Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Business

The Effects Of Variability In Demand And Time Parameters For Multi-Item, Multi-Echelon, Multi-Indenture Reparable Inventory Systems, Roberto C. De Abreu Mar 2002

The Effects Of Variability In Demand And Time Parameters For Multi-Item, Multi-Echelon, Multi-Indenture Reparable Inventory Systems, Roberto C. De Abreu

Theses and Dissertations

The office of the Chief Information Officer is still new within public sector organizations. Further, the office of the CIO was hastily created by Federal laws that provide only broad direction for its implementation and practice while at the same time limiting each office's power and reach within Federal agencies. Presently, because of broadly defined scope and the newness of the office in the public sector, Federal CIOs now face many challenges and critical technologies in managing their agency's information resources. Private sector organizations have a valuable knowledge base from their CIO office implementation efforts and subsequent operations. This private …


Six Years After Its Passage, What Has Been The Impact Of The Clinger-Cohen Act On The U.S. Air Force, Edward H. Drollette Mar 2002

Six Years After Its Passage, What Has Been The Impact Of The Clinger-Cohen Act On The U.S. Air Force, Edward H. Drollette

Theses and Dissertations

Information systems are often inundated with thousands of attack alerts to distinguish novice hacker probes from genuine threats. Pattern classification can help filter relatively benign attacks from alerts generated by anomaly detectors, limited the numbers of alerts to requiring attention. This research investigates the feasibility of using pattern classification algorithms on network packed header information to classify network attacks. Both liner discrimination and radial basis function algorithms are trained using flood and scan attacks. The classifiers are then tested with unknown floods and scans to determine how well they categorize previously unseen attacks.