Publications

Export 36 results:
Author Title Type [ Year(Desc)]
Filters: Keyword is Security  [Clear All Filters]
1997
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
1998
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
2001
Moore JT, Hicks MW, Nettles S.  2001.  Practical programmable packets. IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:41-50vol.1-41-50vol.1.
2002
Hicks MW, Moore JT, Wetherall D, Nettles S.  2002.  Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
Scholtz J, Johnson J, Shneiderman B, Hope-Tindall P, Gosling M, Phillips J, Wexelblat A.  2002.  Interacting with identification technology: can it make us more secure? CHI '02 extended abstracts on Human factors in computing systems. :564-565.
Jiwnani K, Zelkowitz MV.  2002.  Maintaining software with a security perspective. Software Maintenance, 2002. Proceedings. International Conference on. :194-203.
2003
Trappe W, M. Wu, Wang ZJ, Liu KJR.  2003.  Anti-collusion fingerprinting for multimedia. Signal Processing, IEEE Transactions on. 51(4):1069-1087.
Bobba RB, Eschenauer L, Gligor V, Arbaugh WA.  2003.  Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
Cetintemel U, Keleher PJ, Bhattacharjee B, Franklin MJ.  2003.  Deno: a decentralized, peer-to-peer object-replication system for weakly connected environments. Computers, IEEE Transactions on. 52(7):943-959.
Wu M.  2003.  Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
Wang ZJ, M. Wu, Zhao H, Liu KJR, Trappe W.  2003.  Resistance of orthogonal Gaussian fingerprints to collusion attacks. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 1:I-617-20vol.1-I-617-20vol.1.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
2004
M. Wu, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
Petroni J., Fraser T, Molina J, Arbaugh WA.  2004.  Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
Newsome J, Elaine Shi, Song D, Perrig A.  2004.  The sybil attack in sensor networks: analysis & defenses. :259-268.
Morselli R, Bhattacharjee B, Katz J, Keleher P.  2004.  Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
2005
He S, M. Wu.  2005.  Improving collusion resistance of error correcting code based multimedia fingerprinting. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1029-ii/1032Vol.2-ii/1029-ii/1032Vol.2.
Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A.  2005.  A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur.. 8(2):228-258.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2006
He S, M. Wu.  2006.  Joint coding and embedding techniques for MultimediaFingerprinting. Information Forensics and Security, IEEE Transactions on. 1(2):231-247.
Ramachandran A, Feamster N.  2006.  Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
2007
Ramachandran A, Feamster N, Vempala S.  2007.  Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.

Pages