scispace - formally typeset
Search or ask a question
Author

Christopher K. Zuver

Bio: Christopher K. Zuver is an academic researcher from Washington University in St. Louis. The author has contributed to research in topics: Gateway address & H.248. The author has an hindex of 6, co-authored 12 publications receiving 203 citations.

Papers
More filters
Patent
29 Oct 2009
TL;DR: In this paper, a system, apparatus, and method for communication in a tactical network is described, where a gateway is communicatively couplable to one or more tactical nodes and to other gateways.
Abstract: A system, apparatus, and method are described for communication in a tactical network. A gateway is communicatively couplable to one or more tactical nodes and to one or more other gateways. The gateway is programmed to transmit information to and/or receive information from other gateways. Information exchanged includes gateway attributes, link attributes, service availability, and/or data availability. The gateway optionally provides quality of service, distributed persistence, load balancing, and/or transformation services. Services are provided in a modular, service-oriented architecture (SOA) to accommodate the addition of services and/or applications.

63 citations

Book ChapterDOI
01 Sep 2003
TL;DR: An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates and to mitigate the effect of Denial of Service attacks.
Abstract: An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall uses layered protocol wrappers to parse the content of Internet data. Packet payloads are scanned for keywords using parallel regular expression matching circuits. Packet headers are compared to rules specified in Ternary Content Addressable Memories (TCAMs). Per-flow queuing is performed to mitigate the effect of Denial of Service attacks. All packet processing operations were implemented with reconfigurable hardware and fit within a single Xilinx Virtex XCV2000E Field Programmable Gate Array (FPGA). The single-chip firewall has been used to filter Internet SPAM and to guard against several types of network intrusion. Additional features were implemented in extensible hardware modules deployed using run-time reconfiguration.

54 citations

Patent
07 Nov 2006
TL;DR: In this paper, a security system for sea cargo containers is described, where each container is provided with a container security device (12, 12') comprising a processor, a radio, a memory, a battery, and one or more sensors.
Abstract: A security system (14) for sea cargo containers wherein each container is provided with a container security device (12, 12') comprising a processor (16), a radio (20), a memory (24), a battery and one or more sensors (18). When the containers are within range of each other, the container security devices (12, 12') communicate to form an ad hoc wireless sensor network. That network communicates (46) with a communications infrastructure, such as satellites (36) or GSM (38) communications means, via a gateway (28-40) that aggregates data originating from the various container security devices (12, 12' ).

33 citations

Patent
27 Feb 2007
TL;DR: In this paper, a method of monitoring an entrance to a cargo container, comprising of creating a entry record for each item, was proposed, which can be used to raise an alarm if an item of cargo is loaded without an authorized RFID tag attached thereto.
Abstract: A method of monitoring an entrance to a cargo container, comprising the following steps: (a) creating a entry record for each item.of cargo loaded into a cargo container; (b) creating an ID record for each RFID tag that enters the cargo container during loading of the items of cargo; and (c) correlating the video and ID records to raise an alarm if an item of cargo is loaded without an authorized RFID tag attached thereto.

24 citations

Proceedings ArticleDOI
01 Jun 2003
TL;DR: A tool has been developed to automate the testing and grading of design projects implemented in reprogrammable hardware that allows an entire class to share the same FPGA board.
Abstract: A tool has been developed to automate the testing and grading of design projects implemented in reprogrammable hardware. The server allows multiple students to test circuits in FPGA hardware over the internet. A web interface allows students to upload their placed and routed designs to the server, which batches the jobs together and (1) sequentially programs an FPGA board, (2) inputs test vectors, (3) generates a report that details the results, and (4) grades the design as either "pass" or "fail." The single server allows an entire class to share the same FPGA board.

8 citations


Cited by
More filters
Patent
11 Feb 2015
TL;DR: In this paper, a mobile protection code (MPC) is used to prevent malicious downloadable operation attempts to be received by the MPC and causing corresponding corresponding corresponding operations to be executed in response to the attempts.
Abstract: Protection systems and methods provide for protecting one or more personal computers (“PCs”) and/or other intermittently or persistently network accessible devices or processes from undesirable or otherwise malicious operations of Java TN applets, ActiveX™ controls, JavaScript™ scripts, Visual Basic scripts, add-ins, downloaded/uploaded programs or other “Downloadables” or “mobile code” in whole or part. A protection engine embodiment provides for monitoring information received, determining whether received information does or is likely to include executable code, and if so, causes mobile protection code (MPC) to be transferred to and rendered operable within a destination device of the received information. An MPC embodiment further provides, within a Downloadable-destination, for initiating the Downloadable, enabling malicious Downloadable operation attempts to be received by the MPC, and causing (predetermined) corresponding operations to be executed in response to the attempts.

303 citations

Patent
07 Jan 2013
TL;DR: In this paper, a portable item reporting device (200) is configured to be attached to and in substantial collocation with a portable device (100), or to be integrated into the portable item (100).
Abstract: A portable item reporting device ( 200 ) is configured to be attached to and in substantial collocation with a portable item ( 100 ), or to be integrated into a portable item ( 100 ). The device ( 200 ) includes environmental sensors ( 210 ) to monitor item location, movement, ambient light, sounds, temperature, etc. The device ( 200 ) is configured to store usage expectation data ( 600 ) indicative of historical and/or expected item usage and environments when the item ( 100 ) is in normal use/storage associated with an authorized user (AU). The device ( 200 ) monitors current environmental conditions ( 104 ) surrounding and pertaining to the item. If the current environment ( 104 ) is inconsistent with expected conditions ( 600 ), the device ( 200 ) assesses that the item ( 100 ) is displaced ( 503.0 ), meaning either that the item ( 100 ) is in abnormal use or abnormal storage, or is under the control of an unauthorized user (UU) who is other than the authorized user (AU). Based on the assessment the device initiates a signal ( 372 ) or message ( 374 ) to an authorized user (AU) of the item ( 100 ), indicating that the item ( 100 ) usage/storage is displaced ( 503.0 ) or otherwise anomalous ( 503.2 ).

215 citations

Patent
20 Oct 2008
TL;DR: In this article, the authors proposed a method for signature scanning in string fields, which includes processing one or more signatures into one or many formats that include fingerprints and data structures for each fixed-size signature or signature substring.
Abstract: Systems and methods for scanning signatures in a string field. In one implementation, the invention provides a method for signature scanning. The method includes processing one or more signatures into one or more formats that include one or more fingerprints and one or more follow-on search data structures for each fixed-size signature or signature substring such that the number of fingerprints for each fixed-size signature or signature substring is equal to a step size for a signature scanning operation and the particular fixed-size signature or signature substring is identifiable at any location within any string fields to be scanned, receiving a particular string field, identifying any signatures included in the particular string field including scanning for the fingerprints for each scan step size and searching for the follow-on search data structures at the locations where one or more fingerprints are found, and outputting any identified signatures.

166 citations

Patent
26 Aug 2008
TL;DR: In this article, a method of identifying, tracking, and counting human objects of interest based upon at least one pair of stereo image frames taken by a single image capturing device is presented.
Abstract: A method of identifying, tracking, and counting human objects of interest based upon at least one pair of stereo image frames taken by at least one image capturing device, comprising the steps of: obtaining said stereo image frames and converting each said stereo image frame to a rectified image frame using calibration data obtained for said at least one image capturing device; generating a disparity map based upon a pair of said rectified image frames; generating a depth map based upon said disparity map and said calibration data; identifying the presence or absence of said objects of interest from said depth map and comparing each of said objects of interest to existing tracks comprising previously identified objects of interest; for each said presence of an object of interest, adding said object of interest to one of said existing tracks if said object of interest matches said one existing track, or creating a new track comprising said object of interest if said object of interest does not match any of said existing tracks; updating each said existing track; and maintaining a count of said objects of interest in a given time period based upon said existing tracks created or modified during said given time period.

110 citations

Patent
20 Dec 2012
TL;DR: In this paper, a method of operating a data processing apparatus is provided, which includes receiving video data, receiving a virtual test signal representative of a location of a virtual object, setting data representing the horizontal and vertical size of the virtual object dependent upon the location of the VOS, overlaying the received video data with an image of the VM at locations determined from the virtual test signals to generate virtual test video data; and analysing the VM data and generating an alarm signal based on an output signal generated by said analysis.
Abstract: A method of operating a data processing apparatus is provided. The method includes receiving video data; receiving a virtual test signal representative of a location of a virtual object; setting data representing the horizontal and vertical size of the virtual object dependent upon the location of the virtual object; overlaying the received video data with an image of the virtual object at locations determined from the virtual test signal to generate virtual test video data; and analysing the virtual test video data and generating an alarm signal based on an output signal generated by said analysis.

90 citations