Computer Network Research

Published Research:

Combining elements of computer science and information technology/assurance, ICASA’s computer network research covers a wide variety of research topics. Researchers seek new and innovative methods to better understand computer networks by studying their behaviors, vulnerabilities, and interactions. Areas of research include: security in distributed and grid environments, intrusion detection, malware analysis and malicious code detection, network topology, and software agent interaction and control.

Intrusion Detection Systems using Adaptive Regression Splines. Kluwer Academic Press, 2004


Hybrid Multi Agent Framework for Detection of Stealthy Probes. Applied Soft Computing Journal, Elsevier, 2005, In Press

Intrusion Detection Using an Ensemble of Intelligent Paradigms. Journal of Network and Computer Applications, Elsevier, 2004, In Press

Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques. IJDE Volume 1, Issue 4, 2003

Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines, Transportation Research Record No 1822, pp. 33-39, 2003

Designing Intrusion Detection Systems: Architectures and Perspectives. Annual Review of Communications, Vol. 57, International Engineering Consortium, 2004

S. Mukkamala, A. H. Sung, A. Abraham

Knowledge Discovery in Network Audit Trails. Lecture Notes in Computer Science, Springer, 2004, in press

S. Mukkamala, A. H. Sung

On the Performance of Learning Machines for Bankruptcy Detection, 2004, Under Review

A. S. Vieira, B. Ribeiro, S. Mukkamala, J. C. Neves, A. Sung

An Ensemble of Network Forensic Models and Significant Feature Analysis, Elsevier, 2004, Under Review

S. Mukkamala, A. H. Sung

Mining Key Features from Network Audit Trails for Intrusion Detection Systems Using Machine Learning Techniques. Central Bureau of Investigation, 2002

S. Mukkamala

“Supervised Inductive Learning with Lotka-Volterra derived models, ” in Eighth IEEE International Conference on Data Mining (ICDM2008), Pisa, December 2008.

K. Hovsepian, P. Anselmo, and S. Mazumdar

“A Modeling-based Classification Algorithm Validated with Simulated Data,” in Winter Simulation Conference (WSC 2008), Miami, 2008. (PDF)

K. Hovsepian, P. Anselmo, and S. Mazumdar

“A framework for near real-time event characterization within the internet”, in Network Science Workshop (pp. 59-66), IEEE, 2011.

 M. Planck, K. Glass, I. Lyman, and R. Colbaugh

“Application of information diffusion in social networks: Verifying the use of web/blog topology entropy as an indicator for real world impact”, IEEE, 2013.

M. Planck, C. Brock, D. Bachman, J. Fenchel, and I.L. Pollard

“Initial indicators of topic success in Twitter: Using topology entropy to predict the success of Twitter hashtags”, Network Science (pp. 160-163), IEEE, 2013.

M. Planck, I.L. Pollard, C. Brock, and A. George

“Audit data reduction via Multi-step decomposition Analysis: The Multi-Stage Analytic Engine--Insider Threat”, Submitted to the IEEE Symposium on Systems Security and Privacy.

I. Rose, N. Felts, A. George, and M. Planck

Scroll to Top