Jump To: Google | Google Scholar | Library | Gmail | Hotmail | GT Mail | GT Sav Mail | Comcast | Myspace | Facebook |

Lane Thames

Contact Information:
210 Technology Circle
Savannah, GA 31407
912-695-0890
lane.thames@gtsav.gatech.edu

Reading References

Abouzakhar, N., Gani, A., Manson, G., Abuitbel, M., King, D., "Bayesian Learning Networks Approach to Cybercrime Detection", Proceedings of the 2003 PostGraduate Networking Conference (PGNET 2003), Liverpool, United Kingdom, 2003

Alessandri, D., "Using Rule-Based Activity Descriptions to Evaluate Intrusion Detection Systems", Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), 2000

Amor, N., Benferhat, S., Elouedi, Z., "Naļ Bayes vs Decision Trees in Intrusion Detection Systems", Proceedings of the 19th Annual ACM Symposium on Applied Computing, pp. 420-424, 2004

Axelsson, S., "Intrusion Detection Systems: A Survey and Taxonomy", Technical Report, pp. 99-115, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000

Bellovin, S.M., "Distributed Firewalls", ;login:, Vol. 24, pp. 37-47, November 1999

Bellovin, S.M., "Security Problems in the TCP/IP Protocol Suite", ACM Computer Communications Review, Volume 19, No. 2, pp. 32-48, April 1989

Blaze, M., Ioannidis, J., Keromytis, A., "Experience with the KeyNote Trust Management System: Applications and Future Directions", In Trust Management, Vol. 2692, Lecture Notes in Computer Science, Springer-Berlin, pp.284-300, 2003

Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D., "The Role of Trust Management in Distributed Systems Security", Secure Internet Programming: security issues for mobile and distributed objects, pp. 185-210, 1999

Blaze, M., Feigenbaum, J., Keromytis, A.D., "KeyNote: Trust Management for Public-Key Infrastructures", Security Protocols: 6th International Workshop, pp. 59-63, 1999

Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D., "The KeyNote Trust-Management System Version 2", RFC 2704, Internet Engineering Task Force Draft, http://www.ietf.org/rfc/rfc2704.txt, 1999

Chen, Z., Gao, L., Kwiat, K., "Modeling the Spread of Active Worms", Proceedings of the IEEE 2003 Conference on Computer Communications (INFOCOM03), 2003

Cheswick, W.R., Bellovin, S.M., Rubin, A.D., Firewalls and Internet Security, 2nd Edition, Addison-Wesly, Boston, MA, 2003 Church, C., Schmoyer, T., Owen, H. L., "Design and Implementation of a Lab Worm", Proceedings of the 2004 IEEE Workshop on Information Assurance, June 2004

Cohen, F., "Computer Viruses-Theory and Experiments", Computers and Security, Volume 6, pp. 22-35, 1987

Cooper, G., "Computational Complexity of Probabilistic Inference using Bayesian Belief Networks", Artificial Intelligence , Vol. 42, pp. 393-405, 1990

Copeland, J., Abler, R., Bernhardt, K., "IP Flow Identification for IP Traffic Carried over Switched Networks", Computer Networks and ISDN Systems, 1998

Cunningham, R.K., et al, "Evaluating Intrusion Detection Systems without Attacking your Friends: The 1998 DARPA Intrusion Detection Evaluation", Proceedings of the Third Conference and Workshop on Intrusion Detection and Response, 1999

Doraswamy, N., Harkins, D., IPSec, Prentice Hall, Upper Saddle River, NJ, 2003

Ellison, C., "SPKI Requirements", RFC 2692, Internet Engineering Task Force Draft, http://www.ietf.org/rfc/rfc2692.txt, 1999

Evers, J., "Hacking for Dollars", CNET news, July 6, 2005, http://www.cnetnews.com

Gaffney, J., Ulvila, J., "Evaluation of Intrusion Detectors: A Decision Theory Approach", Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

Ioannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M., "Implementing a Distributed Firewall", Proceedings of Computer and Communications Security (CCS), 2000, pp. 190-1999

Kendall, K., "A Database of Computer Attacks for the Evaluations of Intrusion Detection Systems", S.M. Thesis, MIT Department of Electrical Engineering and Computer Science, June 1999

Kohonen, T., "The Self-Organizing Map", Proceedings of the IEEE, Vol. 78, Issue: 9, pp. 1464-1480, 1990

Kohonen, T., Simula, O., Oja, E., "Engineering Applications of the Self-Organizing Maps", Proceedings of the IEEE, Vol. 84, No. 10, pp. 1358-1384, 1996

Laing, B., "Intrusion Detection Systems", Internet Security Systems, http://www.iis.com , 2000

Landwehr, C., Bull, A., McDermott, J., Choi, W., "A Taxonomy of Computer Program Security Flaws", Information Technology Division, Naval Research Laboratory, Washington, D.C., 1994

Lee, S., Heinbuch, D., "Training a Neural Network Based Intrusion Detector to Recognize Novel Attacks", Information Assurance and Security, pp.40-46, 2000

Lewandowski, S.M., Hook, D.J.V., O'Leary, G.C., Haines, J.W., Rossey, M.L., "SARA: Survivable Autonomic Response Architecture", Proceedings of the DARPA Information Survivability Conference and Exposition II, Vol. 1, pp. 77-88, 2001

Lichodzijewski, P., Zincir-Heywood, A., Heywood, M., "Host Based Intrusion Detection using Self-organizing Maps", Proceedings of the 2002 IEEE World Congress on Computation Intelligence, 2002

Maxion, R., Tan, K.M.C., "Benchmarking Anomaly-Based Detection Systems", Proceedings of the First International Conference on Dependable Systems and Networks, pp. 623-630, June 2000

Me, L., "Security Audit Trial Analysis using Genetic Algorithms", Proceedings of the International Conference on Computer Safety, Reliability and Security, pp. 329-340, October 1993

Montalbano, E., "Botnet Hacker Pleads Guilty", PC World (IDG News Service), January 24, 2006, http://www.pcworld.com

Moore, D., Shannon, C., Voelker, G.M., Savage, S., "Internet Quarantine: Requirements for Containing Self-Propagating Code", Proceedings of the IEEE 2003 Conference on Computer Communications (INFOCOM03), 2003

Morris, R., Berk, V., Bakos, G., "Designing a Framework for Active Worm Detection on Global Networks", Proceedings of the First IEEE International Workshop on Information Assurance, pp. 13-23, 2003

Odlyzko, A.M., "Internet Traffic Growth: Sources and Implications", Proceedings of the SPIE, Optical Transmission Systems and Equipment for WDM Networking II, Volume 5247, PP. 1-15, 2003

Pearl, J., Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference, Morgan Kaufmann, Los Altos, CA, 1988

Pearl, J., Russell, S., "Bayesian Networks", Handbook of Brain Theory and Neural Networks, MIT Press, 2001

Porras, P., Neumann, P., "EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances", Proceedings of the National Information Systems Security Conference (NISSC), 1997

Riley, G., Sharif, M., Lee, W., "Simulating Internet Worms", Proceedings of the 12th IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2004), October, 2004

Rochlis, J., Eichin, M., "With Microscope and Tweezers: The Worm from MIT's Perspective", Communications of the ACM, Volume 32, No. 6, pp. 689-698, June 1989

Russell, S. J., Norvig, P., Artificial Intelligence: A Modern Approach, Prentice Hall, Prentice Hall Series in Artificial Intelligence, Upper Saddle River, NJ 07458, Feburary 2003

Schnackenberg, D., Djahandari, K., Sterne, D., "Infrastructure for Intrusion Detection and Response", Proceedings of the 2000 DARPA InformationSurvivability Conference and Exposition (DISEX'00), Hilton Head, SC, 2000

Schnackenberg, D., Holliday, H., Smith, R., Djadhandari, K., Sterne, D., "Cooperative Intrusion Traceback and Response Architecture (CITRA)", Proceedings of the IEEE DARPA Information Survivability Conference and Exposition, pp. 56-68, 2001

Skoudis, E., Counter Hack: A Step by Step Guide to Computer Attacks and Effective Defenses, Prentice Hall, Upper Saddle River, NJ, 2002

Smith, R., Chen, Y., Bhattacharya, S., "Cascade of Distributed and Cooperating Firewalls in a Secure Data Network", IEEE Transactions on Knowledge and Data Engineering, Vol. 15, NO. 5, pp. 1307-1315, 2003

Spafford, E., "The Internet Worm: Crisis and Aftermath", Communications of the ACM, Volume 32, No. 6, pp. 678-687, June 1989

Stallings, W., Network Security Essentials, Prentice Hall, Upper Saddle River, NJ, 2003

Staniford, S., Paxson, V., Weaver, N.C., "How to Own the Internet in your Spare Time", Proceedings of the 11th USENIX Security Symposium (Security'02), 2002

Stevens, W.R., TCP/IP Illustrated, Volume 1: The Protocols, Pearson Education, December 1993

Thames, J.L., Abler, R., Saad, A., "Hybrid Intelligent Systems for Network Security", Proceedings of the 2006 ACM Southeast Conference (ACMSE06), Melbourne, FLA, March 2006

Thames, J.L., Abler, R., "Implementing Distributed Internet Security Using a Firewall Collaboration Framework", Proceedings of the 2007 IEEE Southeast Conference (IEEESEC07), Richmond, VA, March 2007

Valdes, A., Skinner K., "Adaptive Model-based Monitoring for Cyber Attack Detection", Proceedings of Recent Advances in Intrusion Detection (RAID 2000), Toulouse, France, 80-92, 2000

Warrender, C., Forrest, S., Pearlmutter, B., "Detecting Intrusions using System Calls: Alternative Data Models", Proceedings of the IEEE Symposium on Security and Privacy, pp. 133-145, 1999

Zou, C., Towsley, D., Weibo, G., "A Firewall Network System for Worm Defense in Enterprise Networks", Technical Report: TR-04-CSE-01, University of Massachusetts, Amherst, 2004

Zou, C., Gong, W., Towsley, D., "Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense", Proceedings of the ACM 2003 Workshop on Rapid Malcode (WORM'03), October 2003

Zou, C., Gao, L., Gong, W., Towsley, D., "Monitoring and Early Warning for Internet Worms", Proceedings of the ACM 2003 Conference on Computer and Communications Security (CCS'03), October 2003

Zou, C., Gong, W., Towsley, D., "Code Red Worm Propagation Modeling and Analysis", Proceedings of the ACM 2002 Conference on Computer and Communications Security (CCS'02), November 2002