摘要:
An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic.
摘要:
A network intrusion detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine an attack based on closeness of fit to one or more compression models. The network intrusion detection system and method can determine zero day attacks.
摘要:
A network intrusion detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine an attack based on closeness of fit to one or more compression models. The network intrusion detection system and method can determine zero day attacks.
摘要:
An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic.
摘要:
An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic.
摘要:
An intrusion masquerade detection system and method that includes a grammar inference engine. A grammar-based Minimum Description Length (MDL) compression algorithm is used to determine a masquerade based on a distance from a threshold in a model of an estimated algorithmic minimum sufficient statistic.
摘要:
A traffic characterization system and method of use for executing a traffic characterization protocol over an ad hoc communications network. Conventional in-vehicle computers and conventional wireless local area network (LAN) transceivers host the traffic characterization system and the messages generated by the system. As a traffic jam occurs, the mobile units send out traffic characterization data in a sequence activated by the content of the messages and traffic characterization protocol of the present invention. All vehicles participating in the traffic characterization system and approaching the traffic jammed area receive the characterization data and have the opportunity to route around the jam.
摘要:
A system and method for mobile platform real-time collection, transmission, and processing of an array of environmental and vehicle-related data in the context of an Intelligent Transportation System (ITS) network. The system and method provide enhanced in-vehicle data collection, enhanced communications capability between the vehicle and the ITS system, and enhanced ITS implementation functionality to provide real-time incident reporting to ITS users.
摘要:
A system and method for rapid deployment of economically feasible wide-area general-purpose telecommunications systems and services in urban, suburban, rural, and other inhabited geographical areas is disclosed. The solution described here is of particular importance in the aftermath of such events as catastrophic accidents, natural disasters, terrorist attacks, riots, and acts of war during which the local telecommunications infrastructure is destroyed. In addition, the basic methods and architectures defined herein are applicable to those scenarios in which wide-area telecommunication services must be deployed rapidly in previously uninhabited area such as military deployments.
摘要:
A system and method for detecting if an object has been tampered with comprising a characterizer, a comparator, and indicator, and optionally, a signer. The characterizer generates a first digital characterization of an object at a first time and at least one subsequent digital characterization of the object at at least one subsequent time. The comparator compares the first digital characterization with the at least one subsequent digital characterization, and the indicator generates a pre-selected characterization signal if the first and subsequent digital characterizations don't match. Optionally, the first digital characterization can be accompanied by a first digital signature. The signer optionally verifies the digital signature at the at least one subsequent time.