Back to Results
First PageMeta Content
Security / Data security / Hacking / Secure communication / Intrusion detection system / Vulnerability / Network security / Attack / Anomaly detection / Cyberwarfare / Computer security / Computer network security


Deploying Statistical Anomaly Detection to Improve Cyber Security: Strategy, Benefits, and Results Dr. Greg Shannon, Chief Scientist, CounterStorm, Inc. There will always be new vulnerabilities in the information network
Add to Reading List

Document Date: 2007-05-11 16:57:20


Open Document

File Size: 85,40 KB

Share Result on Facebook

City

New York City / /

Company

Novak Biddle Venture Partners / JK&B Capital / Computer Sciences / Paladin Capital Group / Ascend Communications / Lucent Technologies / CounterStorm Inc. / /

Country

United States / /

Event

Business Partnership / /

Facility

Iowa State University / Indiana University / Purdue University / Southwest Research Institute / Columbia University / /

IndustryTerm

healthy network / anomaly detection technology / disruptive technology / anomaly detection software / network security equipment / legacy systems / control systems / information systems / mitigation software development kits / software application / /

Organization

Homeland Security's Science and Technology Directorate / Columbia University / Defense Advanced Research Projects Agency / Federal Communications Commission / Southwest Research Institute / U.S. government / Los Alamos National Lab / Department of Homeland Security / Iowa State University / Indiana University / Purdue University / Homeland Security Advanced Research Projects Agency / /

Person

Greg Shannon / /

Position

Chief Scientist / system administrator / Principal Investigator / representative / /

Product

Active Threat Recognition Suite / /

Technology

encryption / anomaly detection technology / /

URL

www.counterstorm.com / /

SocialTag