Product | Reference |
---|---|
Journal Publication | Wang Z., Use of Supervised Machine Learning to Detect Abuse of COVID-19 Related Domain Names, Computers and Electrical Engineering, Volume 100, May 2022. |
Journal Publication | Wang Z., Guo Y., Montgomery D., Machine Learning-Based Algorithmically Generated Domain Detection, Computers and Electrical Engineering, Volume 100, May 2022. |
NIST Publication | Bardhan S., Hatada M., Filliben J., Montgomery D., Jia A., An Evaluation Design for Comparing Netflow Based Network Anomaly Detection Systems Using Synthetic Malicious Traffic, NIST Technical Note, NIST TN-2142, March 2021. |
Conference Publication | Hsieh L., Liu H., Guo Y., Gazda R., Task Management for Cooperative Mobile Edge Computing, ACM/IEEE Workshop on Hot Topics on Web of Things 2020, November 2020.
|
Conference Publication | Hsieh L., Liu H., Guo Y., Gazda R., Quality of Service Optimization in Mobile Edge Computing Networks via Deep Reinforcement Learning, The 15th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2020), September 2020.
|
Software | Bardhan S., Tools to Conduct Evaluation of Network Anomaly Detection (NAD) Systems using Synthetic Data (both Benign and Malicious), https://github.com/usnistgov/Proj-NAD, July 2020. |
Journal Publication | Chen M., Hao Y., Gharavi H., C.M._Leung V., Cognitive Information Measurements: A New Perspective, Information Sciences, Volume 505, December 2019.
|
Conference Publication | Zha Z., Wang A., Guo Y., Montgomery D., Chen S., BotSifter: An SDN-based Online Bot Detection Framework in Data Centers, IEEE CNS 2019, June 2019.
|
NIST Publication | Bardhan S., Montgomery D., Filliben J., Heckert A., A General Methodology for Deriving Network Propagation Models of Computer Worms, Technical Note (NIST TN)--2035, February 2019. |
Presentation | Mai V., Battou A., Mills K., Distributed Algorithm for Suppressing Epidemic Spread in Networks, 2018 IEEE Conference on Decision and Control (CDC), December 2018. |
Journal Publication | Huang J., Chang Z., Wang C., Qian Y., Gharavi H., Li Z., Enabling Technologies for smart internet of Things, Volume: 56, Issue: 9, September 2018. |
Journal Publication | Wang Z., Deep Learning-Based Intrusion Detection with Adversaries, IEEE Access, Volume 6., July 2018. |
Journal Publication | Mai V., Battou A., Mills K., Distributed Algorithm for Suppressing Epidemic Spread in Networks, IEEE Control Systems Letters, vol. 2, no. 3, pp. 555-560, June 2018. |
Collaborators = Akamai, Akamai Technologies, George Mason University, Huazhong University of Science and Technology, Shenzhen University, The Catholic University of America