Showing 1 - 4 of 4 results for the Author - ed stoner , Type - White Paper
In this paper, Ed Stoner describes techniques for detecting certain types of malicious traffic.
In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.
In this paper, the authors describe their analysis of two case studies to outline the relationship between adversaries and network defenders.
In this paper, the authors describe a pattern in the amount of time it takes for that domain to be actively resolved on the Internet.