Institution
Mitre Corporation
Company•Bedford, Massachusetts, United States•
About: Mitre Corporation is a company organization based out in Bedford, Massachusetts, United States. It is known for research contribution in the topics: Air traffic control & National Airspace System. The organization has 4884 authors who have published 6053 publications receiving 124808 citations. The organization is also known as: Mitre & MITRE.
Topics: Air traffic control, National Airspace System, Information system, Air traffic management, Communications system
Papers published on a yearly basis
Papers
More filters
•
27 May 1983TL;DR: In this article, the wavelength division multiplexer/demultiplexer includes a gradient index of refraction (GRIN) lens and a diffraction grating located adjacent to one end of the GRIN lens.
Abstract: The wavelength division multiplexer/demultiplexer includes a gradient index of refraction (GRIN) lens and a diffraction grating located adjacent to one end of the GRIN lens. The diffraction grating is adapted for switching from a first angle to a second angle with respect to the GRIN lens. For both path and terminal equipment redundancy, first and second input optical fibers are located at first and second input locations on an end surface of the GRIN lens. A first and a second plurality of output optical fibers are also located on this end surface of the GRIN lens. The input and output optical fibers are located so that optical energy will travel from the first input optical fiber to the first plurality of output optical fibers when the diffraction grating is oriented at the first angle and optical energy will travel from the second input optical fiber to the second plurality of output optical fibers when the diffraction grating is oriented at the second angle.
29 citations
••
21 Sep 2015TL;DR: A real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment is presented in this article.
Abstract: Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated intrusion detection system uses bags of system calls monitored from the host kernel for learning the behavior of an application running within a Linux container and determining anomalous container behavior. Performance of the approach using a database application was measured and results are discussed.
29 citations
•
13 Jun 2016TL;DR: In this paper, a network attack simulation method is presented, at a network with a server and a plurality of computers, selecting one or more actions from the plurality of actions for operating on a first computer of the plurality, and transmitting instructions from the server to the first computer to execute the selected actions.
Abstract: A network attack simulation method including, at a network with a server and a plurality of computers, selecting one or more actions from a plurality of actions for operating on a first computer of the plurality of computers, transmitting instructions from the server to the first computer to execute the one or more selected actions, executing the one or more selected actions on the first computer, and generating data based on the execution of the selected actions. The method includes transmitting the data generated from the first computer to the server, identifying a target computer of the plurality of computers to access, transmitting one or more additional instructions from the server to the first computer to access the target computer using at least a portion of the data, and receiving confirmation from at least one of the first computer and the target computer that the target computer was accessed.
28 citations
••
TL;DR: An architecture for a distributed database management system which operates in a limited heterogeneous environment is described and techniques for query processing and transaction management are discussed.
28 citations
Authors
Showing all 4896 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sushil Jajodia | 101 | 664 | 35556 |
Myles R. Allen | 82 | 295 | 32668 |
Barbara Liskov | 76 | 204 | 25026 |
Alfred D. Steinberg | 74 | 295 | 20974 |
Peter T. Cummings | 69 | 521 | 18942 |
Vincent H. Crespi | 63 | 287 | 20347 |
Michael J. Pazzani | 62 | 183 | 28036 |
David Goldhaber-Gordon | 58 | 192 | 15709 |
Yeshaiahu Fainman | 57 | 648 | 14661 |
Jonathan Anderson | 57 | 195 | 10349 |
Limsoon Wong | 55 | 367 | 13524 |
Chris Clifton | 54 | 160 | 11501 |
Paul Ward | 52 | 408 | 12400 |
Richard M. Fujimoto | 52 | 290 | 13584 |
Bhavani Thuraisingham | 52 | 563 | 10562 |