• Citations Per Year
Learn More
Mark W. Shephard, Robert L. Herman, Brendan M. Fisher, Karen E. Cady-Pereira, Shepard A. Clough, Vivienne H. Payne, David N. Whiteman, Joseph P. Comer, Holger Vömel, Larry M. Miloshevich, Ricardo Forno, Mariana Adam, Gregory B. Osterman, Annmarie Eldering, John R. Worden, Linda R. Brown, Helen M. Worden, Susan S. Kulawik, David M. Rider, Aaron Goldman,(More)
A network device is considered compromised when one of its security mechanisms is defeated by an attacker. For many networks, an attacker can compromise many devices before being discovered. However, investigating devices for compromise is costly and time-consuming, making it dicult to investigate all, or even most, of a network's devices. Further,(More)
  • 1