Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 11 - 20 of 495 results for the Type - White Paper

White Paper | September 2005 - White Paper NVisionIP: An Animated State Analysis Tool for Visualizing ...

In this paper, the authors describe NVisionIP, a NetFlow visualization tool.

White Paper | October 2006 - White Paper Attribution and Aggregation of Network Flows for Security ... By Annarita Giani (UC Berkeley), IanGregorioDe Souza (Dartmouth College), Vincent Berk (Dartmouth College), George Cybenko (Dartmouth College)

In this paper, the authors describe a network flow analyzer capable of attribution and aggregation of different flows to identify suspicious behaviors.

White Paper | October 2006 - White Paper IPFIX/PSAMP: What Future Standards Can Offer to Network ... By Tanja Zseby (Fraunhofer Fokus), Elisa Boschi (Hitachi), Thomas Hirsch (Fraunhofer Fokus), Mark Lutz (Fraunhofer Fokus)

In this paper, the authors show how IPFIX and PSAMP can be used to support network security.

White Paper | September 2005 - White Paper CANINE: A NetFlows Converter/Anonymizer Tool for Format ... By Katherine Luo (National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign), Adam Slagell (National Center for Supercomputing Applications (NCSA) at University of Illinois at Urbana-Champaign), William Yurcik (National Center for Supercomputing Applications (NCSA) at University of Illinois at Urbana-Champaign), Yifan Li (National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign)

In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.

White Paper | September 2005 - White Paper Correlations Between Quiescent Ports in Network Flows ... By Josh McNutt, Markus Deshon

In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.

White Paper | October 2006 - White Paper Anomaly Detection Through Blind Flow Analysis Inside a ... By Ron McLeod (Corporate Development Telecom Applications Research Alliance), Vagishwari Nagaonkar (Wipro Technologies)

In this paper, the authors describe how hosts may be clustered into user workstations, servers, printers, and hosts compromised by worms.

White Paper | June 2017 - White Paper The Hard Choices Game Explained By Nanette Brown, Philippe Kruchten, Erin Lim, Robert Nord, Ipek Ozkaya

The Hard Choices game is a simulation of the software development cycle meant to communicate the concepts of uncertainty, risk, and technical debt.

White Paper | January 2017 - White Paper Skills Needed When Staffing Your CSIRT

This white paper describes a set of skills that CSIRT staff members should have to provide basic incident-handling services.

White Paper | January 2017 - White Paper Create a CSIRT

This white paper discusses the issues and decisions organizations should address when planning, implementing, and building a CSIRT.

White Paper | September 2005 - White Paper Covert Channel Detection Using Process Query Systems ... By Vincent Berk (Dartmouth College)

In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.

Refine