フォロー
Alex Kent
Alex Kent
所属不明
確認したメール アドレス: aplace.org
タイトル
引用先
引用先
Cyber security data sources for dynamic network research
AD Kent
Dynamic Networks and Cyber-Security, 37-65, 2016
1942016
Unified host and network data set
MJM Turcotte, AD Kent, C Hash
Data science for cyber-security, 1-22, 2019
1502019
Comprehensive, multi-source cyber-security events
AD Kent
Los Alamos National Laboratory, 25, 2015
982015
Authentication graphs: Analyzing user behavior within an enterprise network
AD Kent, LM Liebrock, JC Neil
Computers and Security, http://dx.doi.org/10.1016/j.cose.2014.09, 2014
922014
Towards a bayesian network game framework for evaluating ddos attacks and defense
G Yan, R Lee, A Kent, D Wolpert
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
712012
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
512017
Coevolutionary agent-based network defense lightweight event system (CANDLES)
G Rush, DR Tauritz, AD Kent
Proceedings of the Companion Publication of the 2015 Annual Conference on …, 2015
472015
Connected components and credential hopping in authentication graphs
A Hagberg, N Lemons, A Kent, J Neil
2014 Tenth International Conference on Signal-Image Technology and Internet …, 2014
422014
Comprehensive, multi-source cyber-security events data set
AD Kent
Los Alamos National Lab.(LANL), Los Alamos, NM (United States), 2015
322015
Detecting anomalous behavior via user authentication graphs
A Kent, J Neil, L Liebrock
US Patent 10,015,175, 2018
282018
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
212019
Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes
AD Kent
US Patent 7,421,576, 2008
212008
Differentiating user authentication graphs
AD Kent, LM Liebrock
2013 IEEE Security and Privacy Workshops, 72-75, 2013
172013
Network traffic analysis with query driven visualization sc 2005 hpc analytics results
K Stockinger, K Wu, S Campbell, S Lau, M Fisk, E Gavrilov, A Kent, ...
SC'05: Proceedings of the 2005 ACM/IEEE Conference on Supercomputing, 72-72, 2005
172005
Modelling user behaviour in a network using computer event logs
MJM Turcotte, NA Heard, AD Kent
Dynamic Networks and Cyber-Security, 67-87, 2016
162016
Secure communication via shared knowledge and a salted hash in ad-hoc environments
AD Kent, LM Liebrock
2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011
152011
Modeling behavior in a network using event logs
MJM Turcotte, NA Heard, AD Kent
US Patent 10,375,095, 2019
132019
Evolving random graph generators: A case for increased algorithmic primitive granularity
AS Pope, DR Tauritz, AD Kent
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
122016
User-computer authentication associations in time
AD Kent
Los Alamos National Laboratory, 2014
122014
Evolving multi-level graph partitioning algorithms
AS Pope, DR Tauritz, AD Kent
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
112016
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20