[an error occurred while processing this directive]

Stephen W. Boyer

Carter, K. M., Lippman, R. P., Boyer, S. W., Temporally Oblivious Anomaly Detection on Large Networks Using Functional Peers, Internet Measurement Conference 2010, Melbourne, Australia, 3 November 2010, pp. 465-471.
(Full Paper)

Yu, T., Lippmann, R., Riordan, J., Boyer, S., EMBER: A Global Perspective on Extreme Malicious Behavior, VizSec 2010, Ottawa, Canada, 14 September 2010.
(Full Paper)

Chu, M., Ingols, K., Lippmann, R., Webster, S., Boyer, S., Visualizing Attack Graphs, Reachability, and Trust Relationships with NAVIGATOR, VizSec2010, Ottawa, Canada, 14 September 2010.
(Full Paper)

Ingols, K., Chu, M., Lippmann, R., Boyer, S., Modeling Modern Network Attacks and Countermeasures Using Attack Graphs, ACSAC 2009, Honolulu, HI, Dec. 7, 2009.
(Full Paper)

Ingols, K., Lippmann, R. P., Webster, S. E., Boyer, S., Chu, M., Practical Experiences Using SCAP to Aggregate CND Data, 4th Annual IT Security Automation Conference, Gaithersburg, MD. Sept. 22, 2008.
(Abstract)

Boyer, S. W., Cunningham, R. K., Network Intrusion Scenario Recognition via Multi-Sensor Alert Correlation, Lincoln Technical Series, 2005.
(Abstract)

Boyer, S. W., Dain, O., Cunningham, R. K., Stellar: A Fusion System for Scenario Construction and Security Risk Assessment, Third IEEE International Information Assurance Workshop, University of Maryland, 23–24 March 2005.
(Full Paper)

Dain, O., Boyer, S., Cunningham, R. K., IREP++, a Faster Rule Learning Algorithm, Proceedings of the 2004 SIAM International Conference on Data Mining.
(Full Paper)

top of page