Phillip Porras mainly focuses on Computer security, Distributed computing, Intrusion detection system, Computer network and Dialog box. His Computer security research incorporates elements of Software and World Wide Web. His research in the fields of OpenFlow and Software-defined networking overlaps with other disciplines such as Saturation.
The Intrusion detection system study which covers The Internet that intersects with Isolation, Event monitoring and Interoperability. Phillip Porras combines subjects such as Telecommunications and Wireless network security with his study of Computer network. His Dialog box research incorporates themes from Botnet, Database transaction, Malware and Host.
Phillip Porras focuses on Computer security, Computer network, Malware, Network security and Distributed computing. His Computer security study integrates concerns from other disciplines, such as The Internet and Warning system. His studies in Malware integrate themes in fields like Executable, Android, World Wide Web, Machine learning and Botnet.
Within one scientific family, Phillip Porras focuses on topics pertaining to Intelligent computer network under Network security, and may sometimes address concerns connected to Gesture and Human–computer interaction. His study focuses on the intersection of Distributed computing and fields such as Scalability with connections in the field of Interface and Service. His Intrusion detection system research is multidisciplinary, incorporating perspectives in Real-time computing, Expert system, Host and Server.
His primary areas of study are Software-defined networking, Computer network, Computer security, Distributed computing and Network security. His research investigates the connection between Software-defined networking and topics such as Software engineering that intersect with problems in Embedded system and Bridging. His research integrates issues of Security policy and Software in his study of Computer network.
In general Computer security study, his work on Cyber defense and Exploit kit often relates to the realm of Vulnerability, Test case and Counter-offensive, thereby connecting several areas of interest. His Distributed computing research includes themes of Scalability and Modular design. His Network security research is multidisciplinary, incorporating elements of Intelligent computer network, Network Access Control, Human–computer interaction, Network administrator and World Wide Web.
His primary areas of investigation include Software-defined networking, Computer network, Network management, Software and Network simulation. His study with Software-defined networking involves better knowledge in Distributed computing. The concepts of his Distributed computing study are interwoven with issues in Network architecture, Usability and Interface.
His research in Computer network intersects with topics in Data flow diagram, Data access, Database and Computer security model. His Network management study combines topics from a wide range of disciplines, such as Network administrator, World Wide Web and Network security. His Network simulation research includes elements of Network security management, Multimedia, Dialog box and Gesture.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
BotHunter: detecting malware infection through IDS-driven dialog correlation
Guofei Gu;Phillip Porras;Vinod Yegneswaran;Martin Fong.
usenix security symposium (2007)
EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
Phillip A. Porras;Peter G. Neumann;Ravenswood Avenue.
computer and communications security (2002)
FRESCO: Modular Composable Security Services for Software-Defined Networks
Seung Won Shin;Phillip Porras;Vinod Yegneswara;Martin Fong.
network and distributed system security symposium (2013)
AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks
Seungwon Shin;Vinod Yegneswaran;Phillip Porras;Guofei Gu.
computer and communications security (2013)
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
U. Lindqvist;P.A. Porras.
ieee symposium on security and privacy (1999)
Network-based alert management
Phillip Andrew Porras;Alfonso Valdes.
(2000)
Method and apparatus for wireless network security
Phillip Andrew Porras;Michael G. Corr;Steven Mark Dawson;David Watt.
(2006)
A mission-impact-based approach to INFOSEC alarm correlation
Phillip A. Porras;Martin W. Fong;Alfonso Valdes.
recent advances in intrusion detection (2002)
Experience with EMERALD to Date
Peter G. Neumann;Phillip A. Porras.
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1 (1999)
Method and apparatus for generating highly predictive blacklists
Phillip Andrew Porras;Jian Zhang.
(2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Texas A&M University
Georgia Institute of Technology
SRI International
Northwestern University
University of North Carolina at Chapel Hill
Cornell University
Google (United States)
University of Illinois at Urbana-Champaign
Stanford University
Stony Brook University
Technical University of Madrid
Amazon (United States)
Delft University of Technology
University College London
Jiangxi Normal University
University of Chicago
Harran University
Maastricht University
University of Pennsylvania
Northwestern University
University of Cagliari
Rockefeller University
Columbia University
University of Copenhagen
Université Paris Cité
University of California, San Diego