Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 31 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Corelight Co-founders Receive Prestigious IEEE Test of Time Award

Dr. Vern Paxson and Dr. Robin Sommer’s landmark 2010 paper on the challenges of machine learning for intrusion detection honored for its enduring influence on the security industry

by Sabina
May 21, 2020
in Press Releases
Corelight logo
Share on FacebookShare on Twitter

Corelight, provider of the most powerful network traffic analysis (NTA) solutions for cybersecurity, today announced two of its founders, Dr. Vern Paxson and Dr. Robin Sommer, have received the distinguished IEEE Security and Privacy “Test of Time” award for their work entitled “Outside the Closed World: On Using Machine Learning For Network Intrusion Detection” published in 2010.

The IEEE Security and Privacy “Test of Time” award is intended to recognize papers published at IEEE’s flagship security conference that have made a lasting impact on the field.

“Ten years ago when we set out to do this research, machine learning was still a pretty nascent technology, particularly as it related to network defense techniques,” said Paxson. “We hope that this paper continues to serve as a guidepost for further development of machine learning as an effective network defense mechanism.”

“The challenges to defenders attempting to leverage machine learning for anomaly detection, remain largely the same today,” said Sommer. “As such, it is an honor to receive this distinction from IEEE and to know that our research has made a major impact on the field.”

To qualify for an award, a paper must have been published at the IEEE Symposium on Security and Privacy (“S&P”) between 10 and 12 years prior. Each year, the awards selection committee is charged to select one or more winners from among the eligible set using their own experience and knowledge.

“Our committee looked for publications that were as rich in their foresight as in their technical and research contributions,” said Avi Rubin, 2020 IEEE S&P Test of Time Award selection committee chair and professor at Johns Hopkins University. “The selected papers have made a lasting impact on the field, transforming the research landscape with novel ideas that correctly predicted the direction of the field and the industry.”

About the IEEE Symposium on Security
Since 1980 in Oakland, Calif., the IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners. We solicit previously unpublished papers offering novel research contributions in any aspect of security or privacy. Papers may present advances in the theory, design, implementation, analysis, verification, or empirical evaluation and measurement of secure systems.

About Corelight
Corelight makes powerful network traffic analysis (NTA) solutions that transform network traffic into rich logs, extracted files, and security insights for more effective incident response, threat hunting, and forensics. Corelight Sensors run on Zeek (formerly called “Bro”), the open-source network security monitoring tool used by thousands of organizations. Corelight Sensors simplify Zeek deployment and expand its performance and capabilities. Corelight’s global customers include Fortune 500 companies, major government agencies, and large research universities. Corelight is based in San Francisco, Calif. For more information, visit https://www.corelight.com or follow @corelight_inc.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Securonix Insider Threat Report:

Next Post

Case study: Softcat Prevails Over Cybercrime With KnowBe4

Recent News

JD Sports admits data breach

JD Sports admits data breach

January 30, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023
Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information