The behavior of modern systems lives in a complex landscape that is unique to its particular application. In this work we describe and analyze the behavior of two modern computational systems: a Linux server and the National Market System (NMS). Though this work is diverse in both the type and scale of system under study, it is unified through the design and implementation of computationally tractable quantitative metrics aimed at defining the state of behavior of these systems. Understanding the behavior of these systems allows us to ensure their desired operation. In the case of a server we need to quickly be alerted when the system is compromised. Similarly, we need to know when a systematic or structural change in the NMS has unintended...
Computer security attacks evolve to evade deployed defenses. Recent attacks have ranged from exploi...
This research explores four experiments of adaptive host-based intrusion detection (ID) techniques i...
As computer networks continue to proliferate, the world\u27s dependence on a secure communication in...
There are two essential goals of this research. The first goal is to design and construct a computat...
Threats of malware, attacks and intrusion have been around since the very conception ofcomputing. Ye...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
The United States Air Force extensively uses information systems as a tool managing and maintaining ...
Current host-based anomaly detection systems have limited accuracy and incur high processing costs. ...
We present an empirical investigation into the prevalence and impact of distributed denial-of-servic...
Attacks against computers and the internet are in the news every week. These primarily take the form...
As more organizations and businesses in different sectors are moving to a digital transformation, th...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
It exhibits a versatile framework for high-throughput ongoing investigation of heterogeneous informa...
The proliferation of information systems (IS) has afforded modern society with unprecedented benefit...
This dissertation examines security vulnerabilities that arise due to communication failures and inc...
Computer security attacks evolve to evade deployed defenses. Recent attacks have ranged from exploi...
This research explores four experiments of adaptive host-based intrusion detection (ID) techniques i...
As computer networks continue to proliferate, the world\u27s dependence on a secure communication in...
There are two essential goals of this research. The first goal is to design and construct a computat...
Threats of malware, attacks and intrusion have been around since the very conception ofcomputing. Ye...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
The United States Air Force extensively uses information systems as a tool managing and maintaining ...
Current host-based anomaly detection systems have limited accuracy and incur high processing costs. ...
We present an empirical investigation into the prevalence and impact of distributed denial-of-servic...
Attacks against computers and the internet are in the news every week. These primarily take the form...
As more organizations and businesses in different sectors are moving to a digital transformation, th...
The impact of computer networks on modern society cannot be estimated. Arguably, computer networks a...
It exhibits a versatile framework for high-throughput ongoing investigation of heterogeneous informa...
The proliferation of information systems (IS) has afforded modern society with unprecedented benefit...
This dissertation examines security vulnerabilities that arise due to communication failures and inc...
Computer security attacks evolve to evade deployed defenses. Recent attacks have ranged from exploi...
This research explores four experiments of adaptive host-based intrusion detection (ID) techniques i...
As computer networks continue to proliferate, the world\u27s dependence on a secure communication in...