Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
Ghosh, A., Gottlieb, Y. M., Naidu, A., Vashist, A., Poylisher, A., Kubota, A., Sawaya, Y., Yamada, A.
Published in China communications (01.03.2013)
Published in China communications (01.03.2013)
Get full text
Journal Article
TREND: Trust estimation system for wireless networks via multi-pronged detection
Chadha, Ritu, Ghosh, Abhrajit, Poylisher, Alexander, Serban, Constantin
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Get full text
Conference Proceeding
Insider attack detection using weak indicators over network flow data
Pagliari, Roberto, Ghosh, Abhrajit, Gottlieb, Yitzchak M., Chadha, Ritu, Vashist, Akshay, Hadynski, Gregory
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Get full text
Conference Proceeding
Integrated network experimentation for QoS measurements in opaque MANETs
Biswas, Pratik K., Poylisher, Alex, Chadha, Ritu, Ghosh, Abhrajit
Published in International journal of network management (01.07.2010)
Published in International journal of network management (01.07.2010)
Get full text
Journal Article
QAM: A comprehensive QoS-aware Middleware suite for tactical communications
Poylisher, A., Sultan, F., Ghosh, A., Shi-wei Li, Chiang, C. J., Chadha, R., Moeltner, K., Jakubowski, K.
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Get full text
Conference Proceeding
Managing network security policies in tactical MANETs using DRAMA
Yuu-Heng Cheng, Ghosh, A, Chadha, R, Gary, M L, Wolberg, M, Chiang, C J, Hadynski, G
Published in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (01.10.2010)
Published in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (01.10.2010)
Get full text
Conference Proceeding
QoS-aware Adaptive Middleware (QAM) for tactical MANET applications
Ghosh, A, Shih-wei Li, Chiang, C J, Chadha, R, Moeltner, K, Ali, S, Kumar, Y, Bauer, R
Published in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (01.10.2010)
Published in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (01.10.2010)
Get full text
Conference Proceeding
网络攻击检测中基于RTFF的大容量数据管理
Abhrajit Ghosh, Yitzchak M.Gottlieb, Aditya Naidu, Akshay Vashist, Alexander Poylisher, Ayumu Kubota, Yukiko Sawaya, Akira Yamada
Published in 中国通信 (2013)
Get full text
Published in 中国通信 (2013)
Journal Article
An Approach to Secure Localization in WLANs
Ghosh, A., Kaul, V., Famolari, D.
Published in 2008 IEEE Wireless Communications and Networking Conference (01.03.2008)
Published in 2008 IEEE Wireless Communications and Networking Conference (01.03.2008)
Get full text
Conference Proceeding
Methodology for feature interaction detection in the AlN 0.1 framework
Lin, Fuchun Joseph, Liu, Hong, Ghosh, Abhrajit
Published in IEEE transactions on software engineering (01.10.1998)
Get full text
Published in IEEE transactions on software engineering (01.10.1998)
Journal Article
Securing ad-hoc networks using IPsec
Ghosh, A., Talpade, R., Elaoud, M., Bereschinsky, M.
Published in MILCOM 2005 - 2005 IEEE Military Communications Conference (2005)
Published in MILCOM 2005 - 2005 IEEE Military Communications Conference (2005)
Get full text
Conference Proceeding
Intrusion Tolerance in Distributed Middleware
Zbib, Rabih, Anjum, Farooq, Ghosh, Abhrajit, Umar, Amjad
Published in Information systems frontiers (01.03.2004)
Published in Information systems frontiers (01.03.2004)
Get full text
Journal Article
On the Feasibility of Deploying Software Attestation in Cloud Environments
Ghosh, Abhrajit, Sapello, Angelo, Poylisher, Alex, Chiang, C. Jason, Kubota, Ayumu, Matsunaka, Takashi
Published in 2014 IEEE 7th International Conference on Cloud Computing (01.06.2014)
Published in 2014 IEEE 7th International Conference on Cloud Computing (01.06.2014)
Get full text
Conference Proceeding