T
T. Bass
Researcher at TIBCO Software
Publications - 13
Citations - 880
T. Bass is an academic researcher from TIBCO Software. The author has contributed to research in topics: Context (language use) & Sensor fusion. The author has an hindex of 9, co-authored 13 publications receiving 846 citations. Previous affiliations of T. Bass include Science Applications International Corporation.
Papers
More filters
Journal ArticleDOI
Intrusion detection systems and multisensor data fusion
TL;DR: The vast majority of security professionals would agree that real-time ID systems are not technically advanced enough to detect sophisticated cyberattacks by trained professionals, but these systems have not matured to a level where sophisticated attacks are reliably detected, verified, and assessed.
Proceedings ArticleDOI
Defense-in-depth revisited: qualitative risk analysis methodology for complex network-centric operations
T. Bass,R. Robichaux +1 more
TL;DR: In this paper, the authors extend the defense-in-depth boundary protection construct to a uniform qualitative risk management perspective that is tightly coupled with network implementation, resources, mission criticality, security policies and network-centric mission operations.
Journal ArticleDOI
E-mail bombs and countermeasures: cyber attacks on availability and brand integrity
TL;DR: The authors present mail-bombing techniques, automated attack tools, and countermeasures for an actual Internet-based attack that was launched in 1997 on the Langley AFB SMTP e-mail infrastructure.
A glimpse into the future of id
T. Bass,Dave Gruber +1 more
TL;DR: A glimpse into the foggy crystal ball of the future ID systems will fuse data, combining short-term sensor with long-term knowledge databases to create cyberspace situational awareness.
Proceedings ArticleDOI
A simple framework for filtering queued SMTP mail (cyberwar countermeasures)
TL;DR: The cyber-attack was accomplished by running the MTA in a mode which accepts and queues SMTP mail; processes the messages with a rules-based filter; and then forwards mail after filtering, which is simple and effective for a large subset of e-mail bombs.