Author image not provided
 Thomas E Daniels

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article3.50
Citation Count70
Publication count20
Publication years1999-2012
Available for download7
Average downloads per article857.86
Downloads (cumulative)6,005
Downloads (12 Months)223
Downloads (6 Weeks)25
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


20 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 20
Result page: 1 2

Sort by:

1
August 2012 IEEE Transactions on Information Forensics and Security: Volume 7 Issue 4, August 2012
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

This work sets forth a systematic approach for the investigation and utilization of the signal characteristics of digital devices for use in a security context. A methodology, built upon an optimal detector, the matched filter, is proposed that allows for the reliable identification and tracking of wired Ethernet cards by ...

2 published by ACM
November 2009 AISec '09: Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 5,   Downloads (12 Months): 38,   Downloads (Overall): 1,157

Full text available: PDFPDF
Botnets are widely believed to be the most serious danger to the Internet. Most recent research on botnet detection focuses on centralized botnets and primarily relies on two assumptions: prior knowledge of potential C&C channels and capability of monitoring them. However, when botnets switch to a P2P (peer-to-peer) structure and ...
Keywords: machine learning, network security, anomaly detection

3
October 2009 FIE'09: Proceedings of the 39th IEEE international conference on Frontiers in education conference
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

Entering college students in computer science and computer engineering face not only a challenging first year experience, but also typically must complete a grueling programming class for which many students are ill-prepared. While much work has focused on difficulties in such classes, our experience is that students who are ill ...
Keywords: computer engineering, freshman, problem solving, programming

4 published by ACM
July 2009 ITiCSE '09: Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 5,   Downloads (12 Months): 17,   Downloads (Overall): 378

Full text available: PDFPDF
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus students, and a desire for high levels of security, drove many of the requirements for the Xen Worlds environment. Some of the requirements established ...
Keywords: networking, distance education, graduate laboratories, operating systems, security, virtual machines, virtualization, xen, linux, undergraduate laboratories
Also published in:
August 2009  ACM SIGCSE Bulletin - ITiCSE '09: Volume 41 Issue 3, September 2009

5
June 2009 SECURWARE '09: Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Node behavior profiling is a promising tool for many aspects in network security. In our research, our goal is to couple node behavior profiles with statistical tests with a focus on enterprise security. Limited work has been done in the literature. In this paper, we first propose a correlation based ...
Keywords: Behavior Profiling, Security

6
January 2009 CMC '09: Proceedings of the 2009 WRI International Conference on Communications and Mobile Computing - Volume 03
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Botnets are the most serious danger facing the Internet and enterprise networks. To effectively protect against botnets, researchers should not only focus on known botnets, but also the inherent relationships among them and those botnets to appear in the future. In this paper, we first propose a framework capable of ...

7 published by ACM
October 2008 NDA '08: Proceedings of the 1st ACM workshop on Network data anonymization
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 407

Full text available: PDFPDF
Network security research can benefit greatly from testing environments that are capable of generating realistic, repeatable and configurable background traffic. In order to conduct network security experiments, researchers require isolated testbeds capable of recreating actual network environments, complete with infrastructure and traffic details. Unfortunately, due to privacy and flexibility concerns, ...
Keywords: formal model, trace sanitization

8 published by ACM
October 2008 ACM Transactions on Information and System Security (TISSEC): Volume 12 Issue 1, October 2008
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 10,   Downloads (12 Months): 76,   Downloads (Overall): 2,031

Full text available: PDFPDF
In this article we develop a novel graph-based approach toward network forensics analysis. Central to our approach is the evidence graph model that facilitates evidence presentation and automated reasoning. Based on the evidence graph, we propose a hierarchical reasoning framework that consists of two levels. Local reasoning aims to infer ...
Keywords: network forensics, hierarchical reasoning, evidence graph

9
September 2008 ICWS '08: Proceedings of the 2008 IEEE International Conference on Web Services
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Interest in Service Oriented Architecture (SOA) is rapidly increasing in the business world due to the many benefits it offers such as reliability, manageability, reusability, flexibility, efficiency, and interoperability. There are many security technologies and models being developed for SOA. They implement or encode specific aspects of authentication, authorization, encryption, ...
Keywords: Clark-Wilson Integrity Model, SOA, Security, Integrity Model

10 published by ACM
March 2008 SIGCSE '08: Proceedings of the 39th SIGCSE technical symposium on Computer science education
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 3,   Downloads (12 Months): 74,   Downloads (Overall): 848

Full text available: PDFPDF
Over the past years, many problems related to the system administration of laboratories for undergraduate system-oriented courses have found elegant solutions in the deployment of virtualization suites. This technological advance enabled these courses to switch from a mostly descriptive content to learning activities which engage students in hands-on, authentic, problem-based ...
Keywords: operating systems, security, virtual machines, virtualization, linux, undergraduate laboratories, clustering, networking
Also published in:
February 2008  ACM SIGCSE Bulletin - SIGCSE 08: Volume 40 Issue 1, March 2008

11
November 2007 Information Systems Frontiers: Volume 9 Issue 5, November 2007
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1


12 published by ACM
September 2006 NSPW '06: Proceedings of the 2006 workshop on New security paradigms
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 731

Full text available: PDFPDF
In this paper we propose the new paradigm of applying diffusion and graph spectral methods for network forensic analysis. Based on an evidence graph model built from collected evidence, graph spectral methods show potential in identifying key components and patterns of attack by extracting important graph structures. We also present ...
Keywords: graph spectrum, network forensics, diffusion model

13
December 2005 ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

In this paper, we present techniques for a network forensics analysis mechanism that includes effective evidence presentation, manipulation and automated reasoning. We propose the evidence graph as a novel graph model to facilitate the presentation and manipulation of intrusion evidence. For automated evidence analysis, we develop a hierarchical reasoning framework ...

14
September 2005 SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

In this paper, we present a new paradigm for security in conventional networks that has dramatic implications for improving their physical layer network security. We call this paradigm, Detecting Intrusions at Layer ONe (DILON). DILON's enabling hypothesis is that the inherent variability in the construction of digital devices leads to ...

15
June 2005 ICDCSW '05: Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW'05) - Volume 02
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 6

Networks have become omnipresent in todayýs world and part of the basic infrastructure. The safety problem is important and urgent for all the network users. But the current situation in this field is very severe � not only is it difficult to block network criminals but also in many cases ...
Keywords: Distributed Forensics System, Agent, Proxy, Attack Attribution Graph

16
February 2004 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 1 Issue 1, February, 2004
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Determining the originating node of network traffic is a key problem in network forensics. As a network attacker may leave little direct evidence of his identity, it is useful to find his point of entry into the network. This, along with further host-based investigation, can tie a given suspect to ...
Keywords: Accountability, Network forensics, Traceback, Attribution, Reference model

17
January 2002
Bibliometrics:
Citation Count: 3

Past work on determining the origin of network traffic has been done in a case-specific manner. This has resulted in a number of specific works while yielding little general understanding of the mechanisms used for expression, concealment, and observation of origin identity. This dissertation addresses this state of affairs by ...

18 published by ACM
February 2001 NSPW '00: Proceedings of the 2000 workshop on New security paradigms
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 453

Full text available: PdfPdf

19
December 2000 ACSAC '00: Proceedings of the 16th Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system calls or application sources, operations in the network protocol stack go unaudited. Earlier work has determined the audit data needed to detect low-level network attacks. ...
Keywords: NASHID, application sources, audit data, Linux, Unix, auditing, computer network management, low-level network attacks, network audit system, network operating systems, network protocol stack, operating system audit trails, system calls, host-based intrusion detection, audit data accumulation, security of data

20
January 1999 Journal of Computer Security: Volume 7 Issue 1, Sept. 1999
Publisher: IOS Press
Bibliometrics:
Citation Count: 12

Conventional host-based and network-based intrusion and misuse detection systems have concentrated on detecting network-based and internal attacks, but little work has addressed host-based detection of low-level network attacks. A major reason for this is the misuse detection systems dependence on audit data and the absence of low-level network data in ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us