Sciweavers

22 search results - page 1 / 5
» Cyber defense technology networking and evaluation
Sort
View
CACM
2004
81views more  CACM 2004»
13 years 4 months ago
Cyber defense technology networking and evaluation
Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert B...
NCA
2003
IEEE
13 years 10 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
13 years 11 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
PADS
2005
ACM
13 years 10 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
SPRINGSIM
2007
13 years 6 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter