Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 57 results for the network situational awareness Type - White Paper

White Paper | June 2005 - White Paper Advanced Security Reporting Systems for Large Network ... By Michael Collins, Greg Virgin (Redjack)

In this paper, the authors describe the technologies that support an asset inventory system and enable a flexible, ad-hoc intrusion detection capability.

White Paper | September 2005 - White Paper NVisionIP: An Animated State Analysis Tool for Visualizing ...

In this paper, the authors describe NVisionIP, a NetFlow visualization tool.

White Paper | September 2005 - White Paper R: A Proposed Analysis and Visualization Environment for ... By Josh McNutt

In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.

White Paper | October 2006 - White Paper Scalable Flow Analysis (White Paper) By Abhishek Kumar (University of Maryland), Sapan Bhatia (Princeton)

In this paper, the authors present a new approach for summarization and analysis of flow records.

White Paper | June 2010 - White Paper Finding Malicious Activity in Bulk DNS Data By Ed Stoner

In this paper, Ed Stoner describes techniques for detecting certain types of malicious traffic.

White Paper | July 2015 - White Paper CND Equities Strategy By Jonathan Spring, Ed Stoner

In this paper, the authors discuss strategies for successful computer network defense (CND) based on considering the adversaries' responses.

White Paper | September 2005 - White Paper VisFlowConnect-IP: An Animated Link Analysis Tool For ...

In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.

White Paper | September 2005 - White Paper Correlations Between Quiescent Ports in Network Flows ... By Josh McNutt, Markus Deshon

In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.

White Paper | October 2006 - White Paper Attribution and Aggregation of Network Flows for Security ... By Annarita Giani (UC Berkeley), IanGregorioDe Souza (Dartmouth College), Vincent Berk (Dartmouth College), George Cybenko (Dartmouth College)

In this paper, the authors describe a network flow analyzer capable of attribution and aggregation of different flows to identify suspicious behaviors.

White Paper | October 2006 - White Paper Anomaly Detection Through Blind Flow Analysis Inside a ... By Ron McLeod (Corporate Development Telecom Applications Research Alliance), Vagishwari Nagaonkar (Wipro Technologies)

In this paper, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.

Refine