SC12 Home > SC12 Schedule > SC12 Presentation - Cyber Securitys Big Data, Graphs, and Signatures

SCHEDULE: NOV 10-16, 2012

When viewing the Technical Program schedule, on the far righthand side is a column labeled "PLANNER." Use this planner to build your own schedule. Once you select an event and want to add it to your personal schedule, just click on the calendar icon of your choice (outlook calendar, ical calendar or google calendar) and that event will be stored there. As you select events in this manner, you will have your own schedule to guide you through the week.

Cyber Securitys Big Data, Graphs, and Signatures

SESSION: Cyber Securitys Big Data, Graphs, and Signatures

EVENT TYPE: Birds of a Feather

TIME: 5:30PM - 7:00PM

SESSION LEADER(S):Daniel M. Best

ROOM:250-AB

ABSTRACT:
Cyber security increases in complexity and network connectivity every day. Todays problems are no longer limited to malware using hash functions. Interesting problems, such as coordinated cyber events, involve hundreds of millions to billions of nodes and similar or more edges. Nodes and edges go beyond single attribute objects to become multivariate entities depicting complex relationships with varying degree of importance. To unravel cyber securitys big data, novel and efficient algorithms are needed to investigate graphs and signatures. We bring together domain experts from various research communities to talk about current techniques and grand challenges being researched to foster discussion.

Session Leader Details:

Daniel M. Best (Primary Session Leader) - Pacific Northwest National Laboratory

Add to iCal  Click here to download .ics calendar file

Add to Outlook  Click here to download .vcs calendar file

Add to Google Calendarss  Click here to add event to your Google Calendar

Cyber Securitys Big Data, Graphs, and Signatures

SESSION: Cyber Securitys Big Data, Graphs, and Signatures

EVENT TYPE:

TIME: 5:30PM - 7:00PM

SESSION LEADER(S):Daniel M. Best

ROOM:250-AB

ABSTRACT:
Cyber security increases in complexity and network connectivity every day. Todays problems are no longer limited to malware using hash functions. Interesting problems, such as coordinated cyber events, involve hundreds of millions to billions of nodes and similar or more edges. Nodes and edges go beyond single attribute objects to become multivariate entities depicting complex relationships with varying degree of importance. To unravel cyber securitys big data, novel and efficient algorithms are needed to investigate graphs and signatures. We bring together domain experts from various research communities to talk about current techniques and grand challenges being researched to foster discussion.

Session Leader Details:

Daniel M. Best (Primary Session Leader) - Pacific Northwest National Laboratory

Add to iCal  Click here to download .ics calendar file

Add to Outlook  Click here to download .vcs calendar file

Add to Google Calendarss  Click here to add event to your Google Calendar