Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
Ghosh, A., Gottlieb, Y. M., Naidu, A., Vashist, A., Poylisher, A., Kubota, A., Sawaya, Y., Yamada, A.
Published in China communications (01.03.2013)
Published in China communications (01.03.2013)
Get full text
Journal Article
TREND: Trust estimation system for wireless networks via multi-pronged detection
Chadha, Ritu, Ghosh, Abhrajit, Poylisher, Alexander, Serban, Constantin
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Get full text
Conference Proceeding
Testing android devices for tactical networks: A hybrid emulation testbed approach
Serban, Constantin, Poylisher, Alexander, Sapello, Angelo, Gottlieb, Yitzchak, Chiang, C. Jason, Chadha, Ritu
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01.10.2015)
Get full text
Conference Proceeding
VulnerVAN: A Vulnerable Network Generation Tool
Venkatesan, Sridhar, Youzwak, Jason A., Sugrim, Shridatt, Chiang, Cho-Yu J., Poylisher, Alexander, Witkowski, Matthew, Walther, Gary, Wolberg, Michelle, Chadha, Ritu, Newcomb, E. Allison, Hoffman, Blaine, Buchler, Norbou
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01.11.2019)
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01.11.2019)
Get full text
Conference Proceeding
Building an operation support system for a fast reconfigurable network experimentation testbed
Poylisher, A., Gottlieb, Y. M., Serban, C., Lee, J., Sultan, F., Chadha, R., Chiang, C. J., Whittaker, Keith, Nguyen, James, Scilla, Chris
Published in MILCOM 2012 - 2012 IEEE Military Communications Conference (01.10.2012)
Published in MILCOM 2012 - 2012 IEEE Military Communications Conference (01.10.2012)
Get full text
Conference Proceeding
网络攻击检测中基于RTFF的大容量数据管理
Abhrajit Ghosh, Yitzchak M.Gottlieb, Aditya Naidu, Akshay Vashist, Alexander Poylisher, Ayumu Kubota, Yukiko Sawaya, Akira Yamada
Published in 中国通信 (2013)
Get full text
Published in 中国通信 (2013)
Journal Article
Reliability estimation in mobile ad hoc networks
Chadha, Ritu, Poylisher, Alexander, Serban, Constantin
Published in Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013) (01.10.2013)
Published in Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013) (01.10.2013)
Get full text
Conference Proceeding
Automated cross layer feature selection for effective intrusion detection in networked systems
Aqil, Azeem, Atya, Ahmed Fathy, Krishnamurthy, Srikanth V., Yu, Paul, Swami, Ananthram, Rowe, Jeff, Levitt, Karl, Poylisher, Alexander, Serban, Constantin, Chadha, Ritu
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01.10.2016)
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01.10.2016)
Get full text
Conference Proceeding
Scalable policy management for ad hoc networks
Chadha, R., Cheng, Y.-H., Chiang, J., Levin, G., Li, S.-W., Poylisher, A., LaVergne, L., Newman, S.
Published in MILCOM 2005 - 2005 IEEE Military Communications Conference (2005)
Published in MILCOM 2005 - 2005 IEEE Military Communications Conference (2005)
Get full text
Conference Proceeding
System and Method for mitigating TOC/TOU attacks in a cloud computing enviroment
Chiang C. Jason, Kubota Ayumu, Ghosh Abhrajit, Sapello Angelo, Poylisher Alexander, Matsunaka Takashi
Year of Publication 16.05.2017
Get full text
Year of Publication 16.05.2017
Patent
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
GHOSH ABHRAJIT, YAMADA AKIRA, VASHIST AKSHAY, CHADHA RITU, SAWAYA YUKIKO, POYLISHER ALEXANDER, KUBOTA AYUMU
Year of Publication 05.07.2016
Get full text
Year of Publication 05.07.2016
Patent
SYSTEM AND METHOD FOR MITIGATING TOC/TOU ATTACKS IN A CLOUD COMPUTING ENVIRONMENT
SAPELLO ANGELO, GHOSH ABHRAJIT, POYLISHER ALEXANDER, CHIANG C. JASON, MATSUNAKA TAKASHI, KUBOTA AYUMU
Year of Publication 24.12.2015
Get full text
Year of Publication 24.12.2015
Patent
Policy-based mobile ad hoc network management for drama
Chadha, R., Yuu-Heng Cheng, Chiang, J., Levin, G., Shih-Wei Li, Poylisher, A.
Published in IEEE MILCOM 2004. Military Communications Conference, 2004 (2004)
Published in IEEE MILCOM 2004. Military Communications Conference, 2004 (2004)
Get full text
Conference Proceeding
PBNM Technology Evaluation: Practical Criteria
Poylisher, A., Chadha, R.
Published in 2008 IEEE Workshop on Policies for Distributed Systems and Networks (01.06.2008)
Published in 2008 IEEE Workshop on Policies for Distributed Systems and Networks (01.06.2008)
Get full text
Conference Proceeding