Frequently Asked Questions - Network Security
Questions:
- Protecting and Securing Supply Chain Data throughout its Lifecycle
- Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoreti
- Matching and Fairness in Threat-based Mobile Sensor Coverage
- Performance Analysis of Stochastic Network Coverage with Limited Mobility
- Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
- Secure Group Communication Over wired/wireless networks
- Virtualization-Enabled Malware Research
- The Poly^2 Project
- Assurable Configuration of Security Policies in Enterprise Networks
- Identifying Undesirable Behavior in P2P Systems
- Secure Collaborative Services for Wireless Mesh Networks
- Secure Networking Using Network Coding
- Leveraging Social Trust in Building Secure Email Networks
- Predictive Blacklisting for Detecting Phishing Attacks
- Botnet Analysis
- Detection and Filtering Spam over Internet Telephony: A User-behavior-aware Intermediate-network-bas
- Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach
- Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
- Developing Attack Defense Ideas for Ad Hoc Wireless Networks
- The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
- Automated Intrusion Response for Distributed Applications
- Undetectable Covert Communication
- VACCINE:Visual Analytics for Command, Control, Interoperability, National Security and Emergencies
- A Systematic Defensive Framework for Combating Botnets
- Customized Network Security Protocols
- Machine Learning Techniques to Model the Impact of Relational Communication on Distributed Team Effe
- Provably Assurable Ad Hoc Networks Under Arbitrary Malicious Behaviors
- Learning Compositional Simulation Models
- Router Models and Downscaling Tools
- Purdue University Regional Visualization and Analytics Center (PURVAC)
- An Abstraction Driven Approach to Characterizing and Designing Networks with Analyzable Prop
- NETS-NOSS: Robust Sensor Network Architeture through Neighborhood Monitoring and Isolation
- A High Assurance, High Capacity Platform for Information Operations
- Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
- Accelerator-based High Performance Computing
- A Testbed for Compiler-supported Scalable Error Monitoring and Diagnosis for Reliable and Secure Sen
- Vulnerability Analysis and Threat Assessment/Avoidance
- Development of a Safe, Virtual Imaging Instrument for Logically Destructive Experiments (ReAssure)
- A Survivable Information Infrastructure for National Civilian BioDefense
- Scalable, Robust and Secure Group-Oriented Services for Wireless Mesh Networks
- Testing and Benchmarking Methodologies for Future Networking Security Mechanisms
- Protecting TCP Congestion Control: Tools for Design, Analysis, and Emulation
- A Testbed for Research and Development of Secure IP Multimedia Communication Services
- Self-Managing Distributed Virtual Environments
- H-Media - the Holistic-Multistream Environment for Distributed Immersive Applications
- Enabling Detection of Elusive Malware by Going Out of the Box with Semantically Reconstructed View
- Towards Trustworthy Peer-To-Peer Overlay Networks
- Composing Large-Scale Synthetic Environments Through Self-Assembly of Heterogeneous Simulat
- Collaborative Attacks In Wireless Networks
- CSONET: A Distributed Wireless Networked Control System For Combined Sewer Overflow Abatement
- Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
- Customized Intrusion Detection and Intrusion Prevention for Client-Server and Peer-to-Peer VOIP
- Towards Virtual Distributed Environments
- Scalable, Reliable Management of Sensor Information
- Predictable, Scalable QoS Routing for Ad-Hoc Wireless Networks Based on Heavy-Tailed Statistics
- Research into Abnormal Malicious Remote Control Detection
- System Support for Detection, Identification, and Tracking Tasks in Sensor-Cyber Networks
- Security of Large Scale Systems
Q:
Protecting and Securing Supply Chain Data throughout its Lifecycle
A:
Q:
Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoreti
A:
Q:
Matching and Fairness in Threat-based Mobile Sensor Coverage
A:
Q:
Performance Analysis of Stochastic Network Coverage with Limited Mobility
A:
Q:
Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
A:
Q:
Secure Group Communication Over wired/wireless networks
A:
Q:
Virtualization-Enabled Malware Research
A:
Q:
The Poly^2 Project
A:
Q:
Assurable Configuration of Security Policies in Enterprise Networks
A:
Q:
Identifying Undesirable Behavior in P2P Systems
A:
Q:
Secure Collaborative Services for Wireless Mesh Networks
A:
Q:
Secure Networking Using Network Coding
A:
Q:
Leveraging Social Trust in Building Secure Email Networks
A:
Q:
Predictive Blacklisting for Detecting Phishing Attacks
A:
Q:
Botnet Analysis
A:
Q:
Detection and Filtering Spam over Internet Telephony: A User-behavior-aware Intermediate-network-bas
A:
Q:
Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach
A:
Q:
Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
A:
Q:
Developing Attack Defense Ideas for Ad Hoc Wireless Networks
A:
Q:
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
A:
Q:
Automated Intrusion Response for Distributed Applications
A:
Q:
Undetectable Covert Communication
A:
Q:
VACCINE:Visual Analytics for Command, Control, Interoperability, National Security and Emergencies
A:
Q:
A Systematic Defensive Framework for Combating Botnets
A:
Q:
Customized Network Security Protocols
A:
Q:
Machine Learning Techniques to Model the Impact of Relational Communication on Distributed Team Effe
A:
Q:
Provably Assurable Ad Hoc Networks Under Arbitrary Malicious Behaviors
A:
Q:
Learning Compositional Simulation Models
A:
Q:
Router Models and Downscaling Tools
A:
Q:
Purdue University Regional Visualization and Analytics Center (PURVAC)
A:
Q:
An Abstraction Driven Approach to Characterizing and Designing Networks with Analyzable Prop
A:
Q:
NETS-NOSS: Robust Sensor Network Architeture through Neighborhood Monitoring and Isolation
A:
Q:
A High Assurance, High Capacity Platform for Information Operations
A:
Q:
Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
A:
Q:
Accelerator-based High Performance Computing
A:
Q:
A Testbed for Compiler-supported Scalable Error Monitoring and Diagnosis for Reliable and Secure Sen
A:
Q:
Vulnerability Analysis and Threat Assessment/Avoidance
A:
Q:
Development of a Safe, Virtual Imaging Instrument for Logically Destructive Experiments (ReAssure)
A:
Q:
A Survivable Information Infrastructure for National Civilian BioDefense
A:
Q:
Scalable, Robust and Secure Group-Oriented Services for Wireless Mesh Networks
A:
Q:
Testing and Benchmarking Methodologies for Future Networking Security Mechanisms
A:
Q:
Protecting TCP Congestion Control: Tools for Design, Analysis, and Emulation
A:
Q:
A Testbed for Research and Development of Secure IP Multimedia Communication Services
A:
Q:
Self-Managing Distributed Virtual Environments
A:
Q:
H-Media - the Holistic-Multistream Environment for Distributed Immersive Applications
A:
Q:
Enabling Detection of Elusive Malware by Going Out of the Box with Semantically Reconstructed View
A:
Q:
Towards Trustworthy Peer-To-Peer Overlay Networks
A:
Q:
Composing Large-Scale Synthetic Environments Through Self-Assembly of Heterogeneous Simulat
A:
Q:
Collaborative Attacks In Wireless Networks
A:
Q:
CSONET: A Distributed Wireless Networked Control System For Combined Sewer Overflow Abatement
A:
Q:
Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
A:
Q:
Customized Intrusion Detection and Intrusion Prevention for Client-Server and Peer-to-Peer VOIP
A:
Q:
Towards Virtual Distributed Environments
A:
Q:
Scalable, Reliable Management of Sensor Information
A:
Q:
Predictable, Scalable QoS Routing for Ad-Hoc Wireless Networks Based on Heavy-Tailed Statistics
A:
Q:
Research into Abnormal Malicious Remote Control Detection
A:
Q:
System Support for Detection, Identification, and Tracking Tasks in Sensor-Cyber Networks
A:
Q:
Security of Large Scale Systems
A: