Current Research

My research efforts concern the intersection between artificial intelligence and information security.  In particular I am working to develop new adaptive intelligent systems that can be applied to protect computer systems and networks.  The following information provides details of my two current research groups, information for students in my graduate research courses, and a list of some of my publications.  Students interested in working with me should review my Expectations for Dissertation Students page.


Research Groups

NEMESIS





Additional Available Doctoral Research Topics




Coursework Research

DCIS/DISS 898

MCIS 687





Selected Publications


Cannady, J. (2011). An Adaptive Neural Swarm Approach for Intrusion Defense in Ad Hoc Networks, Proceedings of SPIE.

Cannady, J. (2010). Dynamic Neural Networks in the Detection of Distributed Attacks in Mobile Ad-Hoc Networks. International Journal Of Network Security And Its Applications.

Cerkez, P. & Cannady, J. (2010). Automated detection of semagram-laden images using
adaptive neural networks. Proceedings of SPIE, Volume 7708.

Fuhs, J. & Cannady, J. (2010). A Model for Detecting Source Code Anomalies by Extending
Petri Nets. . In Proceedings of the 5th International Conference on Information Warfare and
Security.

Cannady, J. (2010). Real-time Detection of Distributed Zero-day Attacks in Ad Hoc
Networks. In Proceedings of the 5th International Conference on Information Warfare and
Security.

Cannady, J. (2010). Detection Of Distributed Attacks In Mobile Ad-Hoc Networks Using
Self-Organizing Temporal Neural Networks. In Proceedings of the Second International
Conference on Agents and Artificial Intelligence.

Cannady, J. (2009). Distributed Detection of Attacks in Mobile Ad-hoc Networks Using
Learning Vector Quantization. In Proceedings of the Network and System Security
Conference (NSS 2009).

Cannady, J. (2005). Self-Organizing Distributed Intrusion Detection in Mobile Ad Hoc
Networks. Proceedings of the 2005 IEEE Workshop on Soft Computing as Transdisciplinary Science and Technology

Dass, M., Cannady, J., & Potter, D. (2003). A Genetic Algorithm-based Intrusion
Subclassifier Filter. In Proceedings of the 2003 ACM Southeast Conference.

Dass, M., Cannady, J., & Potter, D. (2003). LIDS: Learning Intrusion Detection System. In
Proceedings of the 2003 Florida Artificial Intelligence Symposium.

Cannady, J. (2003). Identifying Complex Multi-Stage Network Attacks With Dynamic Petri
Nets. In Proceedings of the 2003 Army Science Conference.

Cannady, J. & Little, M. (2003). Representing Battlefield Network Attacks with Conceptual
Structures. In Proceedings of the 2003 Army Science Conference.

Cannady, J. (2002). Intrusion Detection – Capabilities and Considerations. Global
Infosecurity 2000, World Markets Research Centre. London.

Cannady, J. (2001, August). The Application of Fuzzy ARTMAP in the Detection of
Computer Network Attacks. Proceedings of the 2001 International Conference on Artificial
Neural Networks.

Bauer, D, Cannady, J., & Garcia, R (2001, April). Detecting Anomalous Behavior:
Optimization Of Network Traffic Parameters Via An Evolution Strategy. Proceedings of the
2001 IEEE SOUTHEASTCON Conference.

Garcia, R., & Cannady, J. (2001, April). Boundary Expansion of Expert Systems:
Incorporating Evolutionary Computation with Intrusion Detection Solutions. Proceedings of
the 2001 IEEE SOUTHEASTCON Conference.

Rhodes, B., Mahaffey, J., & Cannady, J. (2000, October). Multiple Self-Organizing Maps for
Intrusion Detection. Proceedings of the 23rd National Information Systems Security Conference.

Cannady, J. (2000, October). Next Generation Intrusion Detection: Autonomous
Reinforcement Learning of Network Attacks. Proceedings of the 23rd National Information
Systems Security Conference.

Cannady, J. (2000, July). Applying CMAC-based On-line Learning to Intrusion Detection.
Proceedings of the 2000 IEEE/INNS Joint International Conference on Neural Networks.

Cannady, J. (1998) Applying Neural Networks to Misuse Detection. Proceedings of the 21st
National Information Systems Security Conference, 368-381.

Cannady, J. (1998). Neural Networks for Misuse Detection: Initial Results. Proceedings of
the Recent Advances in Intrusion Detection ’98 Conference, 31-47.

Cannady, J., Harrell, J., & Huggins, D. (1996). A Model of an Attack Database System.
Proceedings of DOD Database Colloquium ’96, 78-90.

Cramer, M.L., Cannady, J., & Harrell, J. (1996). New Methods of Intrusion Detection using
Control-Loop Measurement. Proceedings of Technology in Information Security Conference
(TISC) ‘ 96, 229-245.

Cannady, J., & Harrell, J.R. (1996). A Comparative Analysis of Current Intrusion Detection
Technologies. Proceedings of Technology in Information Security Conference (TISC) ’96,
212-218.