Zobrazeno 1 - 10
of 134
pro vyhledávání: '"Poylisher, A."'
Autor:
Kott, Alexander, Thomas, Ryan, Drašar, Martin, Kont, Markus, Poylisher, Alex, Blakely, Benjamin, Theron, Paul, Evans, Nathaniel, Leslie, Nandi, Singh, Rajdeep, Rigaki, Maria, Yang, S Jay, LeBlanc, Benoit, Losiewicz, Paul, Hourlier, Sylvain, Blowers, Misty, Harney, Hugh, Wehner, Gregory, Guarino, Alessandro, Komárková, Jana, Rowell, James
This report summarizes the discussions and findings of the Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience organized by the NATO research group IST-152-RTG. The workshop was held in Prague, Czech Republic, on 18-20 October
Externí odkaz:
http://arxiv.org/abs/1804.07646
Autor:
A. Poylisher, A. Cichocki, K. Guo, J. Hunziker, L. Kant, B. Krishnamachari, S. Avestimehr, M. Annavaram
Publikováno v:
MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM).
Autor:
Sridhar Venkatesan, Youzwak, Jason A, Cho-Yu J Chiang, Shridatt Sugrim, Poylisher, Alexander, Witkowski, Matthew, Walther, Gary, Wolberg, Michelle, Chadha, Ritu, E Allison Newcomb, Hoffman, Blaine, Norbou Buchler
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::126bdaa4ad7885f24f821b2528f97751
Publikováno v:
MILCOM
Modern, general purpose error control solutions at the link and transport layers provide strong error control, suitable for most applications in most environments. There are, however, known limitations when applied to wireless, mobile and hostile env
Publikováno v:
MILCOM
With the currently deployed tactical software defined radios (SDRs), there is no easy way to develop advanced Layer 3 (L3) QoS functionalities independently of the idiosyncrasies of the operating systems (OSs) and Layer 2 (L2) technologies. This sign
Autor:
Jason A. Youzwak, Shridatt Sugrim, Alexander Poylisher, Sridhar Venkatesan, E. Allison Newcomb, Cho-Yu J. Chiang, Ritu Chadha, Michelle Wolberg, Matthew Witkowski, Blaine Hoffman, Gary Walther, Norbou Buchler
Publikováno v:
MILCOM
Cyber training, security testing, and research and development activities are vital to improve the security posture of a network. Currently, many institutions use cyber security testbeds to conduct these activities in an isolated virtual environment.
Autor:
John Sonchack, Nik Sultana, Alexander Poylisher, Anthony McAuley, Nishanth Prabhu, Lei Shi, Hans Giesen, Anirudh Chelluri, Boon Thau Loo, André DeHon, Latha Kant
Publikováno v:
NetCompute@SIGCOMM
Failing network links are usually disabled, and packets are routed around them until the links are repaired. While it is often possible to utilize some of a failing link's capacity, losing what remains of a link's capacity is typically deemed prefera
Autor:
Ayumu Kubota, Angelo Sapello, Giovanni Di Crescenzo, Jesse Elwell, Abhrajit Ghosh, Takashi Matsunaka, Alexander Poylisher
Publikováno v:
CLOSER
Publikováno v:
ACSSC
Non-parametric inference techniques are proposed to understand latent structure behind sequences of spectral activity indicators, i.e. packet start and stop times, of networked wireless transmitters. We aim to infer the latent network structure and c