Search Results - "Poylisher, Alexander"

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering by Ghosh, A., Gottlieb, Y. M., Naidu, A., Vashist, A., Poylisher, A., Kubota, A., Sawaya, Y., Yamada, A.

    Published in China communications (01-03-2013)
    “…In this paper, we present Real-Time Flow Filter (RTFF) --a system that adopts a middle ground between coarse-grained vol- ume anomaly detection and deep packet…”
    Get full text
    Journal Article
  2. 2

    Utility-Driven Traffic Engineering via Joint Routing and Rate Control for 802.11 MANETs by Kim, Gi Tae, Lee, John, Kant, Latha, Poylisher, Alexander

    “…Efficient network resource utilization together with sustained high Quality of Service (QoS) for applications is crucial in mobile ad hoc networks (MANETs) for…”
    Get full text
    Conference Proceeding
  3. 3

    Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural Approach by Poylisher, Alexander, Gottlieb, Yitzchak M., Kant, Latha

    “…With the currently deployed tactical software defined radios (SDRs), there is no easy way to develop advanced Layer 3 (L3) QoS functionalities independently of…”
    Get full text
    Conference Proceeding
  4. 4

    TREND: Trust estimation system for wireless networks via multi-pronged detection by Chadha, Ritu, Ghosh, Abhrajit, Poylisher, Alexander, Serban, Constantin

    “…We describe a system developed for the DARPA Wireless Network Defense (WND) program for detecting attacks against the control plane at the link and network…”
    Get full text
    Conference Proceeding
  5. 5

    Testing android devices for tactical networks: A hybrid emulation testbed approach by Serban, Constantin, Poylisher, Alexander, Sapello, Angelo, Gottlieb, Yitzchak, Chiang, C. Jason, Chadha, Ritu

    “…Commercial cellular phones, such as Android-based smart phones, are being introduced into the U.S. military battlefield. The use of such devices in the…”
    Get full text
    Conference Proceeding
  6. 6

    VulnerVAN: A Vulnerable Network Generation Tool by Venkatesan, Sridhar, Youzwak, Jason A., Sugrim, Shridatt, Chiang, Cho-Yu J., Poylisher, Alexander, Witkowski, Matthew, Walther, Gary, Wolberg, Michelle, Chadha, Ritu, Newcomb, E. Allison, Hoffman, Blaine, Buchler, Norbou

    “…Cyber training, security testing, and research and development activities are vital to improve the security posture of a network. Currently, many institutions…”
    Get full text
    Conference Proceeding
  7. 7

    Building an operation support system for a fast reconfigurable network experimentation testbed by Poylisher, A., Gottlieb, Y. M., Serban, C., Lee, J., Sultan, F., Chadha, R., Chiang, C. J., Whittaker, Keith, Nguyen, James, Scilla, Chris

    “…We discuss in this paper the emerging need for an operation support system to support fast, reconfigurable, time-shared testbeds. We articulate the needs for…”
    Get full text
    Conference Proceeding
  8. 8
  9. 9

    Reliability estimation in mobile ad hoc networks by Chadha, Ritu, Poylisher, Alexander, Serban, Constantin

    “…We describe a system for estimating the reliability of nodes in a mobile ad hoc network. The goal of the system is to detect insider attacks on the control…”
    Get full text
    Conference Proceeding
  10. 10

    Automated cross layer feature selection for effective intrusion detection in networked systems by Aqil, Azeem, Atya, Ahmed Fathy, Krishnamurthy, Srikanth V., Yu, Paul, Swami, Ananthram, Rowe, Jeff, Levitt, Karl, Poylisher, Alexander, Serban, Constantin, Chadha, Ritu

    “…Traditionally, anomaly detection mechanisms have relied on the inspection of certain manually (by domain experts) chosen features in order to determine if a…”
    Get full text
    Conference Proceeding
  11. 11

    Scalable policy management for ad hoc networks by Chadha, R., Cheng, Y.-H., Chiang, J., Levin, G., Li, S.-W., Poylisher, A., LaVergne, L., Newman, S.

    “…The characteristics of mobile ad hoc networks (commonly called MANETs) are sufficiently different from commercial wireline networks to have generated a great…”
    Get full text
    Conference Proceeding
  12. 12

    Policy-based mobile ad hoc network management for drama by Chadha, R., Yuu-Heng Cheng, Chiang, J., Levin, G., Shih-Wei Li, Poylisher, A.

    “…Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc…”
    Get full text
    Conference Proceeding
  13. 13

    PBNM Technology Evaluation: Practical Criteria by Poylisher, A., Chadha, R.

    “…Based on the authors' experience building and deploying policy-based network management (PBNM) systems and components in several large-scale NM projects, the…”
    Get full text
    Conference Proceeding
  14. 14

    Leveraging social network for predicting demand and estimating available resources for communication network management by Vashist, A., Siun-Chuon Mau, Poylisher, A., Chadha, R., Ghosh, A.

    “…Computer networks exist to provide a communication medium for social networks, and information from social networks can help in estimating their communication…”
    Get full text
    Conference Proceeding
  15. 15

    Criticality avoidance: A new paradigm for congestion control based on science of phase transition by Siun-Chuon Mau, Vashist, A., Poylisher, A., Chadha, R., Chiang, C-Y J.

    “…Network QoS control is generally difficult due to the complexity, dynamism, and limited measurability of networks. As an alternative, we seek a network…”
    Get full text
    Conference Proceeding
  16. 16

    Predicting End-to-end Network Load by Vashist, A, Mau, S, Poylisher, A, Chadha, R, Ghosh, A

    “…Due to their limited and fluctuating bandwidth, mobile ad hoc networks (MANETs) are inherently resource-constrained. As traffic load increases, we need to…”
    Get full text
    Conference Proceeding