• Home
  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Cybersecurity Related Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Login / Register

CSIAC

Cyber Security and Information Systems Information Analysis Center

header-right

Main navigation

  • Resources
    • Cybersecurity Policy Chart
    • CSIAC Reports
    • Webinars
    • Podcasts
    • Cybersecurity Digest
    • Standards & Reference Docs
    • Journals
    • Certifications
    • Acronym DB
    • Topic Tags
    • Cybersecurity Websites
  • Services
    • Free Technical Inquiry
    • CAT Program
    • Subject Matter Experts
    • Store
    • Training
    • Contact
  • Community
    • Upcoming Events
    • Cybersecurity
    • Modeling & Simulation
    • Knowledge Management
    • Software Engineering
    • Cyber COI
  • About
    • About the CSIAC
    • The CSIAC Team
    • DTIC’s IAC Program
    • DTIC’s R&E Gateway
    • Inquiries & CAT’s
    • FAQ’s
    • DTIC STI Program
  • Cart
  • Cybersecurity
  • Modeling & Simulation
  • Knowledge Management
  • Software Engineering
  • Cyber COI
/ Authors & Presenters / Paul Yu

Paul Yu

Paul Yu (Member, IEEE) received a B.S. in Mathematics, a B.S. degree in Computer Engineering, and a Ph.D. degree in Electrical Engineering, all at the University of Maryland, College Park. Since 2006, he has been with the U.S. Army Research Laboratory (ARL) where his work is in the area of signal processing for wireless networking and autonomy. He received the Outstanding Invention of the Year award in 2008 and the Jimmy Lin Award for Innovation and Invention in 2009, both from the University of Maryland, and a Best Paper award at the 2008 Army Science Conference.

Journal Articles

  • Synergistic Architecture for Human-Machine Intrusion Detection

    Modern day detection of cyber threats is a highly manual process where teams of human analysts flag suspicious events while using assistive tools such as Bro and Snort. It is the analysts’ ability to discern suspicious activity and authority to make decisions on threats that place humans into central roles in the threat detection process. However, over-reliance on human ability can lead to a high volume of undetected threats. As the tempo, diversity and complexity of cyberspace threats continues to increase, this shortcoming can only worsen. Therefore, there is a need for a new detection paradigm that is largely automated but where analysts maintain situational awareness and control of the process. We propose a synergistic detection process that captures the benefits of human cognition and machine computation while mitigating their weaknesses. The analyst provides context and domain knowledge, and the machines provide the ability to handle vast data at speed.

Reader Interactions

Leave a Comment Cancel

You must be logged in to post a comment.

sidebar

Blog Sidebar

Featured Content

CSIAC Journal - Serious Games to Enhance Defense Capabilities

CSIAC Journal Cover Volume 5 Number 4

This 2017 special edition of the CSIAC Journal focuses on wargames and the many uses of Modeling and Simulation (M&S) that support decision making needed at the various levels of combat.

Read the Journal

CSIAC Report - Defense Acquisition University Secure Systems Design Course Experiment

CSIAC developed a course experiment with the Defense Acquisition University (DAU) Cybersecurity Enterprise Team. The goal of this exercise was to study the techniques & strategies used to provide cybersecurity-based training, in an effort to educate the entire acquisition workforce on cybersecurity best practices & techniques.

Read the Report

CSIAC Journal - Design and Development Process for Assured Software

CSIAC Journal Cover Volume 5 Number 2

This is Volume 1 of 2 special edition issues on Software Assurance. This edition explores different aspects of developing, deploying and training on how to build assured software.

Read the Journal

CSIAC Journal - Tools & Testing Techniques for Assured Software

CSIAC Journal Cover Volume 5 Number 3

This is Volume 2 of 2 special edition issues on Software Assurance. This edition explores different aspects of software assurance competencies that can be used to improve software assurance functions and how to develop/deploy assured software throughout the lifecycle acquisition process.

Read the Journal

Recent Video Podcasts

  • CS Digest Roundtable #2: Meltdown/Spectre, NIST Framework, GDPR Policy, and Romanian Hackers Series: The CSIAC Podcast
  • CS Digest Roundtable #1: Emotet Trojan, Cryptojacking, and User Data Exposure Series: The CSIAC Podcast
  • Cybersecurity of DOD Critical Infrastructure Series: CSIAC Webinars
  • Challenges to Critical Infrastructure Series: Cyber Awareness Videos
  • Emerging Concepts to Critical Infrastructure Series: Cyber Awareness Videos
View all Podcasts

Resource Topic Tags

Critical Infrastructure Protection (CIP) Data Security Internet of Things (IoT) Ransomware Cybersecurity Network Security Insider Threat Mobile Security Quantum Computing Cyber Warfare Cloud Computing Workplace Security Artificial Intelligence (AI) Cyber Legislation Phishing Risk Management Framework (RMF) Protecting Controlled Unclassified Information (CUI) Modeling & Simulation Password Security Software Assurance Software Engineering IT Security Encryption Hacking Malware Intrusion Detection National Institute of Standards and Technology [NIST] DISA Air Force Research Laboratory (AFRL) Open Source Software

Upcoming Events

Wed 25

MODSIM World 2018

April 24 - April 26
Norfolk VA
United States
May 01

SANS Automotive Cybersecurity Summit

May 1 - May 8
Chicago IL
United States
Organizer: SANS
May 14

Northsec

May 14 - May 20
Old Montreal Quebec
Canada
Jun 11

Transport Security and Safety Expo – TSSX 2018

June 11 - June 12
Washington DC
United States
Jun 25

AIAA Modeling and Simulation Technologies Conference

June 25 - June 29
Alanta GA
United States
View all Events

Recently Active Members

Profile picture of carrjl
Profile picture of rentacoptech
Profile picture of rdwyman
Profile picture of jreade
Profile picture of jrthompson550
Profile picture of bthompson
Profile picture of harrisog
Profile picture of rileysperati
Profile picture of nrea13
Profile picture of logatone
Profile picture of rdmartinez
Profile picture of robrosh
Profile picture of dcopperwheat1
Profile picture of glesher16
Profile picture of ibernaar
Profile picture of harrison785
Profile picture of james
Profile picture of glarcombe

Footer

CSIAC Products & Services

  • Free Technical Inquiry
  • Core Analysis Tasks (CATs)
  • Resources
  • Events Calendar
  • Frequently Asked Questions
  • Product Feedback Form
  • CSIAC Store

About CSIAC

The CSIAC is a DoD-sponsored Center of Excellence in the fields of Cybersecurity, Software Engineering, Modeling & Simulation, and Knowledge Management & Information Sharing.Learn More

Contact Us

Phone:800-214-7921
Email:info@csiac.org
Address:   266 Genesee St.
Utica, NY 13502
Send us a Message
ASD(R&E) LogoUS Department of Defense LogoDoD IACs LogoDTIC LogoTEMS Logo

Copyright 2018, Quanterion Solutions Incorporated

Sitemap | Privacy Policy | Terms of Use | Accessibility Information