Lisa Coote

TypePostAuthorRepliesLast updated
FileThe Fragility of Interdependency Lisa Coote03 years 18 weeks ago
FileIntelligence Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains Lisa Coote03 years 18 weeks ago
FileFrontiers in Massive Data Analysis Lisa Coote03 years 18 weeks ago
Filec3e-2014-atlanta.pdf Lisa Coote04 years 37 weeks ago
FileC3E Keysight Discovery .pptx Lisa Coote04 years 37 weeks ago
FileC3E_panel.pdf Lisa Coote04 years 37 weeks ago
Filemagill-c3e.pdf Lisa Coote04 years 37 weeks ago
FileMehadi_Hassen_Slides (2).pdf Lisa Coote04 years 37 weeks ago
EventOctober 2014 Computational Cybersecurity in Compromised Environments (C3E) Workshop Lisa Coote04 years 49 weeks ago
File2013 C3E Workshop Report Final Report.pdf Lisa Coote04 years 51 weeks ago
FileC3E 2014 GTRI Site Visit.pptx Lisa Coote05 years 12 weeks ago
FileC3E 2014 GTRI Site Visit.pptx Lisa Coote05 years 12 weeks ago
FileC3E 2014 GTRI Site Visit.pptx Lisa Coote05 years 12 weeks ago
FileC3E_2014_Workshop_Summary_v6_06Feb14.pptx Lisa Coote05 years 22 weeks ago
FileNavigating Cyberspace.pptx Lisa Coote05 years 23 weeks ago
FileConsequences Track Presentation.pptx Lisa Coote05 years 23 weeks ago
FileNavigating Cyberspace.pptx Lisa Coote05 years 23 weeks ago
FileConsequences Track Presentation.pptx Lisa Coote05 years 23 weeks ago
File2012 Final Report Lisa Coote05 years 24 weeks ago
FileReport to the President: Immediate Opportunities for Strengthening the Nations Cybersecurity Lisa Coote05 years 24 weeks ago
FileC3E 2013 Midyear Event Summary_Final.docx Lisa Coote05 years 24 weeks ago
EventJanuary 2014 Computational CyberSecurity In Compromised Environments (C3E) Workshop Lisa Coote05 years 24 weeks ago
FileC3E 2013 Midyear Event Agenda V2 7_26Apr13.docx Lisa Coote05 years 24 weeks ago
FileCopy of C3E - Traveler Jan 13-15.xlsx Lisa Coote05 years 24 weeks ago
FileNSF DIRECT DEPOSIT FORM (3).docx Lisa Coote05 years 24 weeks ago