Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Teresa F. Lunt is active.

Publication


Featured researches published by Teresa F. Lunt.


innovative applications of artificial intelligence | 2004

Identifying terrorist activity with AI plan recognition technology

Peter A. Jarvis; Teresa F. Lunt; Karen L. Myers

We describe the application of plan recognition techniques to support human intelligence analysts in processing national security alert sets by automatically identifying the hostile intent behind them. Identifying the intent enables us to both prioritize and explain the alert sets for succinct user presentation. Our empirical evaluation demonstrates that the approach can handle alert sets of as many as 20 elements and can readily distinguish between false and true alarms. We discuss the important opportunities, for future work, that will increase the cardinality of the alert sets supported by the system to the level demanded by a deployable application. In particular, we outline opportunities to bring the analysts into the process and the opportunities for heuristic improvements to the plan recognition algorithm.


ieee computer security foundations symposium | 2000

Panel: foundations for intrusion detection

Teresa F. Lunt

Intrusion detection technologies have well-known shortcomings, such as a very high false alarm rate and the ability to detect only a limited class of attacks on a limited set of system components. Specialized attack types on unique system components cannot be detected, and neither can application-specific attacks. Even generic attacks on operating systems and networks cannot be reliably detected. Moreover, todays technology does only poorly at detecting new attack types, whereas much effort goes into developing signatures indicative of known attacks.


Archive | 2004

Systems and methods for protecting private information in a mobile environment

Teresa F. Lunt; Daniel H. Greene; Philippe Golle; Richard H. Bruce; Jessica Staddon


Archive | 2004

Systems and methods for protecting privacy

Teresa F. Lunt; Daniel H. Greene; Philippe Golle; Richard H. Bruce


Archive | 2004

Method and apparatus for detecting and correcting malicious data in an ad-hoc network

Philippe Golle; Daniel H. Greene; Teresa F. Lunt; Jessica Staddon


Archive | 2010

System and method for flexibly taking actions in response to detected activities

Eric A. Bier; Teresa F. Lunt; Oliver Brdiczka


Archive | 2012

System And Method For Flexibly Taking Actions Upon Activation Of Defined Triggers

Eric A. Bier; Teresa F. Lunt; Oliver Brdiczka


Archive | 2003

Protecting privacy in terrorist tracking applications

Philippe Golle; Paul M. Aoki; Dirk Balfanz; Glenn Durfee; Teresa F. Lunt; Diana K. Smetters; Jessica Staddon; James D. Thornton; Tomas Uribe


Archive | 2011

ACTION EXECUTION SYSTEM

Eric A. Bier; Oliver Brdiczka; Teresa F. Lunt; エー.ビアー エリック; ブルディツカ オリバー; エフ.ルント テリーサ


Archive | 2011

Système et procédé pour prendre avec flexibilité des actions en réponse à des activités détectées

Eric A. Bier; Teresa F. Lunt; Oliver Brdiczka

Researchain Logo
Decentralizing Knowledge