Search

Paul S Cotae

from Rockville, MD
Age ~69

Paul Cotae Phones & Addresses

  • 12507 Village Square Ter #201, Rockville, MD 20852
  • Potomac, MD
  • Boulder, CO
  • 5727 Sage Trl, San Antonio, TX 78249 (210) 558-3881

Resumes

Resumes

Paul Cotae Photo 1

Associate Professor At The University Of The District Of Columbia

View page
Position:
Associate Professor at The University of the District of Columbia
Location:
Washington D.C. Metro Area
Industry:
Telecommunications
Work:
The University of the District of Columbia
Associate Professor

Publications

Us Patents

Pre-Modulation Physical Layer Steganography

View page
US Patent:
20130101059, Apr 25, 2013
Filed:
Oct 3, 2012
Appl. No.:
13/573671
Inventors:
Ira S. Moskowitz - Washington DC, US
Pedro N. Safier - Alexandria VA, US
Paul Cotae - Potomac MD, US
International Classification:
H04L 27/00
US Classification:
375259
Abstract:
A method for physical layer steganography communications is provided by combining an encoded cover data stream with a hidden data stream to create stego data stream. The cover and hidden data streams can be combined by determining an insertion rate, and determining, for each bit of the hidden data stream, whether to change an associated bit in the cover data stream. The bit of the cover data stream is changed to match the hidden data stream when the two bits are different. Otherwise, the cover data stream bit stays the same. The stego data stream can then be modulated and transmitted to a receiver. At the receiver, the stego data stream can be split to extract the hidden data stream, and the cover data stream can be decoded.

Detecting Shrew Attacks Using Spectral Analysis And Clustering

View page
US Patent:
20200228567, Jul 16, 2020
Filed:
Oct 20, 2017
Appl. No.:
15/789500
Inventors:
- Arlington VA, US
Paul Cotae - Potomac MD, US
Alexander Velazquez - Washington DC, US
International Classification:
H04L 29/06
Abstract:
Systems and method are provided for detecting Low Rate (LR) Denial of Service (DOS) Attacks, such as Shrew and New Shrew attacks, using spectral analysis and clustering algorithms. In an embodiment, the presence of suspicious low frequency periodic bursts due to Shrew or New Shrews attacks is detected during a specific time period using the aggregated traffic from multiple hosts. If low-frequency periodic bursts are suspected, clustering can be used to isolate suspicious hosts. After suspicious hosts are identified, a statistic test (e.g., a Fisher g-statistic test) for periodical content can be performed again on the traffic from each suspicious host to confirm the presence of a Shrew (New Shrew) attack and identify the offending host(s).
Paul S Cotae from Rockville, MD, age ~69 Get Report