Search Results - "Mink, Dustin"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Resampling Imbalanced Network Intrusion Datasets to Identify Rare Attacks by Bagui, Sikha, Mink, Dustin, Bagui, Subhash, Subramaniam, Sakthivel, Wallace, Daniel

    Published in Future internet (01-04-2023)
    “…This study, focusing on identifying rare attacks in imbalanced network intrusion datasets, explored the effect of using different ratios of oversampled to…”
    Get full text
    Journal Article
  2. 2

    Extended Isolation Forest for Intrusion Detection in Zeek Data by Moomtaheen, Fariha, Bagui, Sikha S., Bagui, Subhash C., Mink, Dustin

    Published in Information (Basel) (01-07-2024)
    “…The novelty of this paper is in determining and using hyperparameters to improve the Extended Isolation Forest (EIF) algorithm, a relatively new algorithm, to…”
    Get full text
    Journal Article
  3. 3

    Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data by Bagui, Sikha S., Mink, Dustin, Bagui, Subhash C., Subramaniam, Sakthivel

    Published in Computers (Basel) (01-10-2023)
    “…Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such…”
    Get full text
    Journal Article
  4. 4

    Resampling to Classify Rare Attack Tactics in UWF-ZeekData22 by Bagui, Sikha S., Mink, Dustin, Bagui, Subhash C., Subramaniam, Sakthivel

    Published in Knowledge (14-03-2024)
    “…One of the major problems in classifying network attack tactics is the imbalanced nature of data. Typical network datasets have an extremely high percentage of…”
    Get full text
    Journal Article
  5. 5

    Node Classification of Network Threats Leveraging Graph-Based Characterizations Using Memgraph by Charkhabi, Sadaf, Samimi, Peyman, Bagui, Sikha S., Mink, Dustin, Bagui, Subhash C.

    Published in Computers (Basel) (01-07-2024)
    “…This research leverages Memgraph, an open-source graph database, to analyze graph-based network data and apply Graph Neural Networks (GNNs) for a detailed…”
    Get full text
    Journal Article
  6. 6

    Near-Real-Time IDS for the U.S. FAA’s NextGen ADS-B by Mink, Dustin M., McDonald, Jeffrey, Bagui, Sikha, Glisson, William B., Shropshire, Jordan, Benton, Ryan, Russ, Samuel

    Published in Big data and cognitive computing (01-06-2021)
    “…Modern-day aircraft are flying computer networks, vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance, virtual…”
    Get full text
    Journal Article
  7. 7

    Data mining techniques to study voting patterns in the US by Bagui, Sikha, Mink, Dustin, Cash, Patrick

    Published in Data science journal (01-01-2007)
    “…This paper presents data mining techniques that can be used to study voting patterns in the United States House of Representatives and shows how the results…”
    Get full text
    Journal Article
  8. 8

    Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework by Bagui, Sikha, Mink, Dustin, Bagui, Subhash, Ghosh, Tirthankar, McElroy, Tom, Paredes, Esteban, Khasnavis, Nithisha, Plenkers, Russell

    Published in Sensors (Basel, Switzerland) (20-10-2022)
    “…While computer networks and the massive amount of communication taking place on these networks grow, the amount of damage that can be done by network…”
    Get full text
    Journal Article
  9. 9

    Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT CK Framework from UWF-ZeekData22 by Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Michael Plain, Jadarius Hill, Marshall Elam

    Published in Future internet (01-07-2023)
    “…There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of…”
    Get full text
    Journal Article
  10. 10

    Detecting Reconnaissance and Discovery Tactics from the MITRE ATT CK Framework in Zeek Conn Logs Using Spark’s Machine Learning in the Big Data Framework by Sikha Bagui, Dustin Mink, Subhash Bagui, Tirthankar Ghosh, Tom McElroy, Esteban Paredes, Nithisha Khasnavis, Russell Plenkers

    Published in Sensors (Basel, Switzerland) (01-10-2022)
    “…While computer networks and the massive amount of communication taking place on these networks grow, the amount of damage that can be done by network…”
    Get full text
    Journal Article
  11. 11

    Using a Graph Engine to Visualize the Reconnaissance Tactic of the MITRE ATT&CK Framework from UWF-ZeekData22 by Bagui, Sikha S., Mink, Dustin, Bagui, Subhash C., Plain, Michael, Hill, Jadarius, Elam, Marshall

    Published in Future internet (01-07-2023)
    “…There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of…”
    Get full text
    Journal Article
  12. 12

    Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework by Bagui, Sikha S., Mink, Dustin, Bagui, Subhash C., Ghosh, Tirthankar, Plenkers, Russel, McElroy, Tom, Dulaney, Stephan, Shabanali, Sajida

    Published in Data (Basel) (01-01-2023)
    “…With the rapid rate at which networking technologies are changing, there is a need to regularly update network activity datasets to accurately reflect the…”
    Get full text
    Journal Article
  13. 13

    Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT CK Framework by Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Tirthankar Ghosh, Russel Plenkers, Tom McElroy, Stephan Dulaney, Sajida Shabanali

    Published in Data (Basel) (01-01-2023)
    “…With the rapid rate at which networking technologies are changing, there is a need to regularly update network activity datasets to accurately reflect the…”
    Get full text
    Journal Article
  14. 14

    Indicators of Compromise for the United States Federal Aviation Administration Next Generation Air Transportation System Automatic Dependent Surveillance-Broadcast by Mink, Dustin Michael

    Published 01-01-2019
    “…Modern day aircraft are flying computer networks and are vulnerable to ground station flooding, ghost aircraft injection or flooding, aircraft disappearance,…”
    Get full text
    Dissertation