The majority of research on covert networks uses social network analysis (SNA) to determine critical members of the network to either kill or capture for the purpose of network destabilization. This thesis takes the opposite approach and evaluates potential scenarios for inserting an agent into a covert network for information gathering purposes or future disruption operations. Due to the substantial number of potential insertion scenarios in a large network, this research proposes three screening heuristics that leverage SNA measures to reduce the solution space before applying a simple search heuristic
The Department of Defense requires a secure presence in the cyber domain to successfully execute its...
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Researc...
Information and Networked Communications play a vital role in the everyday operations of the United ...
The majority of research on covert networks uses social network analysis (SNA) to determine critical...
Social Network Analysis (SNA) is a primary tool for counter-terrorism operations, ranging from resil...
Mission planners seek to target nodes and/or arcs in networks that have the greatest benefit for an ...
Various government agencies have a stake in knowing when bad actors cross the United States\u27 bord...
A significant challenge in intelligence analysis involves knowing when a social network description ...
AbstractA covert communications network is a connected, overlay, peer-to-peer network being used to ...
Terrorism threatens both international peace and security and is a national concern. It is believed ...
International audienceNetwork covert channels break a computer's security policy to establish a stea...
This thesis develops a tractable, statistically sound hypothesis testing framework for the detection...
Social network analysis (SNA) is used by the DoD to describe and analyze social networks, leading to...
Successful military operations are increasingly reliant upon an advanced understanding of relevant n...
Computer networks are often the target of cyber attacks carried out by malevolent agents, to either ...
The Department of Defense requires a secure presence in the cyber domain to successfully execute its...
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Researc...
Information and Networked Communications play a vital role in the everyday operations of the United ...
The majority of research on covert networks uses social network analysis (SNA) to determine critical...
Social Network Analysis (SNA) is a primary tool for counter-terrorism operations, ranging from resil...
Mission planners seek to target nodes and/or arcs in networks that have the greatest benefit for an ...
Various government agencies have a stake in knowing when bad actors cross the United States\u27 bord...
A significant challenge in intelligence analysis involves knowing when a social network description ...
AbstractA covert communications network is a connected, overlay, peer-to-peer network being used to ...
Terrorism threatens both international peace and security and is a national concern. It is believed ...
International audienceNetwork covert channels break a computer's security policy to establish a stea...
This thesis develops a tractable, statistically sound hypothesis testing framework for the detection...
Social network analysis (SNA) is used by the DoD to describe and analyze social networks, leading to...
Successful military operations are increasingly reliant upon an advanced understanding of relevant n...
Computer networks are often the target of cyber attacks carried out by malevolent agents, to either ...
The Department of Defense requires a secure presence in the cyber domain to successfully execute its...
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Researc...
Information and Networked Communications play a vital role in the everyday operations of the United ...