Roman Danyliw's research while affiliated with Carnegie Mellon University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (2)
Abstract Current security event analysis techniques are myopic,in focusing only on single administrative domains. With the increasing security dependencies,among,Internet-connected networks there are few mechanisms,in place to share and analyze security event data on a larger scale. Existing information sharing strategies do not scale well, as they...
Citations
... Our approach can be complemented with other techniques that watch the run-time execution of a program for abnormality [57]. Because the function packet read() is vulnerable [33], the attacker can overwrite the auth variable to one (1). As a result, the attacker can gain the access the system. ...
Reference: Architectural support for software security