CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Frequently Asked Questions - Network Security

Questions:

Q: Protecting and Securing Supply Chain Data throughout its Lifecycle
A:

Q: Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoreti
A:

Q: Matching and Fairness in Threat-based Mobile Sensor Coverage
A:

Q: Performance Analysis of Stochastic Network Coverage with Limited Mobility
A:

Q: Secure Video Stream Framework for Dynamic and Anonymous Subscriber Groups
A:

Q: Secure Group Communication Over wired/wireless networks
A:

Q: Virtualization-Enabled Malware Research
A:

Q: The Poly^2 Project
A:

Q: Assurable Configuration of Security Policies in Enterprise Networks
A:

Q: Identifying Undesirable Behavior in P2P Systems
A:

Q: Secure Collaborative Services for Wireless Mesh Networks
A:

Q: Secure Networking Using Network Coding
A:

Q: Leveraging Social Trust in Building Secure Email Networks
A:

Q: Predictive Blacklisting for Detecting Phishing Attacks
A:

Q: Botnet Analysis
A:

Q: Detection and Filtering Spam over Internet Telephony: A User-behavior-aware Intermediate-network-bas
A:

Q: Visualization of Wormholes in Underwater Sensor Networks: A Distributed Approach
A:

Q: Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks
A:

Q: Developing Attack Defense Ideas for Ad Hoc Wireless Networks
A:

Q: The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation
A:

Q: Automated Intrusion Response for Distributed Applications
A:

Q: Undetectable Covert Communication
A:

Q: VACCINE:Visual Analytics for Command, Control, Interoperability, National Security and Emergencies
A:

Q: A Systematic Defensive Framework for Combating Botnets
A:

Q: Customized Network Security Protocols
A:

Q: Machine Learning Techniques to Model the Impact of Relational Communication on Distributed Team Effe
A:

Q: Provably Assurable Ad Hoc Networks Under Arbitrary Malicious Behaviors
A:

Q: Learning Compositional Simulation Models
A:

Q: Router Models and Downscaling Tools
A:

Q: Purdue University Regional Visualization and Analytics Center (PURVAC)
A:

Q: An Abstraction Driven Approach to Characterizing and Designing Networks with Analyzable Prop
A:

Q: NETS-NOSS: Robust Sensor Network Architeture through Neighborhood Monitoring and Isolation
A:

Q: A High Assurance, High Capacity Platform for Information Operations
A:

Q: Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
A:

Q: Accelerator-based High Performance Computing
A:

Q: A Testbed for Compiler-supported Scalable Error Monitoring and Diagnosis for Reliable and Secure Sen
A:

Q: Vulnerability Analysis and Threat Assessment/Avoidance
A:

Q: Development of a Safe, Virtual Imaging Instrument for Logically Destructive Experiments (ReAssure)
A:

Q: A Survivable Information Infrastructure for National Civilian BioDefense
A:

Q: Scalable, Robust and Secure Group-Oriented Services for Wireless Mesh Networks
A:

Q: Testing and Benchmarking Methodologies for Future Networking Security Mechanisms
A:

Q: Protecting TCP Congestion Control: Tools for Design, Analysis, and Emulation
A:

Q: A Testbed for Research and Development of Secure IP Multimedia Communication Services
A:

Q: Self-Managing Distributed Virtual Environments
A:

Q: H-Media - the Holistic-Multistream Environment for Distributed Immersive Applications
A:

Q: Enabling Detection of Elusive Malware by Going Out of the Box with Semantically Reconstructed View
A:

Q: Towards Trustworthy Peer-To-Peer Overlay Networks
A:

Q: Composing Large-Scale Synthetic Environments Through Self-Assembly of Heterogeneous Simulat
A:

Q: Collaborative Attacks In Wireless Networks
A:

Q: CSONET: A Distributed Wireless Networked Control System For Combined Sewer Overflow Abatement
A:

Q: Robust Sensor Network Architecture through Neighborhood Monitoring and Isolation
A:

Q: Customized Intrusion Detection and Intrusion Prevention for Client-Server and Peer-to-Peer VOIP
A:

Q: Towards Virtual Distributed Environments
A:

Q: Scalable, Reliable Management of Sensor Information
A:

Q: Predictable, Scalable QoS Routing for Ad-Hoc Wireless Networks Based on Heavy-Tailed Statistics
A:

Q: Research into Abnormal Malicious Remote Control Detection
A:

Q: System Support for Detection, Identification, and Tracking Tasks in Sensor-Cyber Networks
A:

Q: Security of Large Scale Systems
A:

Get Your Degree with CERIAS