3. CONFERENCE PROCEEDINGS

1. Azar, P., Chen, J., and Micali, S. (2012).  Crowdsourced Bayesian auctions. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (ITCS 2012) (pp. 236-248). Cambridge, Massachusetts. link
2. Azar, P. and Micali, S. (2012). Rational proofs. Proceedings of the forty-fourth annual ACM symposium on Theory of computing (STOC 2012) (pp. 1017-1028). New York, New York, USA. link
3. Basuchoudhary, A., and Choucri, N. (2014). The evolution of network based cybersecurity norms: An analytical narrative. Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) (pp. 646-653). Redwood City, CA. link
4. Choucri, N. (2012). Emerging Trends in Cyberspace: Dimensions and Dilemmas. Presented at Cyberspace: Malevolent actors, criminal opportunities & strategic competition. The Matthew B. Ridgway Center for International Security Studies. University of Pittsburg. pdf
5. Choucri, N. (2013, October). Co-Evolution of Cyberspace and International Relations: New Challenges for the Social Sciences. Paper presented at the World Social Science Forum (WSSF) 2013, Montreal, Canada. pdf
6. Clark, D. D. and Landau, S. (2010). Untangling Attribution. In National Research Council (U.S.). Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. policy. Washington, D.C: National Academies Press. link
7. Clark, D. D. and Landau, S. (2010). The Problem Isn't Attribution; It's Multi-stage Attacks. Proceedings of the Re-Architecting the Internet Workshop (ReARCH '10). Philadelphia, Pennsylvania. link
8. Finlayson, M. (2011). The Story Workbench: An Extensible Semi-Automatic Text Annotation Tool. Proceedings of the 4th Workshop on Intelligent Narrative Technologies (pp. 21-24). Stanford, CA.  link
9. Finlayson, M. (2011). Corpus Annotation in Service of Intelligent Narrative Technologies. Proceedings of the 4th Workshop on Intelligent Narrative Technologies (pp. 17-20). Stanford, CA. link
10. Finlayson, M. (2012). Sets of Signals, Information Flow, and Folktales. Proceedings of the Centennial Turing Conference, Special Session on Open Problems in the Philosophy of Information. Cambridge, England. link
pdf
11. Finlayson, M. (Ed.) (2012). The Third Workshop on Computational Models of Narrative, (CMN’12). link
12. Finlayson, M., and Hervás, R. The Prevalence of Descriptive Referring Expressions. Proceedings of the ACL 2010 Conference Short Papers (pp. 49–54). Uppsala, Sweden.  link
13. Finlayson, M., and Kulkarni, N.,  (2011). “jMWE: A Java Toolkit for Detecting Multi-Word Expressions. Proceedings of the 8th Workshop on Multiword Expressions: from Parsing and Generation to the Real World, (MWE 2011) (pp. 122-124). Portland, OR.   link
14. Friedman, A., Moore, T., and Procaccia, A. D. (2010). Would a ‘Cyber Warrior’ Protect Us? Exploring Trade-offs Between Attack and Defense of Information Systems. Proceedings of the 2010 New Security Paradigms Workshop (pp. 85-94). Concord, MA. link
15. Goldsmith, D., and Siegel, M. (2012). Cyber Politics: Understanding the use of Social Media for Dissident Movements in an Integrated State Stability Framework. IEEE Proceedings of the 2012 International Conference on Advances in Social Network Analysis and Mining (ASONAM 2012) (pp. 1321-1328). Istanbul, Turkey. link
16. Houghton, J., Siegel, M., and Goldsmith, D. (2013). Modeling the Influence of Narratives on Collective Behavior Case Study: Using social media to predict the outbreak of violence in the 2011 London Riots. Proceedings of The 31st International Conference of the System Dynamics Society. Cambridge, MA. link
17. Houghton, J., Siegel, M., Wirsch, A., Moulton, A., Madnick, S., and Goldsmith, D. (2014). “A Survey of Methods for Data Inclusion in System Dynamics Models. Proceedings of the 32nd International Conference of the System Dynamics Society. Delft, Netherlands. link
18. Houghton, J. Siegel, M. Vukovic, M. (2014, November). Towards a Model for Resource Allocation in API Value Networks. Paper presented at the Intelligent Service Clouds Workshop. Paris, France. link
19. Hurwitz, R. (2012, March). Taking Care: Four Takes on the Cyber Steward. Paper presented at CyberDialogue 2012: What is Stewardship in Cyberspace? Canada Centre for Global Security Studies at the Munk School of Global Affairs, Toronto, Ontario, Canada. link
20 Hurwitz R. (2011, October). An Augmented Summary of The Harvard, MIT and University of Toronto Cyber Norms Workshop. The Harvard, MIT and U. of Toronto Cyber Norms Workshop. Cambridge, MA. pdf
21. Hurwitz, R., and Winston, P. H. (2011, March). Computational Representations of High Profile International Cyber Incidents. Paper presented to the panel Multi-Disciplinary Methods for Cyberspace Research at the Annual Meeting of the International Studies Association. Montreal, Quebec, Canada. pdf
22. Krakauer, C., and Winston, P. H. (2012). Story Retrieval and Comparison using Concept Patterns. In Finlayson. M. A., Gervas P., Yuret, D., & Bex, F. (Eds.), Proceedings of the 3rd workshop on Computational Models of Narrative, ELRA 3 (pp. 119-124). link
23. Madnick, S., Choucri, N., Steven C., and Woon W. (2012). Towards Better Understanding Cybersecurity: or are "Cyberspace" and "Cyber Space" the Same? Proceedings of the Workshop on Information Security & Privacy (WISP 2012). Paper 27. link
24. Madnick, S., Choucri, N., Xitong, L. and Ferwerda, J. (2011). Comparative Analysis of Cybersecurity Metrics to Develop New Hypotheses. Proceedings of the Workshop on Information Security & Privacy (WISP2011) (Jointly hosted by AIS SIGSEC and IFIP TC11.1). Shanghai, China. link
pdf
25. Madnick, S., Xitong, L., and Choucri, N.  (2009). Experiences and Challenges with using CERT Data to Analyze International Cyber Security. Proceedings of the AIS SIGSEC Workshop on Information Security & Privacy (WISP 2009). Phoenix, Arizona. link
26. Mallery, J. (2011, June). Trustworthy Cloud Computing: Risks, Challenges And Recommendations. Paper presented at the 2011 Workshop on Cyber Security and Global Affairs. Budapest, Hungary link
27. Mallery, J. (2011). International Data Exchange and A Trustworthy Host: Focal Areas For International Collaboration In Research And Education. Proceedings of the BIC Annual Forum, Brussels, Belgium.  link
28. Raja, A., Kennedy, C., and Hurwitz, R. (2012). Socially Intelligent Agents to support Ethical Decision-making. Proceedings of AAMAS 2012 First International Workshop on Human-Agent Interaction Design and Models (pp. 123-130). Valencia, Spain. link
29. Reardon, R., and Choucri, N. (2012, April). The Role of Cyberspace in International Relations: A View of the Literature. Paper prepared for the 2012 ISA Annual Convention. San Diego, CA. pdf
30. Sechrist, M., Vaishnav, C., Goldsmith, D. and Choucri, N. (2012). The Dynamics of Undersea Cables: Can the Old Modes of Governance Cope with New Demands of the Cyberspace? Proceedings of the 30th International Conference of the System Dynamics Society. St. Gallen, Switzerland.  link
pdf
31. Shukla, A., & Hurwitz, R. (2012, April). A Framework for Organizing National Security Strategies. Paper presented to the panel on Comparative Security Strategies at the International Studies Association Annual Meeting, San Diego, CA.  link
32. Sowell, J. H. (2010). Mixed Context and Privacy. Proceedings of the 38th Research Conference on Communication, Information and Internet Policy, Telecommunications Policy Research Consortium. Farnham, VA. link
33. Sowell, J. H. (2012). Empirical Studies of Bottom-up Internet Governance. Proceedings of the 40th Research Conference on Communication, Information and Internet Policy. Telecommunications Policy Research Consortium. Arlington, VA.  pdf
34. Sowell, Jesse H. (2013). A View of Top-Down Governance. Paper presented to NANOG 55. Vancouver BC. video
35. Vaishnav, C., Choucri, N., and Clark, D. D. (2012). Cyber International Relations as an Integrated System. Presented at Third International Engineering Symposium, CESUN 2012, Delft University of Technology.  pdf
36. Wolff, J., Young, W. E., Smith, E. (2013, June). The Atlantic Council’s Cyber 9/12: Student Challenge. Washington, DC. pdf