L
Leonard J. Popyack
Researcher at Air Force Research Laboratory
Publications - 12
Citations - 401
Leonard J. Popyack is an academic researcher from Air Force Research Laboratory. The author has contributed to research in topics: Computer security model & Network security. The author has an hindex of 10, co-authored 12 publications receiving 395 citations.
Papers
More filters
Book ChapterDOI
SVD-Based Approach to Transparent Embedding Data into Digital Images
TL;DR: A new approach to transparent embedding of data into digital images is proposed that provides a high rate of the embedded data and is robust to common and some intentional distortions and can be used both for hidden communication and watermarking.
Journal ArticleDOI
Data mining technology for failure prognostic of avionics
TL;DR: The suggested prognostic model utilizes information downloaded from dedicated monitoring systems of flight-critical hardware and stored in a database that results in a novel knowledge discovery from data technology that can be efficiently used in a wide area of applications and provide a quantitative basis for the modern maintenance concept known as service-when-needed.
BookDOI
Information Assurance in Computer Networks
TL;DR: A genetic classifier-based intrusion detection system, which can provide active detection and automated responses during intrusions, and evolve set of decision rules based on the significance of monitored parameters in Unix environment is described.
Journal ArticleDOI
A group testing method for finding patterns in data
TL;DR: This paper addresses the development of probabilistic group testing methods that lead to the identification of positive combinations of objects with specific applications to data mining.
Book ChapterDOI
Agent-Based Model of Computer Network Security System: A Case Study
Vladimir I. Gorodetski,Oleg Karsayev,Alexey Khabalov,Igor Kotenko,Leonard J. Popyack,Victor A. Skormin +5 more
TL;DR: The paper describes the conceptual model and architecture of the particular specialized agents and the system on a whole as well as implementation technology and the advantages of using such an architecture for the computer network protection.