Search Results - "Poylisher, Alexander"
-
1
Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
Published in China communications (01-03-2013)“…In this paper, we present Real-Time Flow Filter (RTFF) --a system that adopts a middle ground between coarse-grained vol- ume anomaly detection and deep packet…”
Get full text
Journal Article -
2
Utility-Driven Traffic Engineering via Joint Routing and Rate Control for 802.11 MANETs
Published in 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS) (05-01-2021)“…Efficient network resource utilization together with sustained high Quality of Service (QoS) for applications is crucial in mobile ad hoc networks (MANETs) for…”
Get full text
Conference Proceeding -
3
Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural Approach
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01-11-2019)“…With the currently deployed tactical software defined radios (SDRs), there is no easy way to develop advanced Layer 3 (L3) QoS functionalities independently of…”
Get full text
Conference Proceeding -
4
TREND: Trust estimation system for wireless networks via multi-pronged detection
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01-10-2015)“…We describe a system developed for the DARPA Wireless Network Defense (WND) program for detecting attacks against the control plane at the link and network…”
Get full text
Conference Proceeding -
5
Testing android devices for tactical networks: A hybrid emulation testbed approach
Published in MILCOM 2015 - 2015 IEEE Military Communications Conference (01-10-2015)“…Commercial cellular phones, such as Android-based smart phones, are being introduced into the U.S. military battlefield. The use of such devices in the…”
Get full text
Conference Proceeding -
6
VulnerVAN: A Vulnerable Network Generation Tool
Published in MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM) (01-11-2019)“…Cyber training, security testing, and research and development activities are vital to improve the security posture of a network. Currently, many institutions…”
Get full text
Conference Proceeding -
7
Building an operation support system for a fast reconfigurable network experimentation testbed
Published in MILCOM 2012 - 2012 IEEE Military Communications Conference (01-10-2012)“…We discuss in this paper the emerging need for an operation support system to support fast, reconfigurable, time-shared testbeds. We articulate the needs for…”
Get full text
Conference Proceeding -
8
-
9
Reliability estimation in mobile ad hoc networks
Published in Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013) (01-10-2013)“…We describe a system for estimating the reliability of nodes in a mobile ad hoc network. The goal of the system is to detect insider attacks on the control…”
Get full text
Conference Proceeding -
10
Automated cross layer feature selection for effective intrusion detection in networked systems
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Traditionally, anomaly detection mechanisms have relied on the inspection of certain manually (by domain experts) chosen features in order to determine if a…”
Get full text
Conference Proceeding -
11
Scalable policy management for ad hoc networks
Published in MILCOM 2005 - 2005 IEEE Military Communications Conference (2005)“…The characteristics of mobile ad hoc networks (commonly called MANETs) are sufficiently different from commercial wireline networks to have generated a great…”
Get full text
Conference Proceeding -
12
Policy-based mobile ad hoc network management for drama
Published in IEEE MILCOM 2004. Military Communications Conference, 2004 (2004)“…Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc…”
Get full text
Conference Proceeding -
13
PBNM Technology Evaluation: Practical Criteria
Published in 2008 IEEE Workshop on Policies for Distributed Systems and Networks (01-06-2008)“…Based on the authors' experience building and deploying policy-based network management (PBNM) systems and components in several large-scale NM projects, the…”
Get full text
Conference Proceeding -
14
Leveraging social network for predicting demand and estimating available resources for communication network management
Published in 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops (01-05-2011)“…Computer networks exist to provide a communication medium for social networks, and information from social networks can help in estimating their communication…”
Get full text
Conference Proceeding -
15
Criticality avoidance: A new paradigm for congestion control based on science of phase transition
Published in 2011 7th International Conference on Network and Service Management (01-10-2011)“…Network QoS control is generally difficult due to the complexity, dynamism, and limited measurability of networks. As an alternative, we seek a network…”
Get full text
Conference Proceeding -
16
Predicting End-to-end Network Load
Published in 2010 Ninth International Conference on Machine Learning and Applications (01-12-2010)“…Due to their limited and fluctuating bandwidth, mobile ad hoc networks (MANETs) are inherently resource-constrained. As traffic load increases, we need to…”
Get full text
Conference Proceeding