2020


Mitigation Factors for Multi-domain Resilient Networked Distributed Tessellation Communications


S. Chan

The Fifth International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2020), p. 66-73, 2020.

Resilient Communications Availability: Inverting the Confidentiality, Integrity, and Availability Paradigm


S. Chan

The Fifth International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2020), p. 58-65, 2020.

2019


Annealed Cyber Resiliency: Cyber Discernment for the Launch Providers of Space System


S. Chan and B. Griffin

The Fourth International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2019), p. 55-61, 2019.

2018


Prototype Orchestration Framework as a High Exposure Dimension Cyber Defense Accelerant Amidst Ever-Increasing Cycles of Adaptation by Attackers: A Modified Deep Belief Network Accelerated by a Stacked Generative Adversarial Network for Enhanced Event Correlation


S. Chan

The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018), p. 28-38, 2018.

Prototype Open-Source Software Stack for the Reduction of False Positives and Negatives in the Detection of Cyber Indicators of Compromise and Attack: Hybridized Log Analysis Correlation Engine and Container-Orchestration System Supplemented by Ensemble Method Voting Algorithms for Enhanced Event Correlation


S. Chan

The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018), p. 39-48, 2018.

Countering an Anti-Natural Language Processing Mechanism in the Computer-Mediated Communication of “Trusted” Cyberspace Operations: Bi-Normal Separation Feature Scaling for Informing a Modified Association Matrix


S. Chan

The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018), p. 56-72, 2018.

Harnessing Machine Learning, Data Analytics, and Computer-Aided Testing for Cyber Security Applications: Achieving Sustained Cyber Resilience for Typical Attack Surface Configurations and Environments


T. Klemas and S. Chan

The Third International Conference on Cyber-Technologies and Cyber-Systems (CYBER 2018), p. 63-67, 2018.