Follow
Benjamin Uphoff
Benjamin Uphoff
Verified email at lanl.gov - Homepage
Title
Cited by
Cited by
Year
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
502017
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
202019
Towards improved detection of attackers in computer networks: New edges, fast updating, and host agents
J Neil, B Uphoff, C Hash, C Storlie
2013 6th International Symposium on Resilient Control Systems (ISRCS), 218-224, 2013
182013
An agent-based framework for intrusion detection alert verification and event correlation
B Uphoff, JS Wong
International Journal of Security and Networks 3 (3), 193-200, 2008
162008
A framework for collection and management of intrusion detection data sets
B Uphoff, P Criscuolo
Proceedings of the 16th Annual FIRST Conference on Computer Security …, 2004
62004
Non-harmful insertion of data mimicking computer network attacks
J Neil, A Kent, JR Curtis Hash, M Fisk, A Brugh, C Storlie, B Uphoff
US Patent 10,530,799, 2020
32020
Non-harmful insertion of data mimicking computer network attacks
J Neil, A Kent, JR Curtis Hash, M Fisk, A Brugh, C Storlie, B Uphoff
US Patent 10,122,741, 2018
32018
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 10,243,984, 2019
2019
Multi-paradigm frameworks for scalable intrusion detection
BD Uphoff
Iowa State University, 2006
2006
Securing network traffic and intrusion detection data
BD Uphoff, JSK Wong
The system can't perform the operation now. Try again later.
Articles 1–10