Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 38 results for the Publish Year - 2005 , Type - White Paper

White Paper | September 2005 - White Paper VisFlowConnect-IP: An Animated Link Analysis Tool For ...

In this paper, the authors present VisFlowConnect-IP, a network flow visualization tool that detects and investigates anomalous network traffic.

White Paper | September 2005 - White Paper R: A Proposed Analysis and Visualization Environment for ... By Josh McNutt

In this paper, Josh McNutt discusses the R statistical language as an analysis and visualization interface to SiLK flow analysis tools.

White Paper | September 2005 - White Paper NVisionIP: An Animated State Analysis Tool for Visualizing ...

In this paper, the authors describe NVisionIP, a NetFlow visualization tool.

White Paper | September 2005 - White Paper CANINE: A NetFlows Converter/Anonymizer Tool for Format ... By Katherine Luo (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign), Adam Slagell (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign), William Yurcik (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign), Yifan Li (National Center for Supercomputing Applications (NCSA): University of Illinois at Urbana-Champaign)

In this paper, the authors introduce a tool to address two problems with using Net-Flow logs for security analysis.

White Paper | September 2005 - White Paper Correlations Between Quiescent Ports in Network Flows ... By Josh McNutt, Markus Deshon

In this paper, the authors introduce a method for detecting the onset of anomalous port-specific activity by recognizing deviation from correlated activity.

White Paper | September 2005 - White Paper Covert Channel Detection Using Process Query Systems ... By Vincent Berk (Dartmouth College)

In this FloCon 2005 presentation, the author uses traffic analysis to investigate a stealthy form of data exfiltration.

White Paper | May 2005 - White Paper A Taxonomy of Security-Related Requirements By Donald Firesmith

This paper addresses the problems associated with a lack of a clear security taxonomy by identifying four different types of security-related requirements, providing them with clear definitions, and placing them within an organizing hierarchical taxonomy.

White Paper | May 2005 - White Paper Method Engineering and COTS Evaluation By B. Henderson-Sellers, C. Gonzalez-Perez, M.K.Serour, Donald Firesmith

This position paper argues that a successful COTS evaluation process should be based on the principles of method engineering (ME).

White Paper | December 2005 - White Paper Botnets as a Vehicle for Online Crime By Nicholas Ianelli, Aaron Hackworth

In this paper, the authors describe the capabilities present in bot malware and the motivations for operating botnets.

White Paper | December 2005 - White Paper Precise Buffer Overflow Detection via Model Checking By Sagar Chaki, Scott Hissam

In this paper, the authors present an automated overflow detection technique based on model checking and iterative refinement.

Refine