Part of the Computer Sciences Commons
Works by James D. Cannady Jr. in Computer Sciences
2018
Boundary Expansion of Expert Systems: Incorporating Evolutionary Computation with Intrusion Detection Solutions
James Cannady
Boundary Expansion of Expert Systems: Incorporating Evolutionary Computation with Intrusion Detection Solutions
James Cannady
Detection of Distributed Attacks in Mobile Ad-Hoc Networks Using Self-Organizing Temporal Neural Networks
James Cannady
The user attribution problem and the challenge of persistent surveillance of user activity in complex networks
James Cannady
2016
Improving the Performance of Self-Organizing Maps for Intrusion Detection
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2015
12 Things You Must Know About Security
CCE Faculty Proceedings, Presentations, Speeches and Lectures
The Cyber War That You Didn't Know We're Losing
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Intrusion Detection Research Directions
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Developing an Information Security Curriculum
CCE Faculty Proceedings, Presentations, Speeches and Lectures
New Directions in Information Security Research
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Information Security Research Opportunities
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2013
The Detection of Temporally Distributed Network Attacks Using an Adaptive Hierarchical Neural Network
CCE Faculty Proceedings, Presentations, Speeches and Lectures
The Detection of Temporally Distributed Network Attacks Using an Adaptive Hierarchical Neural Network
CCE Faculty Articles
Information Security Research Opportunities
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2012
Minimal Dataset for Network Intrusion Detection Systems via MID-PCA: A Hybrid Approach
CCE Faculty Articles
Minimal Dataset for Network Intrusion Detection Systems via MID-PCA: A Hybrid Approach
CCE Faculty Proceedings, Presentations, Speeches and Lectures
The Application of Neural Computation to Information Security
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Automated Detection of Semagram-Laden Images Using Adaptive Neural Networks
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2011
An Adaptive Neural Swarm Approach for Intrusion Defense in Ad Hoc Networks
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Information Security Research Opportunities
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2010
Not So Fast Flux Networks for Concealing Scam Servers
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Detection of Distributed Attacks in Mobile Ad-Hoc Networks Using Self-Organizing Temporal Neural Networks
CCE Faculty Articles
Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks
CCE Faculty Articles
2009
Distributed Detection of Attacks in Mobile Ad-Hoc Networks Using Learning Vector Quantization
CCE Faculty Articles
Asset Priority Risk Assessment Using Hidden Markov Models
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Distributed Detection of Attacks in Mobile Ad-Hoc Networks Using Learning Vector Quantization
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Information Security Research Opportunities
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2008
Information Security Research Opportunities
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2007
2006
Detecting Hacker, Crackers, and Other Bad Guys
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2005
Self-Organizing Distributed Intrusion Detection in Mobile Ad Hoc Networks
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2004
Foundations of Computer Forensics: A Technology for the Fight Against Computer Crime
CCE Faculty Articles
Information Security Education and Research
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2003
Identifying Complex Multi-Stage Network Attacks with Dynamic Petri Nets
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2001
The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Detecting Anomalous Behavior: Optimization of Network Traffic Parameters via an Evolution Strategy
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Boundary Expansion of Expert Systems: Incorporating Evolutionary Computation with Intrusion Detection Solutions
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Detecting Anomalous Behavior: Optimization of Network Traffic Parameters via an Evolution Strategy
CCE Faculty Articles
Boundary Expansion of Expert Systems: Incorporating Evolutionary Computation with Intrusion Detection Solutions
CCE Faculty Articles
Got Security? Information Assurance Considerations for Your Research, Course Projects, and Everyday Life
CCE Faculty Proceedings, Presentations, Speeches and Lectures
2000
Multiple Self-Organizing Maps for Intrusion Detection
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Applying CMAC-Based On-Line Learning to Intrusion Detection
CCE Faculty Proceedings, Presentations, Speeches and Lectures
An Adaptive Neural Network Approach to Intrusion Detection and Response
CCE Theses and Dissertations
1999
Artificial Intelligence for Law Enforcement
CCE Faculty Proceedings, Presentations, Speeches and Lectures
Neural Network-Based Intrusion Detection Research
CCE Faculty Proceedings, Presentations, Speeches and Lectures
1998
Artificial Neural Networks to Misuse Detection
CCE Faculty Proceedings, Presentations, Speeches and Lectures
1997
1996
New Methods of Intrusion Detection Using Control-Loop Measurement
CCE Faculty Proceedings, Presentations, Speeches and Lectures