Search Results

Advanced search parameters have been applied.
open access

Statistical language analysis for automatic exfiltration event detection.

Description: This paper discusses the recent development a statistical approach for the automatic identification of anomalous network activity that is characteristic of exfiltration events. This approach is based on the language processing method eferred to as latent dirichlet allocation (LDA). Cyber security experts currently depend heavily on a rule-based framework for initial detection of suspect network events. The application of the rule set typically results in an extensive list of uspect network even… more
Date: April 1, 2010
Creator: Robinson, David Gerald
Partner: UNT Libraries Government Documents Department
open access

Vulnerability of critical infrastructures : identifying critical nodes.

Description: The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-spe… more
Date: June 1, 2004
Creator: Cox, Roger Gary & Robinson, David Gerald
Partner: UNT Libraries Government Documents Department
open access

Tracking topic birth and death in LDA.

Description: Most topic modeling algorithms that address the evolution of documents over time use the same number of topics at all times. This obscures the common occurrence in the data where new subjects arise and old ones diminish or disappear entirely. We propose an algorithm to model the birth and death of topics within an LDA-like framework. The user selects an initial number of topics, after which new topics are created and retired without further supervision. Our approach also accommodates many of th… more
Date: September 1, 2011
Creator: Wilson, Andrew T. & Robinson, David Gerald
Partner: UNT Libraries Government Documents Department
open access

Development of a statistically based access delay timeline methodology.

Description: The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversary's task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-cas… more
Date: February 1, 2013
Creator: Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane & Hendrickson, Stacey M. Langfitt
Partner: UNT Libraries Government Documents Department
open access

SNL software manual for the ACS Data Analytics Project.

Description: In the ACS Data Analytics Project (also known as 'YumYum'), a supercomputer is modeled as a graph of components and dependencies, jobs and faults are simulated, and component fault rates are estimated using the graph structure and job pass/fail outcomes. This report documents the successful completion of all SNL deliverables and tasks, describes the software written by SNL for the project, and presents the data it generates. Readers should understand what the software tools are, how they fit to… more
Date: October 1, 2011
Creator: Stearley, Jon R.; McLendon, William Clarence, III; Rodrigues, Arun F.; Williams, Aaron S.; Hooper, Russell Warren; Robinson, David Gerald et al.
Partner: UNT Libraries Government Documents Department
Back to Top of Screen