Bradley Cowie

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper considers the complexities involved in obtaining training data for use by artificial intelligence constructs to identify potential network incidents using passive network telescope data. While a large amount of data obtained from network telescopes exists, this data is not currently marked for known incidents. Problems related to this marking(More)
The eld of Information Security and the subeld of cryptographic protocols are both vast and continually evolving and expanding elds. The use of cryptographic protocols as a means to provide security to web servers and services at the transport layer, by providing both encryption and authentication to data transfer, has become increasingly popular. I intend(More)
1 INTRODUCTION This paper describes research in the eld of cryptographic protocols, currently being performed in the REMOVED. While this research is not entirely novel, as it makes use of elements from existing research in the detection of encrypted applications [2], we consider a generic solution to the given problem of analysing encrypted trac with the(More)
  • 1