Insider threats are one of the most damaging threats to modern systems. The ubiquity of cybersecurity problems related to insider threats promoted various solutions over the years. However, effective solutions are undermined by mathematical algorithms and host-based event driven techniques that...
The human brain has been modeled using the cognitive cycle, a continuous loop of detection, interpretation, and action which guides decision-making and task performance. In human-driven queues, these elements can affect queuing performance. However, increasing the number of servers is the...
In a 2007 memorandum, John Young, Under Secretary of Defense at that time, mandated the use of “competitive prototyping” strategies prior to the System Design and Development phase (Young, 2007). Department of Defense Instruction 5000.02 also includes considerations for prototyping in the...