scispace - formally typeset
T

T. Bass

Researcher at TIBCO Software

Publications -  13
Citations -  880

T. Bass is an academic researcher from TIBCO Software. The author has contributed to research in topics: Context (language use) & Sensor fusion. The author has an hindex of 9, co-authored 13 publications receiving 846 citations. Previous affiliations of T. Bass include Science Applications International Corporation.

Papers
More filters
Journal ArticleDOI

Intrusion detection systems and multisensor data fusion

T. Bass
TL;DR: The vast majority of security professionals would agree that real-time ID systems are not technically advanced enough to detect sophisticated cyberattacks by trained professionals, but these systems have not matured to a level where sophisticated attacks are reliably detected, verified, and assessed.
Proceedings ArticleDOI

Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations

T. Bass, +1 more
TL;DR: In this paper, the authors extend the defense-in-depth boundary protection construct to a uniform qualitative risk management perspective that is tightly coupled with network implementation, resources, mission criticality, security policies and network-centric mission operations.
Journal ArticleDOI

E-mail bombs and countermeasures: cyber attacks on availability and brand integrity

TL;DR: The authors present mail-bombing techniques, automated attack tools, and countermeasures for an actual Internet-based attack that was launched in 1997 on the Langley AFB SMTP e-mail infrastructure.

A glimpse into the future of id

T. Bass, +1 more
TL;DR: A glimpse into the foggy crystal ball of the future ID systems will fuse data, combining short-term sensor with long-term knowledge databases to create cyberspace situational awareness.
Proceedings ArticleDOI

A simple framework for filtering queued SMTP mail (cyberwar countermeasures)

T. Bass, +1 more
TL;DR: The cyber-attack was accomplished by running the MTA in a mode which accepts and queues SMTP mail; processes the messages with a rules-based filter; and then forwards mail after filtering, which is simple and effective for a large subset of e-mail bombs.