OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti-users message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: REQUEST FAILURE FOR Re: [cti-users] REMOVE ME FROM THIS MAILINGLIST PLEASE


I am sorry, but your request was not in the correct STIX/TAXII format.

Please resubmit following the directions per the notification email
provided from MITRE


On 9/29/15 6:03 AM, Yilmaz, Mustafa wrote:
> Hi,
> 
> Could you remove me from this mailinglist please?
> Met vriendelijke groeten,
> 
> s1075935 - Mustafa Yilmaz
> s1075935@student.hsleiden.nl <mailto:s1075935@student.hsleiden.nl>
> 
> 
> 
>> Op 29 sep. 2015, om 14:58 heeft Shawn Riley <shawn.p.riley@GMAIL.COM
>> <mailto:shawn.p.riley@GMAIL.COM>> het volgende geschreven:
>>
>> Hi folks-
>>
>> In addition to the request for more information about knowledge
>> engineering and semantic web technology, I had quite a few requests
>> for additional information on another key focus of the CSCSS Science
>> of Cybersecurity paper, Activity-Based Intelligence. The following
>> articles and slide decks from the Defense and Intelligence Community
>> might provide some additional information and insights to help
>> understand why we wanted to show how this could be applied to
>> cybersecurity to advance cyber intelligence analysis tradecraft and
>> better enable organizations to understand the cybersecurity of their
>> ecosystem. (This is the last follow up, there were just to many people
>> with questions on this topic not to send a wider response.)
>>
>> *Activity-Based Intelligence: Revolutionizing Military Intelligence
>> Analysis*
>>
>> http://ndupress.ndu.edu/Media/News/NewsArticleView/tabid/7849/Article/581866/jfq-77-activity-based-intelligence-revolutionizing-military-intelligence-analys.aspx
>>
>> *DIA Modernizing Defense Intelligence: Object-Based Production and
>> Activity-Based Intelligence*
>>
>> https://www.ncsi.com/diaid/2013/presentations/johnston.pdf
>>
>> *NGA Activity Based Intelligence slide deck*
>>
>> http://usgif.org/system/uploads/3357/original/ABI_Slides_Approved_for_Public_Release_13-231_1_.pdf
>>
>> *Activity Based Intelligence: Understanding the Unknown*
>>
>> http://www.afio.com/publications/LONG_Tish_in_AFIO_INTEL_FALLWINTER2013_Vol20_No2.pdf
>>
>> Those looking for my CSCSS Science of Cybersecurity paper, the paper
>> can be downloaded from:
>>
>> *LinkedIn's Slideshare: *
>> http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem
>> <http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem&lt;/a&gt;%C2%A0&lt;/p&gt;&lt;p&gt;&lt;strong&gt;or> 
>>
>> *or from the CSCSS web site:*
>> http://cscss.org/wp-content/uploads/2015/08/CSCSS-Science-of-Security-Developing-Scientific-Foundations-for-the-Operational-Cybersecurity-Ecosystem.pdf
>> <http://cscss.org/wp-content/uploads/2015/08/CSCSS-Science-of-Security-Developing-Scientific-Foundations-for-the-Operational-Cybersecurity-Ecosystem.pdf&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;or>
>>
>> *or from ResearchGate:*
>> https://www.researchgate.net/publication/280949461_Science_of_Cybersecurity_-_Developing_Scientific_Foundations_for_the_Operational_Cybersecurity_Ecosystem
>> <https://www.researchgate.net/publication/280949461_Science_of_Cybersecurity_-_Developing_Scientific_Foundations_for_the_Operational_Cybersecurity_Ecosystem&lt;/a&gt;&lt;br&gt;&lt;br&gt;Cyber>
>>
>> Best regards,
>>
>> Shawn
>>
>>
>> On Sun, Aug 23, 2015 at 7:43 AM, Shawn Riley <shawn.p.riley@gmail.com
>> <mailto:shawn.p.riley@gmail.com>> wrote:
>>
>>     Hi Folks,
>>
>>     Back in 2012 when STIX was released, the white paper included a
>>     mention of other possible implementations such as semantic web
>>     (OWL/RDF) and JSON-centric. We've had Bret share details on his
>>     JSON efforts with the list so I wanted to take the opportunity to
>>     share our research paper on using semantic web technologies
>>     (OWL/RDF) with the group. This isn't marketing as there is no
>>     company or product mentioned. Rather, we're just sharing knowledge
>>     based on our international research efforts. Given the ongoing
>>     debate over XML vs JSON, we thought it would also be good to show
>>     how both of these could be supported using the semantic technology
>>     approach. 
>>
>>     In many ways our research "connected the dots" between existing
>>     cybersecurity efforts across different government agencies that
>>     have been identified by the government as the way forward. From
>>     the Science of Security championed by National Security Agency and
>>     National Science Foundation, to the Cybersecurity Measurement and
>>     Management Architecture championed by the Department of Homeland
>>     Security and the Department of Defense, and the revolutionary
>>     intelligence methodologies (object-based production /
>>     activity-based intelligence) championed by the Intelligence
>>     Community and particularly the National Geospatial-Intelligence
>>     Agency.
>>
>>     While each of these cybersecurity and intelligence efforts can
>>     stand on its own and provide great benefit, bringing these efforts
>>     together demonstrates how each agency's investments can see a
>>     greater return on investment by working together to develop
>>     scientific foundations for the operational cybersecurity
>>     ecosystem. Just like we need infrastructure in areas like
>>     Meteorology to understand and predict the weather we need
>>     operational cybersecurity science infrastructure to understand and
>>     predict events in our cyber ecosystem of the future.
>>
>>     The paper can be downloaded from LinkedIn's Slideshare.
>>     http://www.slideshare.net/shawnriley2/cscss-science-of-security-developing-scientific-foundations-for-the-operational-cybersecurity-ecosystem
>>
>>     Best,
>>     Shawn
>>
>>     Shawn Riley
>>     Executive Vice President
>>     Centre for Strategic Cyberspace + Security Science
>>     London, England, UK - Washington, DC, USA
>>
>>
> 
> Op deze e-mail zijn de voorwaarden van toepassing als vermeld op:
> The following conditions apply to this e-mail:
> http://www.hsleiden.nl/disclaimer-email
> 

Attachment: signature.asc
Description: OpenPGP digital signature



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]