Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 13 results for the Author - jonathan spring , Type - White Paper

White Paper | January 2012 - White Paper Modifying Lanchester's Equations for Modeling and ... By Jonathan Spring

In this paper, Jonathan Spring models internet competition on large, decentralized networks using a modification of Lanchester's equations for combat.

White Paper | July 2015 - White Paper CND Equities Strategy By Jonathan Spring, Ed Stoner

In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.

White Paper | March 2012 - White Paper The Impact of Passive DNS Collection on End-User Privacy By Jonathan Spring, Carly L. Huth

In this paper, the authors discuss whether pDNS allows reconstruction of an end user's DNS behavior and if DNS behavior is personally identifiable information.

White Paper | January 2012 - White Paper Passive Detection of Misbehaving Name Servers By Leigh B. Metcalf, Jonathan Spring

In this paper, the authors demonstrate that there are name servers that exhibit IP address flux, a behavior that falls outside the prescribed parameters.

White Paper | March 2016 - White Paper Malware Capability Development Patterns Respond to ... By Kyle O'Meara, Deana Shick, Jonathan Spring, Ed Stoner

In this paper, the authors describe their analysis of two case studies to outline the relationship between adversaries and network defenders.

White Paper | December 2014 - White Paper Domain Parking: Not as Malicious as Expected By Leigh B. Metcalf, Jonathan Spring

In this paper we discuss scalable detection methods for domain names parking on reserved IP address space, and then using this data set, evaluate whether this behavior appears to be indicative of malicious behavior.

White Paper | August 2014 - White Paper Abuse of Customer Premise Equipment and Recommended ... By Paul Vixie, Chris Hallenbeck, Jonathan Spring

In this paper, the authors provide recommendations for addressing problems related to poor management of Consumer Premise Equipment (CPE).

White Paper | June 2011 - White Paper Monitoring Cloud Computing by Layer, Part 2 By Jonathan Spring

In this paper, Jonathan Spring presents a set of recommended restrictions and audits to facilitate cloud security.

White Paper | April 2011 - White Paper Correlating Domain Registrations and DNS First Activity in ... By Leigh B. Metcalf, Jonathan Spring, Ed Stoner

In this paper, the authors describe a pattern in the amount of time it takes for that domain to be actively resolved on the Internet.

White Paper | January 2015 - White Paper Blacklist Ecosystem Analysis Update: 2014 By Leigh B. Metcalf, Jonathan Spring

This white paper compares the contents of 85 different Internet blacklists to discover patterns in shared entries.