Brett Wilson

Learn More
Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utilize infrastructure protocols that are susceptible to manipulation; and rely on noisy, intermittent wireless communications. We present a cooperative, distributed intrusion detection(More)
Pre-integrated volume rendering is an effective technique for generating high-quality visualizations. The precomputed lookup tables used by this method are slow to compute and can not include truly pre-integrated lighting due to space constraints. The lighting for pre-integrated rendering is therefore subject to the same sampling artifacts as in standard(More)
Configuring a security experiment can be tedious, involving many low level and repetitive configuration tasks. In order to make DETER’s capabilites accessible to users at all skill levels, we have designed and implemented a Security Experimentation EnviRonment (SEER) that provides security researchers the ability to create, plan, and iterate through a large(More)
Infant rats treated with basic fibroblast growth factor-2 (FGF-2) after postnatal day (P)10 motor cortical injury, show functional improvement in adulthood relative to those that do not receive FGF-2. In this study we used a combination of behavioural, immunohistochemical, electrophysiological, electron microscopic and teratological approaches to(More)
The scientific simulation and three-dimensional imaging systems in use today are producing large quantities of data that range from gigabytes to petabytes in size. Direct volume rendering, using hardware-based three-dimensional textures, is a common technique for interactively exploring these data sets. The most serious drawback of this approach is the(More)
To date, the measurement of user-perceived degradation of quality of service during denial of service (DoS) attacks remained an elusive goal. Current approaches mostly rely on lower level traffic measurements such as throughput, utilization, loss rate, and latency. They fail to monitor all traffic parameters that signal service degradation for diverse(More)