Transfer learning for detecting unknown network attacks View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-12

AUTHORS

Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua, Kevin Kwiat

ABSTRACT

Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common latent subspace of two different attacks and learn an optimized representation, which was invariant to attack behaviors’ changes. However, HeTL relied on manual pre-settings of hyper-parameters such as relativeness between the source and target attacks. In this paper, we extended this study by proposing a clustering-enhanced transfer learning approach, called CeHTL, which can automatically find the relation between the new attack and known attack. We evaluated these approaches by stimulating scenarios where the testing dataset contains different attack types or subtypes from the training set. We chose several conventional classification models such as decision trees, random forests, KNN, and other novel transfer learning approaches as strong baselines. Results showed that proposed HeTL and CeHTL improved the performance remarkably. CeHTL performed best, demonstrating the effectiveness of transfer learning in detecting new network attacks. More... »

PAGES

1

References to SciGraph publications

Identifiers

URI

http://scigraph.springernature.com/pub.10.1186/s13635-019-0084-4

DOI

http://dx.doi.org/10.1186/s13635-019-0084-4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1112292073


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Vanderbilt University Medical Center", 
          "id": "https://www.grid.ac/institutes/grid.412807.8", 
          "name": [
            "Vanderbilt University Medical Center, 37203, Nashville, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhao", 
        "givenName": "Juan", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Old Dominion University", 
          "id": "https://www.grid.ac/institutes/grid.261368.8", 
          "name": [
            "Virginia Modeling Analysis and Simulation Center, Old Dominion University, 23529, Norfolk, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Shetty", 
        "givenName": "Sachin", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "AutoX Inc, San Jose, California, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Pan", 
        "givenName": "Jan Wei", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "United States Army", 
          "id": "https://www.grid.ac/institutes/grid.420176.6", 
          "name": [
            "US Army Research Laboratory\u2019s Network Security Branch, 20783, Adelphi, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kamhoua", 
        "givenName": "Charles", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Haloed Sun TEK, LLC, in affiliation with the CAESAR Group, Sarasota, Florida, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Kwiat", 
        "givenName": "Kevin", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/1273496.1273521", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1000267154"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1273496.1273507", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003874673"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1002/wics.101", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1012628338"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s10994-014-5473-9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1019266990", 
          "https://doi.org/10.1007/s10994-014-5473-9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1401890.1401928", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1031075349"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1014052.1014067", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037354096"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tkde.2009.191", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1041355599"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2576768.2598238", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1044255175"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2124295.2124311", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1046575725"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2629528", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1051673341"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tnn.2010.2091281", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061717808"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/cns.2015.7346821", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093590754"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/cvpr.2011.5995702", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093718042"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icse.2013.6606584", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094561184"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/ispa.2009.92", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094656282"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccnc.2013.6504162", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094719450"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icdm.2010.65", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095029883"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/malware.2011.6112321", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095406391"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icmlc.2002.1176698", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095589527"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/milcom.2017.8170749", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1099649326"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2019-12", 
    "datePublishedReg": "2019-12-01", 
    "description": "Network attacks are serious concerns in today\u2019s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common latent subspace of two different attacks and learn an optimized representation, which was invariant to attack behaviors\u2019 changes. However, HeTL relied on manual pre-settings of hyper-parameters such as relativeness between the source and target attacks. In this paper, we extended this study by proposing a clustering-enhanced transfer learning approach, called CeHTL, which can automatically find the relation between the new attack and known attack. We evaluated these approaches by stimulating scenarios where the testing dataset contains different attack types or subtypes from the training set. We chose several conventional classification models such as decision trees, random forests, KNN, and other novel transfer learning approaches as strong baselines. Results showed that proposed HeTL and CeHTL improved the performance remarkably. CeHTL performed best, demonstrating the effectiveness of transfer learning in detecting new network attacks.", 
    "genre": "research_article", 
    "id": "sg:pub.10.1186/s13635-019-0084-4", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1313801", 
        "issn": [
          "1687-4161", 
          "2510-523X"
        ], 
        "name": "EURASIP Journal on Information Security", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "1", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "2019"
      }
    ], 
    "name": "Transfer learning for detecting unknown network attacks", 
    "pagination": "1", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "d4c5c534eefbb177b31bf6bd952abc07a115cb28a5af7573b54a999459caec1f"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1186/s13635-019-0084-4"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1112292073"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1186/s13635-019-0084-4", 
      "https://app.dimensions.ai/details/publication/pub.1112292073"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T09:37", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000346_0000000346/records_99824_00000005.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1186%2Fs13635-019-0084-4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1186/s13635-019-0084-4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1186/s13635-019-0084-4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1186/s13635-019-0084-4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1186/s13635-019-0084-4'


 

This table displays all metadata directly associated to this object as RDF triples.

155 TRIPLES      21 PREDICATES      47 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1186/s13635-019-0084-4 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N446763be16484d46b6ee0faf6d643841
4 schema:citation sg:pub.10.1007/s10994-014-5473-9
5 https://doi.org/10.1002/wics.101
6 https://doi.org/10.1109/cns.2015.7346821
7 https://doi.org/10.1109/cvpr.2011.5995702
8 https://doi.org/10.1109/iccnc.2013.6504162
9 https://doi.org/10.1109/icdm.2010.65
10 https://doi.org/10.1109/icmlc.2002.1176698
11 https://doi.org/10.1109/icse.2013.6606584
12 https://doi.org/10.1109/ispa.2009.92
13 https://doi.org/10.1109/malware.2011.6112321
14 https://doi.org/10.1109/milcom.2017.8170749
15 https://doi.org/10.1109/tkde.2009.191
16 https://doi.org/10.1109/tnn.2010.2091281
17 https://doi.org/10.1145/1014052.1014067
18 https://doi.org/10.1145/1273496.1273507
19 https://doi.org/10.1145/1273496.1273521
20 https://doi.org/10.1145/1401890.1401928
21 https://doi.org/10.1145/2124295.2124311
22 https://doi.org/10.1145/2576768.2598238
23 https://doi.org/10.1145/2629528
24 schema:datePublished 2019-12
25 schema:datePublishedReg 2019-12-01
26 schema:description Network attacks are serious concerns in today’s increasingly interconnected society. Recent studies have applied conventional machine learning to network attack detection by learning the patterns of the network behaviors and training a classification model. These models usually require large labeled datasets; however, the rapid pace and unpredictability of cyber attacks make this labeling impossible in real time. To address these problems, we proposed utilizing transfer learning for detecting new and unseen attacks by transferring the knowledge of the known attacks. In our previous work, we have proposed a transfer learning-enabled framework and approach, called HeTL, which can find the common latent subspace of two different attacks and learn an optimized representation, which was invariant to attack behaviors’ changes. However, HeTL relied on manual pre-settings of hyper-parameters such as relativeness between the source and target attacks. In this paper, we extended this study by proposing a clustering-enhanced transfer learning approach, called CeHTL, which can automatically find the relation between the new attack and known attack. We evaluated these approaches by stimulating scenarios where the testing dataset contains different attack types or subtypes from the training set. We chose several conventional classification models such as decision trees, random forests, KNN, and other novel transfer learning approaches as strong baselines. Results showed that proposed HeTL and CeHTL improved the performance remarkably. CeHTL performed best, demonstrating the effectiveness of transfer learning in detecting new network attacks.
27 schema:genre research_article
28 schema:inLanguage en
29 schema:isAccessibleForFree false
30 schema:isPartOf N4e1dead80c884c7bb7bb671813435521
31 N590e8a9390474eafb7e08c43daf9fb1c
32 sg:journal.1313801
33 schema:name Transfer learning for detecting unknown network attacks
34 schema:pagination 1
35 schema:productId N2715e68923444e7b9df2fe3ef00578d0
36 Ne0c8f2fc02034c99b975269fc8ffb0e6
37 Nfd2960b6bca144b8823c67cca5e3eb99
38 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112292073
39 https://doi.org/10.1186/s13635-019-0084-4
40 schema:sdDatePublished 2019-04-11T09:37
41 schema:sdLicense https://scigraph.springernature.com/explorer/license/
42 schema:sdPublisher N34a34ffe966940df93881a13d79ff872
43 schema:url https://link.springer.com/10.1186%2Fs13635-019-0084-4
44 sgo:license sg:explorer/license/
45 sgo:sdDataset articles
46 rdf:type schema:ScholarlyArticle
47 N0a6fdc257cf84ff0bdc0faa2c09b6456 rdf:first Nd8240f3cf0f04e5da8f6d6d8f9ac6934
48 rdf:rest N6897e959d1ab4beb9cf6dbaab1f5e979
49 N17b67563eecd422aaee977f7e66aca7a schema:affiliation N18680673827a426fbad310f831a56f77
50 schema:familyName Kwiat
51 schema:givenName Kevin
52 rdf:type schema:Person
53 N18680673827a426fbad310f831a56f77 schema:name Haloed Sun TEK, LLC, in affiliation with the CAESAR Group, Sarasota, Florida, USA
54 rdf:type schema:Organization
55 N2715e68923444e7b9df2fe3ef00578d0 schema:name doi
56 schema:value 10.1186/s13635-019-0084-4
57 rdf:type schema:PropertyValue
58 N34a34ffe966940df93881a13d79ff872 schema:name Springer Nature - SN SciGraph project
59 rdf:type schema:Organization
60 N3f7fc2d7a3d6481e92514f1ff900e141 schema:affiliation https://www.grid.ac/institutes/grid.420176.6
61 schema:familyName Kamhoua
62 schema:givenName Charles
63 rdf:type schema:Person
64 N40455889a3414803a85af795d45c7141 schema:affiliation Nf325cd896c4245778b128cad255bfb40
65 schema:familyName Pan
66 schema:givenName Jan Wei
67 rdf:type schema:Person
68 N446763be16484d46b6ee0faf6d643841 rdf:first N5b22ceece2d54b048e24fa039dd6273c
69 rdf:rest N0a6fdc257cf84ff0bdc0faa2c09b6456
70 N4e1dead80c884c7bb7bb671813435521 schema:volumeNumber 2019
71 rdf:type schema:PublicationVolume
72 N590e8a9390474eafb7e08c43daf9fb1c schema:issueNumber 1
73 rdf:type schema:PublicationIssue
74 N5b22ceece2d54b048e24fa039dd6273c schema:affiliation https://www.grid.ac/institutes/grid.412807.8
75 schema:familyName Zhao
76 schema:givenName Juan
77 rdf:type schema:Person
78 N6897e959d1ab4beb9cf6dbaab1f5e979 rdf:first N40455889a3414803a85af795d45c7141
79 rdf:rest N8ce58b736a5a4ae89381da5ca7463519
80 N7bafb2ca237941f1bc727b79a3a37325 rdf:first N17b67563eecd422aaee977f7e66aca7a
81 rdf:rest rdf:nil
82 N8ce58b736a5a4ae89381da5ca7463519 rdf:first N3f7fc2d7a3d6481e92514f1ff900e141
83 rdf:rest N7bafb2ca237941f1bc727b79a3a37325
84 Nd8240f3cf0f04e5da8f6d6d8f9ac6934 schema:affiliation https://www.grid.ac/institutes/grid.261368.8
85 schema:familyName Shetty
86 schema:givenName Sachin
87 rdf:type schema:Person
88 Ne0c8f2fc02034c99b975269fc8ffb0e6 schema:name readcube_id
89 schema:value d4c5c534eefbb177b31bf6bd952abc07a115cb28a5af7573b54a999459caec1f
90 rdf:type schema:PropertyValue
91 Nf325cd896c4245778b128cad255bfb40 schema:name AutoX Inc, San Jose, California, USA
92 rdf:type schema:Organization
93 Nfd2960b6bca144b8823c67cca5e3eb99 schema:name dimensions_id
94 schema:value pub.1112292073
95 rdf:type schema:PropertyValue
96 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
97 schema:name Information and Computing Sciences
98 rdf:type schema:DefinedTerm
99 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
100 schema:name Artificial Intelligence and Image Processing
101 rdf:type schema:DefinedTerm
102 sg:journal.1313801 schema:issn 1687-4161
103 2510-523X
104 schema:name EURASIP Journal on Information Security
105 rdf:type schema:Periodical
106 sg:pub.10.1007/s10994-014-5473-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019266990
107 https://doi.org/10.1007/s10994-014-5473-9
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1002/wics.101 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012628338
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1109/cns.2015.7346821 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093590754
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1109/cvpr.2011.5995702 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093718042
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1109/iccnc.2013.6504162 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094719450
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1109/icdm.2010.65 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095029883
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1109/icmlc.2002.1176698 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095589527
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1109/icse.2013.6606584 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094561184
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1109/ispa.2009.92 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094656282
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1109/malware.2011.6112321 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095406391
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1109/milcom.2017.8170749 schema:sameAs https://app.dimensions.ai/details/publication/pub.1099649326
128 rdf:type schema:CreativeWork
129 https://doi.org/10.1109/tkde.2009.191 schema:sameAs https://app.dimensions.ai/details/publication/pub.1041355599
130 rdf:type schema:CreativeWork
131 https://doi.org/10.1109/tnn.2010.2091281 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061717808
132 rdf:type schema:CreativeWork
133 https://doi.org/10.1145/1014052.1014067 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037354096
134 rdf:type schema:CreativeWork
135 https://doi.org/10.1145/1273496.1273507 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003874673
136 rdf:type schema:CreativeWork
137 https://doi.org/10.1145/1273496.1273521 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000267154
138 rdf:type schema:CreativeWork
139 https://doi.org/10.1145/1401890.1401928 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031075349
140 rdf:type schema:CreativeWork
141 https://doi.org/10.1145/2124295.2124311 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046575725
142 rdf:type schema:CreativeWork
143 https://doi.org/10.1145/2576768.2598238 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044255175
144 rdf:type schema:CreativeWork
145 https://doi.org/10.1145/2629528 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051673341
146 rdf:type schema:CreativeWork
147 https://www.grid.ac/institutes/grid.261368.8 schema:alternateName Old Dominion University
148 schema:name Virginia Modeling Analysis and Simulation Center, Old Dominion University, 23529, Norfolk, USA
149 rdf:type schema:Organization
150 https://www.grid.ac/institutes/grid.412807.8 schema:alternateName Vanderbilt University Medical Center
151 schema:name Vanderbilt University Medical Center, 37203, Nashville, USA
152 rdf:type schema:Organization
153 https://www.grid.ac/institutes/grid.420176.6 schema:alternateName United States Army
154 schema:name US Army Research Laboratory’s Network Security Branch, 20783, Adelphi, USA
155 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...