Find us on
Past Programs
![]() |
Keynote: Securing IT in Healthcare: Part III |
![]() |
Keynote: SITH3, Technology-Enabled Remote Monitoring and Support |
![]() |
Intersection of mHealth and Behavioral Health |
Newsletter
ISTS Information Pamphlet
This project has three benefits: First, it provides a clean, simple tool that may be of use in many network-monitoring projects. Second, it provides another input source for our intrusion-analysis tool. Third, it extends the state of the art in secure logging mechanisms; we intend to use his techniques for secure logging of host-based log records.
Final paper "Network Memory for Intrusion Analysis."