Joseph Betser

Learn More
Device failures, performance ineeciencies, and security compromises are some of the problems associated with the operations of networked systems. EEective management requires monitoring, interpreting, and controlling the behavior of the distributed resources. Current management systems pursue a platform-centered paradigm, where agents monitor the system and(More)
We describe the goals of the IETF’s Intrusion Detection Working Group (IDWG) and the requirements for a transport protocol to communicate among intrusion detection systems. We then describe the design and implementation of IAP, the first attempt at such a protocol. After a discussion of IAP’s limitations, we discuss BEEP, a new IETF general framework for(More)
This report documents the evolution of a number of symposia, along with the evolution of the associated communities. These communities launched the initial conferences, as well as benefited from the growth and evolution of these technical activities. Over the span of a couple decades, the communities grew in breadth and depth. The communities are truly(More)
In the Android operating system, each application consists of a set of components that communicate with each other via messages called Intents. The current implementation of Intent handling is such that developers can inadvertently write insecure code that allows malicious applications to intercept or inject Intents to steal sensitive information or induce(More)
This paper describes the process of grid-enabling a vibroacoustic analysis application using the Globus Toolkit 3.2.1. This is the first step in a project intended to grid-enable a suite of tools being developed as a service-oriented architecture for spacecraft telemetry analysis. Many of the applications in the suite are compute intensive and would benefit(More)
We examine Space Mission Knowledge Management (KM), where enterprise knowledge is created by knowledge workers within communities of practice (CoP) and other contributors. We consider the increasing impact of Social Software (SSW) on a modern KM enterprise and regard the difficulty in harmonizing the SSW benefits to the spacemissions enterprise via Web 2.0(More)
The cyber analyst must try to sift through a huge amount of data that may or may not be related in order to identify threats. This is a complex process that is made more difficult by having to correlate and combine heterogeneous data that are created using different languages with varying amounts of semantics. However, data alone is insufficient to identify(More)
The 13th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012) was held on April 16–20, 2012 in Maui, Hawaii, USA. Held in even-numbered years since 1988, NOMS 2012 followed the 24 years tradition of NOMS and IM as the primary IEEE Communications Society’s (ComSoc) forum for technical exchange on management of information and communication(More)