Florida Institute of Technology

Displaying 1-6 of 6 results

  • White Papers // May 2011

    Descriptive Analyses of Trusted Security Kernels and Autonomous Systems: Evolution of Security Approaches

    Security countermeasures have been geared toward building fortified systems that focus on prevention and detection of attacks, and recovery from damage. However, according to the Defense Advanced Research Projects Agency (DARPA), given the increasing mobility of computing devices, security approaches must radically change to be effective. Some ways of working...

    Provided By Florida Institute of Technology

  • White Papers // Jan 2011

    PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic

    The authors describe an experimental Packet Header Anomaly Detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al. 2000), PHAD detects 72 of 201 instances (29...

    Provided By Florida Institute of Technology

  • White Papers // Nov 2010

    Research Directions in Web Systems Evolution IV: Migrating to the Cloud

    Cloud computing is gaining momentum in part because it enables a distributed systems infrastructure that offers more advantages than traditional ones. It provides a hosted environment of virtualized hardware, effectively unlimited storage, and software services that can aid in system development and deployment. This paper is the fourth in a...

    Provided By Florida Institute of Technology

  • White Papers // Feb 2010

    Interactive Simulation: Women Leadership Development

    A simulation model was designed to execute results that would be incorporated into a descriptive study. The objective of the study would be to develop an interactive simulation leadership model seeking to understand women and how others perceive them in a leadership role. One of the purposes of the simulation...

    Provided By Florida Institute of Technology

  • White Papers // Jan 2010

    Adaptive Weighing of Context Models for Lossless Data Compression

    Until recently the state of the art in lossless data compression was prediction by partial match (PPM). A PPM model estimates the next-symbol probability distribution by combining statistics from the longest matching contiguous contexts in which each symbol value is found. The paper introduces a context mixing model which improves...

    Provided By Florida Institute of Technology

  • White Papers // Nov 2009

    The Millennials And Money Management

    The youth of America have been targeted for debt creation by financial institutions. However, in the long-run, the millennial generation can be aided through financial literacy programs offered by the financial services industry. In turn, such program should instill loyalty to these financial enterprises, especially if they can package and...

    Provided By Florida Institute of Technology

  • White Papers // May 2011

    Descriptive Analyses of Trusted Security Kernels and Autonomous Systems: Evolution of Security Approaches

    Security countermeasures have been geared toward building fortified systems that focus on prevention and detection of attacks, and recovery from damage. However, according to the Defense Advanced Research Projects Agency (DARPA), given the increasing mobility of computing devices, security approaches must radically change to be effective. Some ways of working...

    Provided By Florida Institute of Technology

  • White Papers // Jan 2010

    Adaptive Weighing of Context Models for Lossless Data Compression

    Until recently the state of the art in lossless data compression was prediction by partial match (PPM). A PPM model estimates the next-symbol probability distribution by combining statistics from the longest matching contiguous contexts in which each symbol value is found. The paper introduces a context mixing model which improves...

    Provided By Florida Institute of Technology

  • White Papers // Nov 2009

    The Millennials And Money Management

    The youth of America have been targeted for debt creation by financial institutions. However, in the long-run, the millennial generation can be aided through financial literacy programs offered by the financial services industry. In turn, such program should instill loyalty to these financial enterprises, especially if they can package and...

    Provided By Florida Institute of Technology

  • White Papers // Feb 2010

    Interactive Simulation: Women Leadership Development

    A simulation model was designed to execute results that would be incorporated into a descriptive study. The objective of the study would be to develop an interactive simulation leadership model seeking to understand women and how others perceive them in a leadership role. One of the purposes of the simulation...

    Provided By Florida Institute of Technology

  • White Papers // Jan 2011

    PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic

    The authors describe an experimental Packet Header Anomaly Detector (PHAD) that learns the normal range of values for 33 fields of the Ethernet, IP, TCP, UDP, and ICMP protocols. On the 1999 DARPA off-line intrusion detection evaluation data set (Lippmann et al. 2000), PHAD detects 72 of 201 instances (29...

    Provided By Florida Institute of Technology

  • White Papers // Nov 2010

    Research Directions in Web Systems Evolution IV: Migrating to the Cloud

    Cloud computing is gaining momentum in part because it enables a distributed systems infrastructure that offers more advantages than traditional ones. It provides a hosted environment of virtualized hardware, effectively unlimited storage, and software services that can aid in system development and deployment. This paper is the fourth in a...

    Provided By Florida Institute of Technology