dblp.uni-trier.dewww.uni-trier.de

Kevin A. Kwiat

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
31EEShangping Ren, Kevin A. Kwiat: A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. ARES 2008: 1180-1187
30EEKaliappa Nadar Ravindran, Jiang Wu, Kevin A. Kwiat, Ali Sabbir: Adaptive Voting Algorithms for Reliable Dissemintation of Data in Sensor Networks. ARES 2008: 1234-1239
29EEKaliappa Nadar Ravindran, Jiang Wu, Mohammad Rabby, Kevin A. Kwiat, Ali Sabbir: Performance engineering of replica voting protocols for high assurance data collection systems. COMSWARE 2008: 424-433
28EEKun Xiao, Shangping Ren, Kevin A. Kwiat: Retrofitting Cyber Physical Systems for Survivability through External Coordination. HICSS 2008: 465
2007
27EEVidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat: QoS-LI: QoS Loss Inference in Disadvantaged Networks. AINA Workshops (2) 2007: 524-529
26EEKaliappa Nadar Ravindran, Kevin A. Kwiat: A Middleware Architecture for Replica Voting on Fuzzy Data in Dependable Real-time Systems. COMSWARE 2007
25EEAli Sabbir, K. Ravindran, Kevin A. Kwiat: Secure Distributed Agreement Protocols for Information Assurance Applications. COMSWARE 2007
24EEYue Yu, Shangping Ren, Kevin A. Kwiat: Take Intelligent Risk and Optimize Decision Based on Time, Available Resources and Risk Tolerance Limits. IEEE Real-Time and Embedded Technology and Applications Symposium 2007: 315-325
23EEShangping Ren, Yue Yu, Kevin A. Kwiat, Jeffrey J. P. Tsai: A Coordination Model for Improving Software System Attack-Tolerance and Survivability in Open Hostile Environments. IJDSN 3(2): 175-199 (2007)
22EEShangping Ren, Yue Yu, Nianen Chen, Jeffrey J. P. Tsai, Kevin A. Kwiat: The role of roles in supporting reconfigurability and fault localizations for open distributed and embedded systems. TAAS 2(3): (2007)
2006
21EEAshish Garg, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat: USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems. Annual Simulation Symposium 2006: 196-203
20 Kaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir, Bei Cao: Replica voting: A distributed middleware service for real-time dependable systems. COMSWARE 2006
19EEKevin A. Kwiat, Shangping Ren: A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. SUTC (1) 2006: 394-402
18EEJiang Wu, Kaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat: Engineering of Replica Voting Protocols for Energy-Efficiency in Data Delivery. WOWMOM 2006: 456-458
17EEJianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, Kevin A. Kwiat: Effective worm detection for various scan techniques. Journal of Computer Security 14(4): 359-387 (2006)
2005
16EEKaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat: Timed Publish-Subscribe Coomunication for Distributed Embedded Systems. DS-RT 2005: 290-297
15EEKaliappa Nadar Ravindran, Kevin A. Kwiat, G. Ding: Simulation-Based Validation of Protocols for Distributed Systems. HICSS 2005
14EEKevin A. Kwiat, Kaliappa Nadar Ravindran, P. Hurley: Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems. WOWMOM 2005: 153-162
2004
13EEKaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir: Adapting Distributed Voting Algorithms for Secure Real-Time Embedded Systems. ICDCS Workshops 2004: 347-353
12EEKaliappa Nadar Ravindran, Ali Sabbir, Kevin A. Kwiat: Incorporating Timeliness in Atomic Write of Shared Data for Distributed Embedded Systems. ICDCS Workshops 2004: 884-889
11EEJiang Wu, Sarma Vangala, Lixin Gao, Kevin A. Kwiat: An Effective Architecture and Algorithm for Detecting Worms with Various Scan. NDSS 2004
2003
10EEZesheng Chen, Lixin Gao, Kevin A. Kwiat: Modeling the Spread of Active Worms. INFOCOM 2003
9EERamkumar Chinchani, Shambhu J. Upadhyaya, Kevin A. Kwiat: A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors. IWIA 2003: 25-36
2002
8EEKevin A. Kwiat: Using Markets to Engineer Resource Management for the Information Grid. Information Systems Frontiers 4(1): 55-62 (2002)
2001
7EEKevin A. Kwiat: Can Reliability and Security be Joined Reliably and Securely?. SRDS 2001: 72-73
6EEShambhu J. Upadhyaya, Ramkumar Chinchani, Kevin A. Kwiat: An Analytical Framework for Reasoning about Intrusions. SRDS 2001: 99-
2000
5EEKevin A. Kwiat: Engineering Resource Management for the Information Grid and the Emerging Role of E-Commerce. AIWoRC 2000: 319-324
4EEBen Hardekopf, Kevin A. Kwiat: Exploiting the Overlap of Security and Fault-Tolerance. AIWoRC 2000: 361-366
1996
3EEKevin A. Kwiat, Warren Debany, Salim Hariri: Software Fault Tolerance Using Dynamically Reconfigurable FPGAs. Great Lakes Symposium on VLSI 1996: 39-
1993
2EEWarren H. Debany Jr., Kevin A. Kwiat, Sami A. Al-Arian: A Method for Consistent Fault Coverage Reporting. IEEE Design & Test of Computers 10(3): 68-79 (1993)
1988
1 Sami A. Al-Arian, Kevin A. Kwiat: Defining a Standard for Fault Simulator Evaluation. ITC 1988: 1001

Coauthor Index

1Sami A. Al-Arian [1] [2]
2Bei Cao [20]
3Nianen Chen [22]
4Zesheng Chen [10]
5Ramkumar Chinchani [6] [9]
6Warren Debany [3]
7Warren H. Debany Jr. [2]
8G. Ding [15]
9Lixin Gao [10] [11] [17]
10Ashish Garg [21]
11Ben Hardekopf [4]
12Salim Hariri [3]
13P. Hurley [14]
14Mohammad Rabby [29]
15K. Ravindran [25]
16Kaliappa Nadar Ravindran [12] [13] [14] [15] [16] [18] [20] [26] [29] [30]
17Shangping Ren [19] [22] [23] [24] [28] [31]
18Ali Sabbir [12] [13] [16] [18] [20] [25] [29] [30]
19Vidyaraman Sankaranarayanan [21] [27]
20Jeffrey J. P. Tsai [22] [23]
21Shambhu J. Upadhyaya [6] [9] [21] [27]
22Sarma Vangala [11] [17]
23Jiang Wu [11] [17] [18] [29] [30]
24Jianhong Xia [17]
25Kun Xiao [28]
26Yue Yu [22] [23] [24]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)