Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
This research project explored immunological approaches to intrusion detection in computer networks and investigated techniques for modeling and visualizing Internet attacks. The first research thrust applied novel programming paradigms to the challenge of building adaptive and intelligent network protection schemes. The second thrust sought to provide a “heads-up” cockpit display for network administrators, allowing them to monitor and predict multi-stage attack sequences. The two objectives strive to facilitate the development and installation of robust network security architectures. A third objective was to develop useful technology for law enforcement conducting computer and network forensics exercises.