Skip to main content
This report was completed in order to fulfill their Capstone graduation requirement for the Master of Public Administration/Master of International Affairs program at Columbia University’s School of International and Public Affairs... more
    • by 
    •   9  
      Information Technology, Information Security, Cybercrimes, Network Security
China is the most aggressive campaign to penetrate America businesses. China and the (PRC) People's Republic of China and the (PLA) People's Liberation Army of China has proceeded with an unparalleled cyberespionage operation against the... more
    • by 
    •   3  
      China, Advanced Persistent Threats, Cyber Security
The idea to connect everything to anything and at any point of time is what vaguely defines the concept of the Internet of Things (IoT). The IoT is not only about providing connectivity but also facilitating interaction among these... more
    • by  and +1
    •   19  
      Information Security, Privacy, Network Security, International Security
A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with incident... more
    • by  and +1
    •   13  
      Information Systems, Neuroscience, Computer Science, Artificial Intelligence
According to Kaspersky Lab research, APT – Advanced Persistent Threats – are one of the biggest threats in IT as of 2016. Organised groups, keeping contact in various languages, have attacked the IT systems of financial institutions,... more
    • by  and +1
    •   4  
      Cyberspace, Cyberwarfare, Cybersecurity, Advanced Persistent Threats
Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via... more
    • by  and +1
    •   14  
      Information Security and Privacy, Cloud Computing, Social Networking Security and Privacy, Advanced Persistent Threats
‘Illegals’ are extensively trained individuals dispatched abroad under false identities with no observable links to their operating country. Technology has made possible a new kind of ‘virtual illegal,’ one that extends beyond the... more
    • by 
    •   7  
      Intelligence, HUMINT-Human Intelligence, Advanced Persistent Threats, Cyber Security
The term Advanced Persistent Threats (APT, APTs) has a relatively short history – originated in the United States' government spheres and as such was referred to cyber attacks waged by a state actor. The emergence of such threats has been... more
    • by 
    •   5  
      Cyber Warfare, Advanced Persistent Threats, Cyber Security, Cyberwar
This study develops defense strategies against sophisticated and well-funded cyber-attacks that can cause extensive damage to major organizations. We develop and analyze a game between a cyber-attacker and a defender operating a network... more
    • by 
    •   4  
      Economics, Game Theory, Cybersecurity, Advanced Persistent Threats
In general, network attack should be prohibited and information security technology should contribute to improve the trust of network communication. Almost network communication is based on IP packet that is standardized by the... more
    • by 
    •   15  
      Network Virtual Environment, Topology, Communication Networks, Networking
Demonstration of the CADETS/OPUS UI, originally given at the Transparent Computing PI meeting at DARPA.
    • by 
    •   5  
      Information Security, Network Security, Computer Security, Advanced Persistent Threats
Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker targets a specific individual or organisation with a predefined goal. This typically involves exfiltration of confidential material,... more
    • by 
    •   6  
      Computer Science, Operating Systems, Network Security, Provenance
According to Kaspersky Lab research, Advanced Persistent Threats which include long-term, advanced cybercriminal campaigns are the most serious threat in 2016. Advanced groups contacting in different languages, are attacking information... more
    • by  and +1
    •   5  
      Cyberwarfare, Cybersecurity, Advanced Persistent Threats, Threats to information security
    • by 
    •   8  
      Cyber Warfare, Cybersecurity, Advanced Persistent Threats, Cyber Security
Cyber Threat Intelligence (CTI) programs provide critical analysis and support to cyber threat detection and mitigation. These programs can also support the process of attributing Advanced Persistent Threat (APT) attacks to specific... more
    • by 
    •   3  
      Intelligence Studies, Cybersecurity, Advanced Persistent Threats
This research paper focuses on the currently trending issue Advanced Persistent Threats (APT), which use sophisticated techniques to break into an organization and clandestinely steal valuable data from targeted companies causing severe... more
    • by 
    •   5  
      Advanced Persistent Threats, Cyber Threat Intelligence, Zero day attack detection, ransomware
The paper looks into the issue of proactive advanced persistent threats (APTs) identification in modern social networks. As these threats are quite unnoticeable and require a long-term, comprehensive monitoring of both technologies and... more
    • by 
    •   4  
      Human Factors, Online social networks, Advanced Persistent Threats, Cyber Security
This article was presented at the European Cyber Security Summit 2016 in Prague Czech Republic. The focus was on the following points: - Fundamentals of Cyber Intelligence - Strategic To Tactical Approach - Understanding The Cyber Kill... more
    • by 
    •   16  
      African Studies, European Studies, Russian Studies, Chinese Studies
Today's evolving cyber security threats demand new, modern, and cognitive computing approaches to network security systems. In the early years of the Internet, a simple packet inspection firewall was adequate to stop the then-contemporary... more
    • by 
    •   18  
      Machine Learning, Estimation and Filtering Theory, Computational Intelligence, Data Analysis
    • by 
    •   32  
      Psychology, Clinical Psychology, Cognitive Psychology, Community Psychology