Search For:

Displaying 1-6 out of 6 total
DNS for Massive-Scale Command and Control
Found in: IEEE Transactions on Dependable and Secure Computing
By Kui Xu,Patrick Butler,Sudip Saha,Danfeng Yao
Issue Date:May 2013
pp. 143-153
Attackers, in particular botnet controllers, use stealthy messaging systems to set up large-scale command and control. To systematically understand the potential capability of attackers, we investigate the feasibility of using domain name service (DNS) as ...
 
The Deshredder: A visual analytic approach to reconstructing shredded documents
Found in: 2012 IEEE Conference on Visual Analytics Science and Technology (VAST)
By Patrick Butler,Prithwish Chakraborty,Naren Ramakrishan
Issue Date:October 2012
pp. 113-122
Reconstruction of shredded documents remains a significant challenge. Creating a better document reconstruction system enables not just recovery of information accidentally lost but also understanding our limitations against adversaries' attempts to gain a...
 
MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Patrick Butler,Adam Rhodes,Ragib Hasan
Issue Date:June 2012
pp. 487-493
Malware and computer forensic researchers often communicate with malicious servers, either directly or indirectly, through the web browser or other ports utilized by malicious software. Communication with this form of adversary can sometimes necessitate th...
 
On utilization of contributory storage in desktop grids
Found in: Parallel and Distributed Processing Symposium, International
By Chreston Miller, Ali R. Butt, Patrick Butler
Issue Date:April 2008
pp. 1-12
Modern desktop grid environments and shared computing platforms have popularized the use of contributory resources, such as desktop computers, as computing substrates for a variety of applications. However, addressing the exponentially growing storage dema...
 
Coordinated clustering algorithms to support charging infrastructure design for electric vehicles
Found in: Proceedings of the ACM SIGKDD International Workshop on Urban Computing (UrbComp '12)
By M. Shahriar Hossain, Marjan Momtazpour, Mohammad C. Bozchalui, Naren Ramakrishnan, Patrick Butler, Ratnesh Sharma
Issue Date:August 2012
pp. 126-133
The confluence of several developments has created an opportune moment for energy system modernization. In the past decade, smart grids have attracted many research activities in different domains. To realize the next generation of smart grids, we must hav...
     
Storytelling in entity networks to support intelligence analysts
Found in: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '12)
By Arnold P. Boedihardjo, M. Shahriar Hossain, Naren Ramakrishnan, Patrick Butler
Issue Date:August 2012
pp. 1375-1383
Intelligence analysts grapple with many challenges, chief among them is the need for software support in storytelling, i.e., automatically 'connecting the dots' between disparate entities (e.g., people, organizations) in an effort to form hypotheses and su...
     
 1