Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Theses and Dissertations

2002

Computer networks--Security measures

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Using An Inductive Learning Algorithm To Improve Antibody Generation In A Single Packet Computer Defense Immune System, Russell J. Aycock Mar 2002

Using An Inductive Learning Algorithm To Improve Antibody Generation In A Single Packet Computer Defense Immune System, Russell J. Aycock

Theses and Dissertations

Coherent optical sources in the mid-infrared region (mid-IR) are important fundamental tools for infrared countermeasures and battlefield remote sensing. Nonlinear optical effects can be applied to convert existing near-IR laser sources to radiate in the mid-IR. This research focused on achieving such a conversion with a quasi-phase matched optical parametric oscillators using orientation-patterned gallium arsenide (OPGaAs), a material that can be quasi-phased matched by periodically reversing the crystal structure during the epitaxial growth process. Although non-linear optical conversion was not ultimately achieved during this research, many valuable lessons were learned from working with this material. This thesis reviews the theory …


Using Relational Schemata In A Computer Immune System To Detect Multiple-Packet Network Intrusions, John L. Bebo Mar 2002

Using Relational Schemata In A Computer Immune System To Detect Multiple-Packet Network Intrusions, John L. Bebo

Theses and Dissertations

Given the increasingly prominent cyber-based threat, there are substantial research and development efforts underway in network and host-based intrusion detection using single-packet traffic analysis. However, there is a noticeable lack of research and development in the intrusion detection realm with regard to attacks that span multiple packets. This leaves a conspicuous gap in intrusion detection capability because not all attacks can be found by examining single packets alone. Some attacks may only be detected by examining multiple network packets collectively, considering how they relate to the "big picture," not how they are represented as individual packets. This research demonstrates a …