Dorene Ryder - Academia.edu (original) (raw)

Papers by Dorene Ryder

Research paper thumbnail of Content sharing with mobility in an infrastructure-less environment

Research paper thumbnail of NDN in Large Detached Underwater Sensing Arrays

2016 IEEE Globecom Workshops (GC Wkshps), 2016

Research paper thumbnail of Cyber Panel Experimentation Program

Research paper thumbnail of Dynamic approaches to thwart adversary intelligence gathering

Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2000

Research paper thumbnail of The Information Battlespace preparation experiment

Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001

Research paper thumbnail of An Efficient and Expressive Access Control Architecture for Content-Based Networks

2014 IEEE Military Communications Conference, 2014

Research paper thumbnail of An Evaluation of Triple-Store Technologies for Large Data Stores

Lecture Notes in Computer Science, 2007

Research paper thumbnail of On the Large-Scale Deployment of a Distributed Embedded Firewall

We were recently challenged to deploy a scalable network of host based defenses using the 3com em... more We were recently challenged to deploy a scalable network of host based defenses using the 3com embedded firewall (EFW). The goal was to test EFW scalability in a fully operational environment. A host-based, distributed firewall like EFW requires a different perspective on policy configuration and management than a conventional perimeter firewall. They can improve overall network security by pushing protection to the network endpoints. We implemented the following workaround: protecting first the critical mission assets; restrict access to a host but relax access from the host; leverage other available countermeasures. We also instrumented the internal network with a freeware intrusion detection system (IDS) to monitor the link between the enclave and the satellite connection leading to the perimeter firewall and the extranet.

Research paper thumbnail of Feedforward control with the higher-harmonic, time-averaged, gradient (H-TAG) descent algorithm

The Journal of the Acoustical Society of America, 1993

Research paper thumbnail of Feedforward control using the higher-harmonic, time-averaged gradient descent algorithm

The Journal of the Acoustical Society of America, 1995

Research paper thumbnail of DARPA Information Assurance Program dynamic defense experiment summary

IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001

Research paper thumbnail of Validation of sensor alert correlators

IEEE Security & Privacy Magazine, 2003

By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...

Research paper thumbnail of Observations on the effects of defense in depth on adversary behavior in cyber warfare

Proceedings of the IEEE SMC Information Assurance …

Research paper thumbnail of Validation of Sensor Alert Correlators

Ieee Security and Privacy, 2003

By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...

Research paper thumbnail of CASCADE: Content Access System for the Combat-Agile Distributed Environment

MILCOM 2013 - 2013 IEEE Military Communications Conference, 2013

ABSTRACT Military dismounted communications are critical to the success of missions and safety of... more ABSTRACT Military dismounted communications are critical to the success of missions and safety of soldiers, and hence are strongly regimented and hierarchical. Certain situational awareness apps have been introduced, where content is exchanged between soldiers in a squad, but soldiers primarily carry any needed content out with them and bring any collected content back to base. Furthermore, soldiers rarely share content among themselves or with other squads, and any readily needed content must be retrieved through an expensive "reachback" link to base. We present CASCADE, a content-centric networking architecture that facilitates generation and dissemination of content based on soldiers' interests, both statically assigned (e.g., specialty within the squad) and dynamically discovered (i.e., derived from context). The key enabling abstraction within a CASCADE network is the concept of communities. Through the use of both topological and interest-based communities, CASCADE is able to quickly and efficiently deliver content, even in environments prone to disruption.

Research paper thumbnail of Content sharing with mobility in an infrastructure-less environment

Research paper thumbnail of NDN in Large Detached Underwater Sensing Arrays

2016 IEEE Globecom Workshops (GC Wkshps), 2016

Research paper thumbnail of Cyber Panel Experimentation Program

Research paper thumbnail of Dynamic approaches to thwart adversary intelligence gathering

Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2000

Research paper thumbnail of The Information Battlespace preparation experiment

Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001

Research paper thumbnail of An Efficient and Expressive Access Control Architecture for Content-Based Networks

2014 IEEE Military Communications Conference, 2014

Research paper thumbnail of An Evaluation of Triple-Store Technologies for Large Data Stores

Lecture Notes in Computer Science, 2007

Research paper thumbnail of On the Large-Scale Deployment of a Distributed Embedded Firewall

We were recently challenged to deploy a scalable network of host based defenses using the 3com em... more We were recently challenged to deploy a scalable network of host based defenses using the 3com embedded firewall (EFW). The goal was to test EFW scalability in a fully operational environment. A host-based, distributed firewall like EFW requires a different perspective on policy configuration and management than a conventional perimeter firewall. They can improve overall network security by pushing protection to the network endpoints. We implemented the following workaround: protecting first the critical mission assets; restrict access to a host but relax access from the host; leverage other available countermeasures. We also instrumented the internal network with a freeware intrusion detection system (IDS) to monitor the link between the enclave and the satellite connection leading to the perimeter firewall and the extranet.

Research paper thumbnail of Feedforward control with the higher-harmonic, time-averaged, gradient (H-TAG) descent algorithm

The Journal of the Acoustical Society of America, 1993

Research paper thumbnail of Feedforward control using the higher-harmonic, time-averaged gradient descent algorithm

The Journal of the Acoustical Society of America, 1995

Research paper thumbnail of DARPA Information Assurance Program dynamic defense experiment summary

IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001

Research paper thumbnail of Validation of sensor alert correlators

IEEE Security & Privacy Magazine, 2003

By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...

Research paper thumbnail of Observations on the effects of defense in depth on adversary behavior in cyber warfare

Proceedings of the IEEE SMC Information Assurance …

Research paper thumbnail of Validation of Sensor Alert Correlators

Ieee Security and Privacy, 2003

By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinc... more By virtue of these different ap-proaches, each correlator is capable of reasoning about a distinct portion of the overall attack space. Notionally, correlators can cover, possibly overlapping, portions of an attack space. Collectively they can provide useful infor-mation over a broader array ...

Research paper thumbnail of CASCADE: Content Access System for the Combat-Agile Distributed Environment

MILCOM 2013 - 2013 IEEE Military Communications Conference, 2013

ABSTRACT Military dismounted communications are critical to the success of missions and safety of... more ABSTRACT Military dismounted communications are critical to the success of missions and safety of soldiers, and hence are strongly regimented and hierarchical. Certain situational awareness apps have been introduced, where content is exchanged between soldiers in a squad, but soldiers primarily carry any needed content out with them and bring any collected content back to base. Furthermore, soldiers rarely share content among themselves or with other squads, and any readily needed content must be retrieved through an expensive "reachback" link to base. We present CASCADE, a content-centric networking architecture that facilitates generation and dissemination of content based on soldiers' interests, both statically assigned (e.g., specialty within the squad) and dynamically discovered (i.e., derived from context). The key enabling abstraction within a CASCADE network is the concept of communities. Through the use of both topological and interest-based communities, CASCADE is able to quickly and efficiently deliver content, even in environments prone to disruption.