Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Part I: Understanding the Dark Side: Malicious Intent
Chapter 1: Analyzing the Malicious Individual
Analyzing the Unique Individual Richard Reid: The Shoe Bomber Ted Bundy: The Infamous Serial Murderer The Individual Cyber Attacker Modeling the Individual: Advantages and Disadvantages Advantages of AuBA #1: Automated Summarization In Summary
Chapter 2: Analyzing the Malicious Group
Understanding the Group Adversary Analyzing al-Qaeda Analyzing Hezbollah Analyzing the Coordinated Group Cyber Threat Advantages of AuBA #2: Theme-Guided Smart Searches In Summary
Chapter 3: Analyzing Country-Level Threats
Threats to Our National Infrastructure Analyzing the Specific Threat of Terrorist Attacks Improving Network Security Facing Chemical, Biological, Radiological, and Nuclear (CBRN) Threats Advantages of AuBA #3: Reducing Errors and Inefficiencies of Manual Predictive Modeling In Summary
Chapter 4: Threats and Security Nightmares: Our Current Reactive State of Security
Analyzing Mall, School, Workplace, and Other Seemingly Random Public Violence Unanticipated Terrorist Network Attacks Can Technology Detect First-Time Attacks? Advantages of AuBA #4: Building Predictive Applications In Summary
Chapter 5: Current Network Security
Hacking and National Network Security Growing Damage and Threat Assessing Current Technology Moving Toward Fixing Current Ineffective Network Protection Envisioning an Effective Future Network Protection Technology Advantages of AuBA #5: Conducting a Human Behavior Assessment of Threats from Network Packets In Summary
Chapter 6: Future Threats to Our National Security
Our Growing National Security Dependency on Computers and Networks Increasing Threat on a Global Basis The Dire Need for New Proactive Methods Advantages of AuBA #6: Automated Pattern Classification In Summary
Part II: Dissecting Malicious Behavior
Chapter 7: Applying Behavior Principles: Predicting Individual Malicious Behavior
Using a Behavior Analysis Methodology That Works Using Behavior Principles to Analyze Behavior Environmental Variables Different Environments, Different Antecedents Antecedents, Behavior, and Consequences Behavior Modeling Advantages of AuBA #7: Incorporating, Refining, and Expanding Behavior Principles for Global Security In Summary
Chapter 8: Applying Behavior Principles: Predicting Group Malicious Behavior
Analyzing Threat Group Attempts to Inflict Harm and Damage Moving from Analysis to Prediction of Malicious Behavior How Do You Know the Predictive Application Works? Advantages of AuBA #8: Automating Behavioral and Computer Sciences to Ensure Success In Summary
Chapter 9: Applying a Predictive Methodology: From Principles to Practice
Construction of Predictive Models What Is Needed: The Behavioral Methodologies Making Sure It Works: An Introductory Example Testing and Use in the Real World: Implications Advantages of AuBA #9: Designing the Focus of an AuBA-Developed Model In Summary
Chapter 10: Predicting Domestic Threat
Characterizing Domestic Threat The Malicious Insider: Spies, Thieves, and Sabotage Advantages of AuBA #10: Moving from Reactive to Proactive In Summary
Chapter 11: Computer Networks: Protection from External Threat
Protecting Against Known Attacks: Signature Detection Identifying Unknown and First-Time Attacks Forensics: Studying and Defining the Past Advantages of AuBA #11: Network Intrusion—Converting Digital Information to Human Behavior Assessment In Summary
Chapter 12: Computer Networks: Protection from Internal Threat
Defining the Insider Current Trends in Insider Threat Protection Advantages of AuBA #12: Powerful Predictive Analysis Engines That Fit on a Laptop In Summary
Chapter 13: Predicting Global Threat
Understanding State-Sponsored Threat Describing and Identifying Future Global Threat Understanding the Role of Network Forensics Determining State Support of Terrorist Activities Moving from Detection to Protection: A Major Leap Advantages of AuBA #13: The AuBA Behaviorprint and How It Compares to Signatures In Summary
Part III: Applying Tools and Methods
Chapter 14: Predictive Capability in Software: Tools for a New Approach
Fusing Computer and Behavioral Sciences Using the Computer's Speed and Memory to Our Benefit Human Bias: The Enemy to Accuracy and Analysis Capturing Cultural Nuances Moving from Theory to Practice: A Necessary Transition Advantages of AuBA #14: Incorporating Key Technological Advances In Summary
Chapter 15: Predictive Behavioral Modeling: Automated Tools of the Trade
Automated Behavior Analysis (AuBA) ThemeMate AutoAnalyzer Using the Advantages of Speed, Accuracy, and Lack of Bias Conducting Behavioral Modeling: Integrating ThemeMate and AutoAnalyzer Advantages of AuBA #15: What Is the AuBA Predictive Engine? In Summary
Chapter 16: Developing AuBA Applications
Modeling from Text Accounts of Past Behavior Modeling from Sensor Output Advantages of AuBA #16: Extending Our Analytical Brains In Summary
Chapter 17: Mastering AuBA Tools for Real-World Use
Predicting the Unpredictable: Identifying Future Malicious Behavior Advantages of AuBA #17: Versatility In Summary
Chapter 18: Analyzing Future Malicious Behavior
The Necessity of Context in Predicting Future Behavior Analyzing the Individual and the Group Analyzing Threat on a Global Level Implications for Security Advantages of AuBA #18: Automated Characterization of Network Attacks In Summary
Part IV: Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security
Chapter 19: AuBA Future Extensions Today
Predicting New Adversary Threat with Enhanced Accuracy A Behavioral Science–Based Paradigm Shift Advantages of AuBA #19: AuBA in the Future In Summary
Chapter 20: How to Predict Malicious Behavior: A Walkthrough
A Manual Walkthrough of AuBA Principles Moving Beyond the Clinical Setting to Expanded Environments: Automated Assist Full Automation of the Prediction of Human Behavior: Automated Behavior Analysis Advantages of AuBA #20: Final Thoughts In Summary
Foreword Introduction Download CD/DVD content
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion