<?xml version="1.0"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>

<title>David Kotz papers for project 'kerf'</title>
<description>Papers from David Kotz and his research group, about Kerf (security-log visualization tool).
</description>
<language>en-us</language>
<pubDate>Thu, 09 Apr 2026 16:28:48 +0000</pubDate>
<link>https://www.cs.dartmouth.edu/~kotz/research/project/kerf/index.html</link>
<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
<atom:link href="https://www.cs.dartmouth.edu/~kotz/research/project/kerf/feed.xml" rel="self" type="application/rss+xml"/>

<item>
<title>The Kerf toolkit for intrusion analysis</title>
<guid>aslam:kerf-news</guid>
<pubDate>Fri, 01 Jul 2005 00:00:00 </pubDate>
<description>
Javed Aslam, Sergey Bratus, David Kotz, Ronald Peterson, and Daniela Rus.
 &lt;b&gt;The Kerf toolkit for intrusion analysis.&lt;/b&gt;
 &lt;i&gt;IAnewsletter&lt;/i&gt;, volume&#160;8, number&#160;2, pages&#160;12&#8211;16.
 Information Assurance Technology Analysis Center (IATAC), Summer 2005.
 
</description>
<link>https://www.cs.dartmouth.edu/~kotz/research/aslam-kerf-news/index.html</link>
</item>

<item>
<title>The Kerf toolkit for intrusion analysis</title>
<guid>aslam:toolkit</guid>
<pubDate>Mon, 01 Nov 2004 00:00:00 </pubDate>
<description>
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Brett Tofel, and Daniela Rus.
 &lt;b&gt;The Kerf toolkit for intrusion analysis.&lt;/b&gt;
 &lt;i&gt;IEEE Security &amp; Privacy&lt;/i&gt;, volume&#160;2, number&#160;6, pages&#160;42&#8211;52.
 IEEE, November 2004.
 doi:10.1109/MSP.2004.113.
 &lt;p&gt;&lt;b&gt;Abstract:&lt;/b&gt;
&lt;p&gt;We consider the problem of intrusion analysis and present the Kerf Toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf Toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.&lt;/p&gt;&lt;/p&gt;
 
</description>
<link>https://www.cs.dartmouth.edu/~kotz/research/aslam-toolkit/index.html</link>
</item>

<item>
<title>Kerf: Machine Learning to Aid Intrusion Analysts</title>
<guid>aslam:kerf-WIP</guid>
<pubDate>Sun, 01 Aug 2004 00:00:00 </pubDate>
<description>
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, and Daniela Rus.
 &lt;b&gt;Kerf: Machine Learning to Aid Intrusion Analysts.&lt;/b&gt;
 &lt;i&gt;Proceedings of the USENIX Security Symposium&lt;/i&gt;, 1&#160;page.
 USENIX Association, August 2004.
 Work-in-progress report.
 
</description>
<link>https://www.cs.dartmouth.edu/~kotz/research/aslam-kerf-WIP/index.html</link>
</item>

<item>
<title>The Kerf toolkit for intrusion analysis</title>
<guid>aslam:toolkit-tr</guid>
<pubDate>Mon, 01 Mar 2004 00:00:00 </pubDate>
<description>
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel.
 &lt;b&gt;The Kerf toolkit for intrusion analysis.&lt;/b&gt;
 Technical Report number&#160;TR2004-493, Dartmouth Computer Science, March 2004.
 &lt;p&gt;&lt;b&gt;Abstract:&lt;/b&gt;
&lt;p&gt;We consider the problem of intrusion analysis and present the Kerf Toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf Toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.&lt;/p&gt;&lt;/p&gt;
 
</description>
<link>https://www.cs.dartmouth.edu/~kotz/research/aslam-toolkit-tr/index.html</link>
</item>

<item>
<title>The Kerf toolkit for intrusion analysis (Poster abstract)</title>
<guid>aslam:toolkit-p</guid>
<pubDate>Sun, 01 Jun 2003 00:00:00 </pubDate>
<description>
Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus, and Brett Tofel.
 &lt;b&gt;The Kerf toolkit for intrusion analysis (Poster abstract).&lt;/b&gt;
 &lt;i&gt;Proceedings of the IEEE Workshop on Information Assurance&lt;/i&gt;, pages&#160;301&#8211;303.
 IEEE, West Point, NY, June 2003.
 doi:10.1109/SMCSIA.2003.1232441.
 &lt;p&gt;&lt;b&gt;Abstract:&lt;/b&gt;
&lt;p&gt;We consider the problem of intrusion analysis and present the Kerf toolkit, whose purpose is to provide an efficient and flexible infrastructure for the analysis of attacks. The Kerf toolkit includes a mechanism for securely recording host and network logging information for a network of workstations, a domain-specific language for querying this stored data, and an interface for viewing the results of such a query, providing feedback on these results, and generating new queries in an iterative fashion. We describe the architecture of Kerf in detail, present examples to demonstrate the power of our query language, and discuss the performance of our implementation of this system.&lt;/p&gt;&lt;/p&gt;
 
</description>
<link>https://www.cs.dartmouth.edu/~kotz/research/aslam-toolkit-p/index.html</link>
</item>

</channel>
</rss>
