Search For:

Displaying 1-11 out of 11 total
Designing an Optimized Alert System Based on Geospatial Location Data
Found in: 2014 47th Hawaii International Conference on System Sciences (HICSS)
By Kimberly Zeitz,Randy Marchany,Joseph Tront
Issue Date:January 2014
pp. 4159-4168
Optimizing responses to various crises is a critical task for the government, institutions, first responders, and everyone involved in public safety. This paper describes the design methodology of ongoing research for planning, implementing, and analyzing ...
   
Dynamic analysis of large datasets with animated and correlated views: VAST 2012 Mini Challenge # award: Honorable mention for good use of coordinated displays
Found in: 2012 IEEE Conference on Visual Analytics Science and Technology (VAST)
By Yong Cao,Reese Moore,Peng Mi,Alex Endert,Chris North,Randy Marchany
Issue Date:October 2012
pp. 283-284
In this paper, we introduce a GPU-accelerated visual analytics tool, AVIST. By adopting the in-situ visualization architecture on the GPUs, AVIST supports real-time data analysis and visualization of massive scale datasets, such as VAST 2012 Challenge data...
 
The Blind Man's Bluff Approach to Security Using IPv6
Found in: IEEE Security & Privacy Magazine
By Matthew Dunlop,Stephen Groat,William Urbanski,Randy Marchany,Joseph Tront
Issue Date:July 2012
pp. 35-43
Most networks today employ static network defenses. The problem with static defenses is that adversaries have unlimited time to circumvent them. This article proposes a moving-target defense based on the Internet Protocol version 6 (IPv6) that dynamically ...
 
Using an IPv6 moving target defense to protect the Smart Grid
Found in: Innovative Smart Grid Technologies, IEEE PES
By Stephen Groat,Matthew Dunlop,William Urbanksi,Randy Marchany,Joseph Tront
Issue Date:January 2012
pp. 1-7
As advanced Internet Protocol (IP)-based communication systems are proposed for the Smart Grid, security solutions must be developed which address not only the security of the communications, but also the security of the communicating systems. To support t...
 
The Good, the Bad, the IPv6
Found in: Communication Networks and Services Research, Annual Conference on
By Matthew Dunlop, Stephen Groat, Randy Marchany, Joseph Tront
Issue Date:May 2011
pp. 77-84
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this ...
 
How Mobile Host Batteries Can Improve Network Security
Found in: IEEE Security and Privacy
By Grant A. Jacoby, Randy Marchany, Nathaniel J. Davis IV
Issue Date:September 2006
pp. 40-49
Distributed battery-based intrusion detection (B-BID) is an efficacious early-warning system that can complement existing intrusion detection systems (IDSs) by alerting users to protect their mobile devices as well as network administrators to protect thei...
 
IPv6: Nowhere to Run, Nowhere to Hide
Found in: Hawaii International Conference on System Sciences
By Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph Tront
Issue Date:January 2011
pp. 1-10
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network...
   
Optimizing a network layer moving target defense for specific system architectures
Found in: 2013 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)
By Owen Hardman,Stephen Groat,Randy Marchany,Joseph Tront
Issue Date:October 2013
pp. 117-118
Complex defenses, such as moving target defenses, exist to help protect against threats. While these new forms of defense offer increased security, they are resource intensive and cannot be run on many new classes of network connected mobile systems. To pr...
   
Using geographic information systems for enhanced network security visualization
Found in: Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application (COM.Geo '10)
By David Shelly, Matthew Dunlop, Peter Sforza, Randy Marchany
Issue Date:June 2010
pp. 1-8
The sheer volume of information that floods a network makes it difficult for network analysts to identify and isolate network security threats. This difficulty is compounded by the fact that the tools available to accomplish this task lack usability and ar...
     
The privacy implications of stateless IPv6 addressing
Found in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
By Joseph Tront, Matthew Dunlop, Randy Marchany, Stephen Groat
Issue Date:April 2010
pp. 1-4
Current implementations of the Internet Protocol version 6 (IPv6) use a static value determined from the Media Access Control (MAC) address as the host portion, or interface identifier (IID), of the IPv6 address. Some implementations create the IID using t...
     
Identifying, characterizing, and controlling stealth worms in wireless networks through biological epidemiology
Found in: Proceedings of the second international workshop on Wireless traffic measurements and modeling (WitMeMo '06)
By Kristopher Hall, Nathaniel Davis, Randy Marchany
Issue Date:August 2006
pp. 1-es
This paper defines and evaluates a network security system, Rx, inspired by biological epidemiology that defends wireless networks against stealth worms. Rx applies concepts from epidemiology to identify and control worm behavior at the network level by ag...
     
 1