scispace - formally typeset
L

Leonard J. Popyack

Researcher at Air Force Research Laboratory

Publications -  12
Citations -  401

Leonard J. Popyack is an academic researcher from Air Force Research Laboratory. The author has contributed to research in topics: Computer security model & Network security. The author has an hindex of 10, co-authored 12 publications receiving 395 citations.

Papers
More filters
Book ChapterDOI

SVD-Based Approach to Transparent Embedding Data into Digital Images

TL;DR: A new approach to transparent embedding of data into digital images is proposed that provides a high rate of the embedded data and is robust to common and some intentional distortions and can be used both for hidden communication and watermarking.
Journal ArticleDOI

Data mining technology for failure prognostic of avionics

TL;DR: The suggested prognostic model utilizes information downloaded from dedicated monitoring systems of flight-critical hardware and stored in a database that results in a novel knowledge discovery from data technology that can be efficiently used in a wide area of applications and provide a quantitative basis for the modern maintenance concept known as service-when-needed.
BookDOI

Information Assurance in Computer Networks

TL;DR: A genetic classifier-based intrusion detection system, which can provide active detection and automated responses during intrusions, and evolve set of decision rules based on the significance of monitored parameters in Unix environment is described.
Journal ArticleDOI

A group testing method for finding patterns in data

TL;DR: This paper addresses the development of probabilistic group testing methods that lead to the identification of positive combinations of objects with specific applications to data mining.
Book ChapterDOI

Agent-Based Model of Computer Network Security System: A Case Study

TL;DR: The paper describes the conceptual model and architecture of the particular specialized agents and the system on a whole as well as implementation technology and the advantages of using such an architecture for the computer network protection.