Showing 1 - 6 of 6 results for the Author - michael collins , Type - White Paper
In this paper, the authors describe the potential ways an insider threat program (InTP) could go wrong and to engage the community to discuss its concerns.
In this paper, the authors present a novel method for detecting hit-list worms using protocol graphs.
In this paper, the authors propose a set of tests for identifying masqueraded peer-to-peer file-sharing based on traffic summaries (flows).
In this paper, the authors provide an empirical analysis of proposed techniques for filtering network traffic.
In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.
In this paper, the authors describe the technologies that support an asset inventory system and enable a flexible, ad-hoc intrusion detection capability.