Time filter

Source Type

Reston, VA, United States

Smallwood D.,Computer Sciences Corp. | Vance A.,L3 Communications Inc.
Proceedings - 2011 International Conference on Cloud and Service Computing, CSC 2011 | Year: 2011

Cloud computing's distributed architecture helps ensure service resilience and robustness. However, cloud architectures also increase dynamic data communications which inherently increases security risks. Examination of industry practice has revealed that increased data volume, as a result of increased communication, diminishes the efficiency of deep packet inspections (DPI). DPI is essential in protecting the cloud against malicious threats such as web exploits, zeroday attacks, data exfiltration, and malware based botnets. In this paper, we evaluate the effectiveness of a new utility that was developed to improve retrospective packet analysis which was tested against actual data center traffic from a large regional Internet Access Provider providing cloud services. Blitzdump is a lightning fast network data packet capture utility developed to improve network intrusion detection through deep packet inspection analysis. Implementation results indicate it outperformed existing techniques, in terms of query function performance, that ultimately improved efficiency in query responses by up to 6000%. Blitzdump reduces security risks by increasing the technical performance of intrusion detection to improve the security practitioner's productivity and effectiveness. © 2011 IEEE.

Roach J.H.,L3 Communications Inc. | Marks R.J.,Baylor University | Thompson B.B.,Pennsylvania State University
IEEE Transactions on Systems, Man, and Cybernetics: Systems | Year: 2015

One of the benefits of using Combs disjunctive control in swarm intelligence is the ability of the swarm to continue to operate even when one or more of its sensors are broken. Instead of failing, the swarm continues to perform based on the inputs of the remaining sensors. In this technical correspondence, a multiobjective scenario is designed for a swarm of agents to complete. Once optimized, the swarm is modified by removing one of its sensors. Maintaining the original objective, the evolution process is continued to allow the swarm to compensate for its handicap. This technical correspondence describes the different emergent behaviors of the swarm to compensate for the loss of function. The solution for the diminished swarm can vary significantly from that of the original. © 2014 IEEE.

Smith S.M.,L3 Communications Inc. | Furse C.,University of Utah
IEEE Transactions on Antennas and Propagation | Year: 2012

This paper describes a new stochastic finite difference time domain (S-FDTD) method for calculating the variance in the electromagnetic fields caused by variability or uncertainty in the electrical properties of the materials in the model. Details of the 1D derivation using truncated Taylor series approximations are given. The S-FDTD analysis is then compared to Monte Carlo analysis for a 1D bioelectromagnetic example. The accuracy of the method is controlled by the approximations for the cross correlations of the fields and electrical properties. In this paper, we are able to bound the variance using cross correlations of 1 (overestimate) and the reflection coefficient (underestimate). © 1963-2012 IEEE.

L3 Communications Inc. | Date: 2015-09-30

x-ray scanning apparatus for non-medical purposes, namely, for screening bags, parcels, boxes, and containers used to detect contraband and threats at facilities checkpoints and mail and freight shipping.

L3 Communications Inc. | Date: 2016-05-06

baggage handling and explosion detection systems comprised of computers and scanners for use by airlines and other forms of public transportation.

Discover hidden collaborations