Current Search: Electronic countermeasures (x)
View All Items
- Title
- Digital techniques for electronic countermeasures signal-processing.
- Creator
- Lopez, Juan J., Florida Atlantic University, Erdol, Nurgun, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The purpose of this thesis is to show the use of digital techniques for Electronic Countermeasures (ECM) signal processing. The main objective is the use of only digital circuitry for the processing of the ECM signals. A recent design of an ECM controller called the Oscillator Waveform Controller (OWC) follows this philosophy. The OWC digitally controls the generation of its nine jamming modes plus the modes generated by the other ECM modules within the ECM system. The use of advance...
Show moreThe purpose of this thesis is to show the use of digital techniques for Electronic Countermeasures (ECM) signal processing. The main objective is the use of only digital circuitry for the processing of the ECM signals. A recent design of an ECM controller called the Oscillator Waveform Controller (OWC) follows this philosophy. The OWC digitally controls the generation of its nine jamming modes plus the modes generated by the other ECM modules within the ECM system. The use of advance microcircuitry technology allows the OWC the capability of controlling all the parameters within an ECM system. The most desirable feature of the OWC is the use of high level communications for programming ECM mode parameters from an external computer or terminal and digitally storing this parameters upon removal of power.
Show less - Date Issued
- 1987
- PURL
- http://purl.flvc.org/fcla/dt/14427
- Subject Headings
- Electronic countermeasures, Signal processing--Digital techniques
- Format
- Document (PDF)
- Title
- Techniques for combining binary classifiers: A comparative study in network intrusion detection systems.
- Creator
- Lin, Hua., Florida Atlantic University, Khoshgoftaar, Taghi M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We discuss a set of indirect combining techniques for addressing multi-category classification problems that have been used in many domains, but not for intrusion detection systems. In contrast to the indirect combining techniques, direct techniques generally extend associated binary classifiers to handle multi-category classification problems. An indirect combining technique decomposes the original multi-category problem into, based on some criteria, multiple binary-category problems. We...
Show moreWe discuss a set of indirect combining techniques for addressing multi-category classification problems that have been used in many domains, but not for intrusion detection systems. In contrast to the indirect combining techniques, direct techniques generally extend associated binary classifiers to handle multi-category classification problems. An indirect combining technique decomposes the original multi-category problem into, based on some criteria, multiple binary-category problems. We investigated two different approaches for building the binary classifiers. The results of the binary classifiers are then merged using a combining technique---three different combining techniques were studied. We implement some of the indirect combining techniques proposed in recent literature, and apply them to a case study of the DARPA KDD-1999 network intrusion detection project. The results demonstrate the usefulness of using indirect combining techniques for the multi-category classification problem of intrusion detection systems.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13111
- Subject Headings
- Computer networks--Security measures, Computer security, Computers--Access control, Electronic countermeasures, Fuzzy systems
- Format
- Document (PDF)
- Title
- A method for adding multimedia knowledge for improving intrusion detection systems.
- Creator
- Baillargeon, Pierre Elliott., Florida Atlantic University, Marques, Oge
- Abstract/Description
-
Intrusion Detection Systems (IDS) are security tools which monitor systems and networks for malicious activity. In saturated network links the amount of data present for analysis can overwhelm them, resulting in potentially undetected attacks. Many of these network links contain significant amounts of multimedia traffic which may seem to contribute to the problem, however our work suggests otherwise. This thesis proposes a novel method to classify and analyze multimedia traffic in an effort...
Show moreIntrusion Detection Systems (IDS) are security tools which monitor systems and networks for malicious activity. In saturated network links the amount of data present for analysis can overwhelm them, resulting in potentially undetected attacks. Many of these network links contain significant amounts of multimedia traffic which may seem to contribute to the problem, however our work suggests otherwise. This thesis proposes a novel method to classify and analyze multimedia traffic in an effort to maximize the efficiency of IDS. By embedding multimedia-specific knowledge into IDS, trusted multimedia contents can be identified and allowed to bypass the detection engine, thereby allowing IDS to focus its limited resources on other traffic. The proposed framework also enables IDS to detect multimedia-specific exploits which would otherwise pass under the radar. Results of our experiments confirm our claims and show substantial CPU savings in both streaming and non-streaming scenarios.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13242
- Subject Headings
- Computer networks--Security measures, Computers--Access control, Electronic countermeasures, Digital watermarking, Multimedia systems--Security measures
- Format
- Document (PDF)