162 results on '"Douglas S. Reeves"'
Search Results
2. Hyperagents: Migrating Host Agents to the Hypervisor.
3. Furnace: Self-service Tenant VMI for the Cloud.
4. Arav: monitoring a cloud's virtual routers.
5. Computer-Aided Human Centric Cyber Situation Awareness.
6. Goalkeeper: Comprehensive process enforcement from the hypervisor.
7. T-Chain: A General Incentive Scheme for Cooperative Computing.
8. EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
9. T-Chain: A General Incentive Scheme for Cooperative Computing.
10. Traceback and Anonymity
11. AntiLiar: Defending against cheating attacks in mesh based streaming.
12. Adaptive neighbor management for cooperative P2P video-on-demand streaming.
13. Defending against Sybil Nodes in BitTorrent.
14. Deriving common malware behavior through graph clustering.
15. Highly available component sharing in large-scale multi-tenant cloud systems.
16. AntiBot: Clustering Common Semantic Patterns for Bot Detection.
17. How the Public Views Strategies Designed to Reduce the Threat of Botnets.
18. Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks.
19. Identification of Bot Commands by Run-Time Execution Monitoring.
20. Bluetooth Network-Based Misuse Detection.
21. Strategic deployment of network monitors for attack attribution.
22. Tracing Traffic through Intermediate Hosts that Repacketize Flows.
23. MetaAware: Identifying Metamorphic Malware.
24. Analyzing network traffic to detect self-decrypting exploit code.
25. A k-anonymous communication protocol for overlay networks.
26. On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.
27. Secure Address Auto-con.guration for Mobile Ad Hoc Networks.
28. Self-Stabilizing Structured Ring Topology P2P Systems.
29. Defending against Sybil Attacks in Sensor Networks.
30. Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets.
31. Network Access Control for Mobile Ad-Hoc Networks.
32. Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems.
33. Certificate Recommendations to Improve the Robustness of Web of Trust.
34. Storage-Efficient Stateless Group Key Revocation.
35. Reasoning About Complementary Intrusion Evidence.
36. Improving Robustness of PGP Keyrings by Conflict Detection.
37. Explicit proactive handoff with motion prediction for mobile IP.
38. Capacity planning of DiffServ networks with best-effort and expedited forwarding traffic.
39. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
40. Deriving common malware behavior through graph clustering.
41. The Economic Impact of Network Pricing Intervals.
42. Analyzing Intensive Intrusion Alerts via Correlation.
43. Constructing attack scenarios through correlation of intrusion alerts.
44. Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
45. Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets.
46. Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
47. Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion.
48. Winnowing: Protecting P2P systems against pollution through cooperative index filtering.
49. Interval-based flow watermarking for tracing interactive traffic.
50. A Simple Refinement of Slow-Start of TCP Congestion Control.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.