Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Physical Sciences and Mathematics
Using An Inductive Learning Algorithm To Improve Antibody Generation In A Single Packet Computer Defense Immune System, Russell J. Aycock
Using An Inductive Learning Algorithm To Improve Antibody Generation In A Single Packet Computer Defense Immune System, Russell J. Aycock
Theses and Dissertations
Coherent optical sources in the mid-infrared region (mid-IR) are important fundamental tools for infrared countermeasures and battlefield remote sensing. Nonlinear optical effects can be applied to convert existing near-IR laser sources to radiate in the mid-IR. This research focused on achieving such a conversion with a quasi-phase matched optical parametric oscillators using orientation-patterned gallium arsenide (OPGaAs), a material that can be quasi-phased matched by periodically reversing the crystal structure during the epitaxial growth process. Although non-linear optical conversion was not ultimately achieved during this research, many valuable lessons were learned from working with this material. This thesis reviews the theory …
Using Relational Schemata In A Computer Immune System To Detect Multiple-Packet Network Intrusions, John L. Bebo
Using Relational Schemata In A Computer Immune System To Detect Multiple-Packet Network Intrusions, John L. Bebo
Theses and Dissertations
Given the increasingly prominent cyber-based threat, there are substantial research and development efforts underway in network and host-based intrusion detection using single-packet traffic analysis. However, there is a noticeable lack of research and development in the intrusion detection realm with regard to attacks that span multiple packets. This leaves a conspicuous gap in intrusion detection capability because not all attacks can be found by examining single packets alone. Some attacks may only be detected by examining multiple network packets collectively, considering how they relate to the "big picture," not how they are represented as individual packets. This research demonstrates a …