Showing 1 - 10 of 14 results for the Author - jonathan spring , Type - White Paper
This paper outlines challenges with the Common Vulnerability Scoring System (CVSS).
In this paper, Jonathan Spring models internet competition on large, decentralized networks using a modification of Lanchester's equations for combat.
In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.
In this paper, the authors discuss whether pDNS allows reconstruction of an end user's DNS behavior and if DNS behavior is personally identifiable information.
In this paper, the authors demonstrate that there are name servers that exhibit IP address flux, a behavior that falls outside the prescribed parameters.
In this paper, Jonathan Spring presents a set of recommended restrictions and audits to facilitate cloud security.
In this paper, the authors describe their analysis of two case studies to outline the relationship between adversaries and network defenders.
In this paper we discuss scalable detection methods for domain names parking on reserved IP address space, and then using this data set, evaluate whether this behavior appears to be indicative of malicious behavior.
In this paper, the authors provide recommendations for addressing problems related to poor management of Consumer Premise Equipment (CPE).
In this paper, the authors describe a pattern in the amount of time it takes for that domain to be actively resolved on the Internet.