Follow
Alex Kent
Alex Kent
Unknown affiliation
Verified email at aplace.org
Title
Cited by
Cited by
Year
Cyber security data sources for dynamic network research
AD Kent
Dynamic Networks and Cyber-Security, 37-65, 2016
2152016
Unified host and network data set
MJM Turcotte, AD Kent, C Hash
Data science for cyber-security, 1-22, 2019
1602019
Comprehensive, multi-source cyber-security events
AD Kent
Los Alamos National Laboratory, 25, 2015
1062015
Authentication graphs: Analyzing user behavior within an enterprise network
AD Kent, LM Liebrock, JC Neil
Computers and Security, http://dx.doi.org/10.1016/j.cose.2014.09, 2014
972014
Towards a bayesian network game framework for evaluating ddos attacks and defense
G Yan, R Lee, A Kent, D Wolpert
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
762012
Path scanning for the detection of anomalous subgraphs and use of DNS requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent 9,560,065, 2017
672017
Coevolutionary agent-based network defense lightweight event system (CANDLES)
G Rush, DR Tauritz, AD Kent
Proceedings of the Companion Publication of the 2015 Annual Conference on …, 2015
482015
Connected components and credential hopping in authentication graphs
A Hagberg, N Lemons, A Kent, J Neil
2014 Tenth International Conference on Signal-Image Technology and Internet …, 2014
442014
Comprehensive, multi-source cyber-security events data set
AD Kent
Los Alamos National Lab.(LANL), Los Alamos, NM (United States), 2015
322015
Detecting anomalous behavior via user authentication graphs
A Kent, J Neil, L Liebrock
US Patent 10,015,175, 2018
292018
Path scanning for the detection of anomalous subgraphs and use of dns requests and host agents for anomaly/change detection and network situational awareness
JC Neil, ME Fisk, AW Brugh, CL Hash, CB Storlie, B Uphoff, A Kent
US Patent App. 16/278,225, 2019
252019
Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes
AD Kent
US Patent 7,421,576, 2008
212008
Differentiating user authentication graphs
AD Kent, LM Liebrock
2013 IEEE Security and Privacy Workshops, 72-75, 2013
182013
Network traffic analysis with query driven visualization sc 2005 hpc analytics results
K Stockinger, K Wu, S Campbell, S Lau, M Fisk, E Gavrilov, A Kent, ...
SC'05: Proceedings of the 2005 ACM/IEEE Conference on Supercomputing, 72-72, 2005
182005
Modelling user behaviour in a network using computer event logs
MJM Turcotte, NA Heard, AD Kent
Dynamic Networks and Cyber-Security, 67-87, 2016
172016
Secure communication via shared knowledge and a salted hash in ad-hoc environments
AD Kent, LM Liebrock
2011 IEEE 35th Annual Computer Software and Applications Conference …, 2011
162011
Modeling behavior in a network using event logs
MJM Turcotte, NA Heard, AD Kent
US Patent 10,375,095, 2019
142019
Automated design of network security metrics
AS Pope, R Morning, DR Tauritz, AD Kent
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2018
122018
Evolving multi-level graph partitioning algorithms
AS Pope, DR Tauritz, AD Kent
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
122016
Evolving random graph generators: A case for increased algorithmic primitive granularity
AS Pope, DR Tauritz, AD Kent
2016 IEEE Symposium Series on Computational Intelligence (SSCI), 1-8, 2016
122016
The system can't perform the operation now. Try again later.
Articles 1–20