Dorene Ryder - Academia.edu (original) (raw)
Papers by Dorene Ryder
2016 IEEE Globecom Workshops (GC Wkshps), 2016
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2000
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001
2014 IEEE Military Communications Conference, 2014
Lecture Notes in Computer Science, 2007
We were recently challenged to deploy a scalable network of host based defenses using the 3com em... more We were recently challenged to deploy a scalable network of host based defenses using the 3com embedded firewall (EFW). The goal was to test EFW scalability in a fully operational environment. A host-based, distributed firewall like EFW requires a different perspective on policy configuration and management than a conventional perimeter firewall. They can improve overall network security by pushing protection to the network endpoints. We implemented the following workaround: protecting first the critical mission assets; restrict access to a host but relax access from the host; leverage other available countermeasures. We also instrumented the internal network with a freeware intrusion detection system (IDS) to monitor the link between the enclave and the satellite connection leading to the perimeter firewall and the extranet.
The Journal of the Acoustical Society of America, 1993
The Journal of the Acoustical Society of America, 1995
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001
IEEE Security & Privacy Magazine, 2003
By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...
Proceedings of the IEEE SMC Information Assurance …
Ieee Security and Privacy, 2003
By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...
MILCOM 2013 - 2013 IEEE Military Communications Conference, 2013
ABSTRACT Military dismounted communications are critical to the success of missions and safety of... more ABSTRACT Military dismounted communications are critical to the success of missions and safety of soldiers, and hence are strongly regimented and hierarchical. Certain situational awareness apps have been introduced, where content is exchanged between soldiers in a squad, but soldiers primarily carry any needed content out with them and bring any collected content back to base. Furthermore, soldiers rarely share content among themselves or with other squads, and any readily needed content must be retrieved through an expensive "reachback" link to base. We present CASCADE, a content-centric networking architecture that facilitates generation and dissemination of content based on soldiers' interests, both statically assigned (e.g., specialty within the squad) and dynamically discovered (i.e., derived from context). The key enabling abstraction within a CASCADE network is the concept of communities. Through the use of both topological and interest-based communities, CASCADE is able to quickly and efficiently deliver content, even in environments prone to disruption.
2016 IEEE Globecom Workshops (GC Wkshps), 2016
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2000
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001
2014 IEEE Military Communications Conference, 2014
Lecture Notes in Computer Science, 2007
We were recently challenged to deploy a scalable network of host based defenses using the 3com em... more We were recently challenged to deploy a scalable network of host based defenses using the 3com embedded firewall (EFW). The goal was to test EFW scalability in a fully operational environment. A host-based, distributed firewall like EFW requires a different perspective on policy configuration and management than a conventional perimeter firewall. They can improve overall network security by pushing protection to the network endpoints. We implemented the following workaround: protecting first the critical mission assets; restrict access to a host but relax access from the host; leverage other available countermeasures. We also instrumented the internal network with a freeware intrusion detection system (IDS) to monitor the link between the enclave and the satellite connection leading to the perimeter firewall and the extranet.
The Journal of the Acoustical Society of America, 1993
The Journal of the Acoustical Society of America, 1995
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001
IEEE Security & Privacy Magazine, 2003
By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...
Proceedings of the IEEE SMC Information Assurance …
Ieee Security and Privacy, 2003
By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...
MILCOM 2013 - 2013 IEEE Military Communications Conference, 2013
ABSTRACT Military dismounted communications are critical to the success of missions and safety of... more ABSTRACT Military dismounted communications are critical to the success of missions and safety of soldiers, and hence are strongly regimented and hierarchical. Certain situational awareness apps have been introduced, where content is exchanged between soldiers in a squad, but soldiers primarily carry any needed content out with them and bring any collected content back to base. Furthermore, soldiers rarely share content among themselves or with other squads, and any readily needed content must be retrieved through an expensive "reachback" link to base. We present CASCADE, a content-centric networking architecture that facilitates generation and dissemination of content based on soldiers' interests, both statically assigned (e.g., specialty within the squad) and dynamically discovered (i.e., derived from context). The key enabling abstraction within a CASCADE network is the concept of communities. Through the use of both topological and interest-based communities, CASCADE is able to quickly and efficiently deliver content, even in environments prone to disruption.