[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: REQUEST FAILURE FOR Re: [cti-users] REMOVE ME FROM THIS MAILINGLIST PLEASE
I am sorry, but your request was not in the correct STIX/TAXII format. Please resubmit following the directions per the notification email provided from MITRE On 9/29/15 6:03 AM, Yilmaz, Mustafa wrote: > Hi, > > Could you remove me from this mailinglist please? > Met vriendelijke groeten, > > s1075935 - Mustafa Yilmaz > s1075935@student.hsleiden.nl <mailto:s1075935@student.hsleiden.nl> > > > >> Op 29 sep. 2015, om 14:58 heeft Shawn Riley <shawn.p.riley@GMAIL.COM >> <mailto:shawn.p.riley@GMAIL.COM>> het volgende geschreven: >> >> Hi folks- >> >> In addition to the request for more information about knowledge >> engineering and semantic web technology, I had quite a few requests >> for additional information on another key focus of the CSCSS Science >> of Cybersecurity paper, Activity-Based Intelligence. The following >> articles and slide decks from the Defense and Intelligence Community >> might provide some additional information and insights to help >> understand why we wanted to show how this could be applied to >> cybersecurity to advance cyber intelligence analysis tradecraft and >> better enable organizations to understand the cybersecurity of their >> ecosystem. (This is the last follow up, there were just to many people >> with questions on this topic not to send a wider response.) >> >> *Activity-Based Intelligence: Revolutionizing Military Intelligence >> Analysis* >> >> http://ndupress.ndu.edu/Media/News/NewsArticleView/tabid/7849/Article/581866/jfq-77-activity-based-intelligence-revolutionizing-military-intelligence-analys.aspx >> >> *DIA Modernizing Defense Intelligence: Object-Based Production and >> Activity-Based Intelligence* >> >> https://www.ncsi.com/diaid/2013/presentations/johnston.pdf >> >> *NGA Activity Based Intelligence slide deck* >> >> http://usgif.org/system/uploads/3357/original/ABI_Slides_Approved_for_Public_Release_13-231_1_.pdf >> >> *Activity Based Intelligence: Understanding the Unknown* >> >> http://www.afio.com/publications/LONG_Tish_in_AFIO_INTEL_FALLWINTER2013_Vol20_No2.pdf >> >> Those looking for my CSCSS Science of Cybersecurity paper, the paper >> can be downloaded from: >> >> *LinkedIn's Slideshare: * >> http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem >> <http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem</a>%C2%A0</p><p><strong>or> >> >> *or from the CSCSS web site:* >> http://cscss.org/wp-content/uploads/2015/08/CSCSS-Science-of-Security-Developing-Scientific-Foundations-for-the-Operational-Cybersecurity-Ecosystem.pdf >> <http://cscss.org/wp-content/uploads/2015/08/CSCSS-Science-of-Security-Developing-Scientific-Foundations-for-the-Operational-Cybersecurity-Ecosystem.pdf</a></p><p><strong>or> >> >> *or from ResearchGate:* >> https://www.researchgate.net/publication/280949461_Science_of_Cybersecurity_-_Developing_Scientific_Foundations_for_the_Operational_Cybersecurity_Ecosystem >> <https://www.researchgate.net/publication/280949461_Science_of_Cybersecurity_-_Developing_Scientific_Foundations_for_the_Operational_Cybersecurity_Ecosystem</a><br><br>Cyber> >> >> Best regards, >> >> Shawn >> >> >> On Sun, Aug 23, 2015 at 7:43 AM, Shawn Riley <shawn.p.riley@gmail.com >> <mailto:shawn.p.riley@gmail.com>> wrote: >> >> Hi Folks, >> >> Back in 2012 when STIX was released, the white paper included a >> mention of other possible implementations such as semantic web >> (OWL/RDF) and JSON-centric. We've had Bret share details on his >> JSON efforts with the list so I wanted to take the opportunity to >> share our research paper on using semantic web technologies >> (OWL/RDF) with the group. This isn't marketing as there is no >> company or product mentioned. Rather, we're just sharing knowledge >> based on our international research efforts. Given the ongoing >> debate over XML vs JSON, we thought it would also be good to show >> how both of these could be supported using the semantic technology >> approach. >> >> In many ways our research "connected the dots" between existing >> cybersecurity efforts across different government agencies that >> have been identified by the government as the way forward. From >> the Science of Security championed by National Security Agency and >> National Science Foundation, to the Cybersecurity Measurement and >> Management Architecture championed by the Department of Homeland >> Security and the Department of Defense, and the revolutionary >> intelligence methodologies (object-based production / >> activity-based intelligence) championed by the Intelligence >> Community and particularly the National Geospatial-Intelligence >> Agency. >> >> While each of these cybersecurity and intelligence efforts can >> stand on its own and provide great benefit, bringing these efforts >> together demonstrates how each agency's investments can see a >> greater return on investment by working together to develop >> scientific foundations for the operational cybersecurity >> ecosystem. Just like we need infrastructure in areas like >> Meteorology to understand and predict the weather we need >> operational cybersecurity science infrastructure to understand and >> predict events in our cyber ecosystem of the future. >> >> The paper can be downloaded from LinkedIn's Slideshare. >> http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem >> >> Best, >> Shawn >> >> Shawn Riley >> Executive Vice President >> Centre for Strategic Cyberspace + Security Science >> London, England, UK - Washington, DC, USA >> >> > > Op deze e-mail zijn de voorwaarden van toepassing als vermeld op: > The following conditions apply to this e-mail: > http://www.hsleiden.nl/disclaimer-email >
Attachment:
signature.asc
Description: OpenPGP digital signature
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]