2007 | ||
---|---|---|
50 | EE | Qinghua Zhang, Douglas S. Reeves: MetaAware: Identifying Metamorphic Malware. ACSAC 2007: 411-420 |
49 | EE | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer: Analyzing network traffic to detect self-decrypting exploit code. ASIACCS 2007: 4-12 |
48 | EE | Pan Wang, Peng Ning, Douglas S. Reeves: A k-anonymous communication protocol for overlay networks. ASIACCS 2007: 45-56 |
47 | EE | Young June Pyun, Douglas S. Reeves: Strategic deployment of network monitors for attack attribution. BROADNETS 2007: 525-534 |
46 | EE | Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning: Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642 |
2006 | ||
45 | EE | Pai Peng, Peng Ning, Douglas S. Reeves: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. IEEE Symposium on Security and Privacy 2006: 334-349 |
2005 | ||
44 | EE | Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang: Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113 |
43 | EE | Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning: Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191 |
42 | EE | Pan Wang, Peng Ning, Douglas S. Reeves: Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362 |
41 | EE | Pan Wang, Douglas S. Reeves, Peng Ning: Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522 |
40 | EE | Ayman Shaker, Douglas S. Reeves: Self-Stabilizing Structured Ring Topology P2P Systems. Peer-to-Peer Computing 2005: 39-46 |
2004 | ||
39 | EE | Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves: Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48 |
38 | EE | Qinglin Jiang, Douglas S. Reeves, Peng Ning: Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207 |
37 | EE | Pan Wang, Peng Ning, Douglas S. Reeves: Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38 |
36 | EE | Qinglin Jiang, Douglas S. Reeves, Peng Ning: Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303 |
35 | EE | Young June Pyun, Douglas S. Reeves: Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems. Peer-to-Peer Computing 2004: 210-218 |
34 | EE | Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004) |
33 | EE | Errin W. Fulp, Douglas S. Reeves: Bandwidth provisioning and pricing for networks with multiple classes of service. Computer Networks 46(1): 41-52 (2004) |
32 | EE | Kehang Wu, Douglas S. Reeves: Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic. Telecommunication Systems 25(3-4): 193-207 (2004) |
2003 | ||
31 | EE | Xinyuan Wang, Douglas S. Reeves: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. ACM Conference on Computer and Communications Security 2003: 20-29 |
30 | EE | Xiaoyong Wu, Vinay A. Mahadik, Douglas S. Reeves: A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. DISCEX (2) 2003: 277- |
2002 | ||
29 | EE | Peng Ning, Yun Cui, Douglas S. Reeves: Constructing attack scenarios through correlation of intrusion alerts. ACM Conference on Computer and Communications Security 2002: 245-254 |
28 | EE | Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu: Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ESORICS 2002: 244-263 |
27 | EE | Errin W. Fulp, Douglas S. Reeves: The Economic Impact of Network Pricing Intervals. QofIS 2002: 315-324 |
26 | EE | Peng Ning, Yun Cui, Douglas S. Reeves: Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94 |
2001 | ||
25 | Errin W. Fulp, Douglas S. Reeves: Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion. GI Jahrestagung (1) 2001: 144-150 | |
24 | EE | Errin W. Fulp, Douglas S. Reeves: Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets. ICN (1) 2001: 409-418 |
23 | Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill: Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384 | |
22 | T. P. Kelly, Douglas S. Reeves: Optimal Web cache sizing: scalable methods for exact solutions. Computer Communications 24(2): 163-173 (2001) | |
2000 | ||
21 | EE | Haining Wang, Kang G. Shin, Hongjie Xin, Douglas S. Reeves: A Simple Refinement of Slow-Start of TCP Congestion Control. ISCC 2000: 98-105 |
20 | EE | Errin W. Fulp, Douglas S. Reeves: QoS Rewards and Risks: A Multi-market Approach to Resource Allocation. NETWORKING 2000: 945-956 |
19 | EE | Winser E. Alexander, Douglas S. Reeves, Clay S. Gloster Jr.: Parallel image processin gwith the block data paralel architecture. IBM Journal of Research and Development 44(5): 681-702 (2000) |
18 | EE | Douglas S. Reeves, Hussein F. Salama: A distributed algorithm for delay-constrained unicast routing. IEEE/ACM Trans. Netw. 8(2): 239-250 (2000) |
1999 | ||
17 | EE | Michael R. Izquierdo, Douglas S. Reeves: A Survey of Statistical Source Models for Variable-bit-rate Compressed Video. Multimedia Syst. 7(3): 199-213 (1999) |
1998 | ||
16 | EE | Errin W. Fulp, Douglas S. Reeves: Distributed Network Flow Control based on Dynamic Competitive Markets. ICNP 1998: 119-128 |
1997 | ||
15 | EE | Errin W. Fulp, Douglas S. Reeves: On-line Dynamic Bandwidth Allocation. ICNP 1997: 134-141 |
14 | Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis: A Distributed Algorithm for Delay-Constrained Unicast Routing. INFOCOM 1997: 84-91 | |
13 | EE | Douglas S. Reeves: A course on multimedia technology for computer science and computer engineering students. SIGCSE 1997: 174-178 |
12 | Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis: Evaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks. IEEE Journal on Selected Areas in Communications 15(3): 332-345 (1997) | |
1995 | ||
11 | Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis, Tsang-Ling Sheu: Evaluation of multicast routing algorithms for real-time communication on high-speed networks. HPN 1995: 27-42 | |
10 | EE | Sanjeev Rampal, Douglas S. Reeves: Routing and admission control algorithms for multimedia traffic. Computer Communications 18(10): 755-768 (1995) |
1994 | ||
9 | Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal: An Evalutaion of Routing and Admission Control Algorithms for Real-Time Traffic in Packet-Switched Networks. HPN 1994: 79-93 | |
8 | Sean Alexandre, Winser E. Alexander, Douglas S. Reeves: A Programmable Simulator for Analyzing the Block Data Flow Architecture. MASCOTS 1994: 399-400 | |
7 | Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal: End-to-end guaranteed QoS with statistical multiplexing for ATM networks. Modelling and Evaluation of ATM Networks 1994: 485-497 | |
6 | EE | Douglas S. Reeves, Edward F. Gehringer: Adaptive Routing for Hypercube Multiprocessors: a Performance Study. International Journal of High Speed Computing 6(1): 1-29 (1994) |
1992 | ||
5 | Mladen A. Vouk, Douglas S. Reeves, Cherri M. Pancake: Proceedings of the 30th Annual Southeast Regional Conference, 1992, Raleigh, North Carolina, USA, April 8-10, 1992 ACM 1992 | |
1991 | ||
4 | Markus Siegle, Douglas S. Reeves, Krzysztof Kozminski: The Interlocking Bus Network for Fault-Tolerant Processor Arrays. Fault-Tolerant Computing Systems 1991: 348-359 | |
1990 | ||
3 | EE | A. A. Fennisi, Douglas S. Reeves: Using the stuck-at fault model: how well does it work? ACM Southeast Regional Conference 1990: 40-46 |
2 | EE | Matt Melton, Tan Phan, Douglas S. Reeves, David E. van den Bout: VLSI Implementation of TInMANN. NIPS 1990: 1046-1052 |
1987 | ||
1 | EE | Douglas S. Reeves, Mary Jane Irwin: Fast Methods for Switch-Level Verification of MOS Circuits. IEEE Trans. on CAD of Integrated Circuits and Systems 6(5): 766-779 (1987) |