2008 |
31 | EE | Shangping Ren,
Kevin A. Kwiat:
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features.
ARES 2008: 1180-1187 |
30 | EE | Kaliappa Nadar Ravindran,
Jiang Wu,
Kevin A. Kwiat,
Ali Sabbir:
Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks.
ARES 2008: 1234-1239 |
29 | EE | Kaliappa Nadar Ravindran,
Jiang Wu,
Mohammad Rabby,
Kevin A. Kwiat,
Ali Sabbir:
Performance engineering of replica voting protocols for high assurance data collection systems.
COMSWARE 2008: 424-433 |
28 | EE | Kun Xiao,
Shangping Ren,
Kevin A. Kwiat:
Retrofitting Cyber Physical Systems for Survivability through External Coordination.
HICSS 2008: 465 |
2007 |
27 | EE | Vidyaraman Sankaranarayanan,
Shambhu J. Upadhyaya,
Kevin A. Kwiat:
QoS-LI: QoS Loss Inference in Disadvantaged Networks.
AINA Workshops (2) 2007: 524-529 |
26 | EE | Kaliappa Nadar Ravindran,
Kevin A. Kwiat:
A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems.
COMSWARE 2007 |
25 | EE | Ali Sabbir,
K. Ravindran,
Kevin A. Kwiat:
Secure Distributed Agreement Protocols for Information Assurance Applications.
COMSWARE 2007 |
24 | EE | Yue Yu,
Shangping Ren,
Kevin A. Kwiat:
Take Intelligent Risk and Optimize Decision Based on Time, Available Resources and Risk Tolerance Limits.
IEEE Real-Time and Embedded Technology and Applications Symposium 2007: 315-325 |
23 | EE | Shangping Ren,
Yue Yu,
Kevin A. Kwiat,
Jeffrey J. P. Tsai:
A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments.
IJDSN 3(2): 175-199 (2007) |
22 | EE | Shangping Ren,
Yue Yu,
Nianen Chen,
Jeffrey J. P. Tsai,
Kevin A. Kwiat:
The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems.
TAAS 2(3): (2007) |
2006 |
21 | EE | Ashish Garg,
Vidyaraman Sankaranarayanan,
Shambhu J. Upadhyaya,
Kevin A. Kwiat:
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems.
Annual Simulation Symposium 2006: 196-203 |
20 | | Kaliappa Nadar Ravindran,
Kevin A. Kwiat,
Ali Sabbir,
Bei Cao:
Replica voting: A distributed middleware service for real-time dependable systems.
COMSWARE 2006 |
19 | EE | Kevin A. Kwiat,
Shangping Ren:
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments.
SUTC (1) 2006: 394-402 |
18 | EE | Jiang Wu,
Kaliappa Nadar Ravindran,
Ali Sabbir,
Kevin A. Kwiat:
Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery.
WOWMOM 2006: 456-458 |
17 | EE | Jianhong Xia,
Sarma Vangala,
Jiang Wu,
Lixin Gao,
Kevin A. Kwiat:
Effective worm detection for various scan techniques.
Journal of Computer Security 14(4): 359-387 (2006) |
2005 |
16 | EE | Kaliappa Nadar Ravindran,
Ali Sabbir,
Kevin A. Kwiat:
Timed Publish-Subscribe Coomunication for Distributed Embedded Systems.
DS-RT 2005: 290-297 |
15 | EE | Kaliappa Nadar Ravindran,
Kevin A. Kwiat,
G. Ding:
Simulation-Based Validation of Protocols for Distributed Systems.
HICSS 2005 |
14 | EE | Kevin A. Kwiat,
Kaliappa Nadar Ravindran,
P. Hurley:
Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems.
WOWMOM 2005: 153-162 |
2004 |
13 | EE | Kaliappa Nadar Ravindran,
Kevin A. Kwiat,
Ali Sabbir:
Adapting Distributed Voting Algorithms for Secure Real-Time Embedded Systems.
ICDCS Workshops 2004: 347-353 |
12 | EE | Kaliappa Nadar Ravindran,
Ali Sabbir,
Kevin A. Kwiat:
Incorporating Timeliness in Atomic Write of Shared Data for Distributed Embedded Systems.
ICDCS Workshops 2004: 884-889 |
11 | EE | Jiang Wu,
Sarma Vangala,
Lixin Gao,
Kevin A. Kwiat:
An Effective Architecture and Algorithm for Detecting Worms with Various Scan.
NDSS 2004 |
2003 |
10 | EE | Zesheng Chen,
Lixin Gao,
Kevin A. Kwiat:
Modeling the Spread of Active Worms.
INFOCOM 2003 |
9 | EE | Ramkumar Chinchani,
Shambhu J. Upadhyaya,
Kevin A. Kwiat:
A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
IWIA 2003: 25-36 |
2002 |
8 | EE | Kevin A. Kwiat:
Using Markets to Engineer Resource Management for the Information Grid.
Information Systems Frontiers 4(1): 55-62 (2002) |
2001 |
7 | EE | Kevin A. Kwiat:
Can Reliability and Security be Joined Reliably and Securely?.
SRDS 2001: 72-73 |
6 | EE | Shambhu J. Upadhyaya,
Ramkumar Chinchani,
Kevin A. Kwiat:
An Analytical Framework for Reasoning about Intrusions.
SRDS 2001: 99- |
2000 |
5 | EE | Kevin A. Kwiat:
Engineering Resource Management for the Information Grid and the Emerging Role of E-Commerce.
AIWoRC 2000: 319-324 |
4 | EE | Ben Hardekopf,
Kevin A. Kwiat:
Exploiting the Overlap of Security and Fault-Tolerance.
AIWoRC 2000: 361-366 |
1996 |
3 | EE | Kevin A. Kwiat,
Warren Debany,
Salim Hariri:
Software Fault Tolerance Using Dynamically Reconfigurable FPGAs.
Great Lakes Symposium on VLSI 1996: 39- |
1993 |
2 | EE | Warren H. Debany Jr.,
Kevin A. Kwiat,
Sami A. Al-Arian:
A Method for Consistent Fault Coverage Reporting.
IEEE Design & Test of Computers 10(3): 68-79 (1993) |
1988 |
1 | | Sami A. Al-Arian,
Kevin A. Kwiat:
Defining a Standard for Fault Simulator Evaluation.
ITC 1988: 1001 |