist activity." 42 Fusion centers were considered a panacea that would overcome the challenge of linking the  ...  Its role is to coordinate the intelligence production and activity within the IC itself, meaning those from the Department of National Defense, the Ministry of Economy, and the Ministry of Interior, including  ... 
doi:10.1080/08850607.2018.1522219 fatcat:nh7vqnx3jjcz3mtzs4p44u5hq4

Cybersecurity Information Sharing Governance Structures: An Ecosystem of Diversity, Trust, and Tradeoffs [article]

Elaine M. Sedenberg, James X. Dempsey
2018 arXiv   pre-print
some concerns regarding private sector liability in sharing activities.  ...  In recent years the cybersecurity policy debate in Washington has been dominated by calls for greater information sharing within the private sector, and between the private sector and the federal government  ...  We are grateful to the security experts and practitioners who spoke to us in the course of our research, and especially to Nicholas Weaver.  ... 
arXiv:1805.12266v1 fatcat:4ytc2a4hxbgzfdaagmzucosmcu
« Previous Showing results 1 — 15 out of 1,987 results