All Stories

  1. Using semi-supervised machine learning to address the Big Data problem in DNS networks
  2. The Resource Usage Viewpoint of Industrial Control System Security: An Inference-Based Intrusion Detection System
  3. Using sequential pattern mining for common event format (CEF) cyber data
  4. Securing commercial WiFi-based UAVs from common security attacks
  5. Detection of Tunnels in PCAP Data by Random Forests
  6. Using inherent command and control vulnerabilities to halt DDoS attacks
  7. Remotely inferring device manipulation of industrial control systems via network behavior
  8. Using Network Traffic to Infer Hardware State
  9. Fighting banking botnets by exploiting inherent command and control vulnerabilities
  10. Using network traffic to infer power levels in wireless sensor nodes
  11. Constructing timing-based covert channels in mobile networks by adjusting CPU frequency
  12. A Passive Solution to the Memory Resource Discovery Problem in Computational Clusters
  13. Using link RTT to passively detect unapproved wireless nodes
  14. A passive approach to rogue access point detection
  15. Using Network Traffic to Passively Detect Under Utilized Resources in High Performance Cluster Grid Computing Environments