Paul K. Harmer

Learn More
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect their systems from intrusion and computer-virus attacks. Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs(More)
Security and privacy within existing wireless architectures remain a major concern and may be further compounded when considering multi-node wireless cognitive networks. However, the same computational capabilities that enable cognitive transceiver operation can also be used to enhance physical-layer security at each node. The approach here uses RF Distinct(More)
Cognitive Radio (CR) networks create an environment that presents unique security challenges, with reliable user authentication being essential for mitigating Primary User Emulation (PUE) spoofing and ensuring the cognition engine is using reliable information when dynamically reconfiguring the network. Unfortunately, wireless network edge devices increase(More)
Wireless communication networks remain under attack with ill- intentioned "hackers" routinely gaining unauthorized access through Wireless Access Points-one of the most vulnerable points in an Information Technology (IT) system. The goal here is to demonstrate the feasibility of using Radio Frequency (RF) air monitoring to augment conventional bit-level(More)
Wireless communication networks remain under attack with ill-intentioned “hackers” routinely gaining unauthorized access through Wireless Access Points (WAPs)–one of the most vulnerable points in an information technology system. The goal here is to demonstrate the feasibility of using Radio Frequency (RF) air monitoring to augment conventional bit-level(More)
Computer and communication network attacks are commonly orchestrated through Wireless Access Points (WAPs). This paper summarizes proof-of-concept research activity aimed at developing a physical layer Radio Frequency (RF) air monitoring capability to limit unauthorized WAP access and improve network security. This is done using Differential Evolution (DE)(More)
The Web Hacking Database, for short, is a Web Application Security Project dedicated to maintaining a list of web applications related security incidents. The goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. However to understand(More)
Artificial Immune System (AIS) over the years has caught attention of researchers of various domains for complex problem solving. AIS model the procedure and methodologies of Biological Immune System (BIS) which protects the body from diverse attacks and different challenges. Scientists over the years are amazed with the appealing features of BIS that can(More)
Wireless networks are a common point of entry for computer network attacks. Due to high traffic volumes, network mission assurance requires tools that can usefully display network traffic data, automatically detect, and identify attacks to provide increased situational awareness to a network administrator. Many metrics used to analyze wireless network(More)
  • 1