2007 |
50 | EE | Qinghua Zhang,
Douglas S. Reeves:
MetaAware: Identifying Metamorphic Malware.
ACSAC 2007: 411-420 |
49 | EE | Qinghua Zhang,
Douglas S. Reeves,
Peng Ning,
S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code.
ASIACCS 2007: 4-12 |
48 | EE | Pan Wang,
Peng Ning,
Douglas S. Reeves:
A k-anonymous communication protocol for overlay networks.
ASIACCS 2007: 45-56 |
47 | EE | Young June Pyun,
Douglas S. Reeves:
Strategic deployment of network monitors for attack attribution.
BROADNETS 2007: 525-534 |
46 | EE | Young June Pyun,
Young Hee Park,
Xinyuan Wang,
Douglas S. Reeves,
Peng Ning:
Tracing Traffic through Intermediate Hosts that Repacketize Flows.
INFOCOM 2007: 634-642 |
2006 |
45 | EE | Pai Peng,
Peng Ning,
Douglas S. Reeves:
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.
IEEE Symposium on Security and Privacy 2006: 334-349 |
2005 |
44 | EE | Pai Peng,
Peng Ning,
Douglas S. Reeves,
Xinyuan Wang:
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets.
ICDCS Workshops 2005: 107-113 |
43 | EE | Qinghua Zhang,
Pan Wang,
Douglas S. Reeves,
Peng Ning:
Defending against Sybil Attacks in Sensor Networks.
ICDCS Workshops 2005: 185-191 |
42 | EE | Pan Wang,
Peng Ning,
Douglas S. Reeves:
Network Access Control for Mobile Ad-Hoc Networks.
ICICS 2005: 350-362 |
41 | EE | Pan Wang,
Douglas S. Reeves,
Peng Ning:
Secure Address Auto-con.guration for Mobile Ad Hoc Networks.
MobiQuitous 2005: 519-522 |
40 | EE | Ayman Shaker,
Douglas S. Reeves:
Self-Stabilizing Structured Ring Topology P2P Systems.
Peer-to-Peer Computing 2005: 39-46 |
2004 |
39 | EE | Yan Zhai,
Peng Ning,
Purush Iyer,
Douglas S. Reeves:
Reasoning About Complementary Intrusion Evidence.
ACSAC 2004: 39-48 |
38 | EE | Qinglin Jiang,
Douglas S. Reeves,
Peng Ning:
Improving Robustness of PGP Keyrings by Conflict Detection.
CT-RSA 2004: 194-207 |
37 | EE | Pan Wang,
Peng Ning,
Douglas S. Reeves:
Storage-Efficient Stateless Group Key Revocation.
ISC 2004: 25-38 |
36 | EE | Qinglin Jiang,
Douglas S. Reeves,
Peng Ning:
Certificate Recommendations to Improve the Robustness of Web of Trust.
ISC 2004: 292-303 |
35 | EE | Young June Pyun,
Douglas S. Reeves:
Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems.
Peer-to-Peer Computing 2004: 210-218 |
34 | EE | Peng Ning,
Yun Cui,
Douglas S. Reeves,
Dingbang Xu:
Techniques and tools for analyzing intrusion alerts.
ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004) |
33 | EE | Errin W. Fulp,
Douglas S. Reeves:
Bandwidth provisioning and pricing for networks with multiple classes of service.
Computer Networks 46(1): 41-52 (2004) |
32 | EE | Kehang Wu,
Douglas S. Reeves:
Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic.
Telecommunication Systems 25(3-4): 193-207 (2004) |
2003 |
31 | EE | Xinyuan Wang,
Douglas S. Reeves:
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
ACM Conference on Computer and Communications Security 2003: 20-29 |
30 | EE | Xiaoyong Wu,
Vinay A. Mahadik,
Douglas S. Reeves:
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks.
DISCEX (2) 2003: 277- |
2002 |
29 | EE | Peng Ning,
Yun Cui,
Douglas S. Reeves:
Constructing attack scenarios through correlation of intrusion alerts.
ACM Conference on Computer and Communications Security 2002: 245-254 |
28 | EE | Xinyuan Wang,
Douglas S. Reeves,
Shyhtsun Felix Wu:
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
ESORICS 2002: 244-263 |
27 | EE | Errin W. Fulp,
Douglas S. Reeves:
The Economic Impact of Network Pricing Intervals.
QofIS 2002: 315-324 |
26 | EE | Peng Ning,
Yun Cui,
Douglas S. Reeves:
Analyzing Intensive Intrusion Alerts via Correlation.
RAID 2002: 74-94 |
2001 |
25 | | Errin W. Fulp,
Douglas S. Reeves:
Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion.
GI Jahrestagung (1) 2001: 144-150 |
24 | EE | Errin W. Fulp,
Douglas S. Reeves:
Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets.
ICN (1) 2001: 409-418 |
23 | | Xinyuan Wang,
Douglas S. Reeves,
Shyhtsun Felix Wu,
Jim Yuill:
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
SEC 2001: 369-384 |
22 | | T. P. Kelly,
Douglas S. Reeves:
Optimal Web cache sizing: scalable methods for exact solutions.
Computer Communications 24(2): 163-173 (2001) |
2000 |
21 | EE | Haining Wang,
Kang G. Shin,
Hongjie Xin,
Douglas S. Reeves:
A Simple Refinement of Slow-Start of TCP Congestion Control.
ISCC 2000: 98-105 |
20 | EE | Errin W. Fulp,
Douglas S. Reeves:
QoS Rewards and Risks: A Multi-market Approach to Resource Allocation.
NETWORKING 2000: 945-956 |
19 | EE | Winser E. Alexander,
Douglas S. Reeves,
Clay S. Gloster Jr.:
Parallel image processin gwith the block data paralel architecture.
IBM Journal of Research and Development 44(5): 681-702 (2000) |
18 | EE | Douglas S. Reeves,
Hussein F. Salama:
A distributed algorithm for delay-constrained unicast routing.
IEEE/ACM Trans. Netw. 8(2): 239-250 (2000) |
1999 |
17 | EE | Michael R. Izquierdo,
Douglas S. Reeves:
A Survey of Statistical Source Models for Variable-bit-rate Compressed Video.
Multimedia Syst. 7(3): 199-213 (1999) |
1998 |
16 | EE | Errin W. Fulp,
Douglas S. Reeves:
Distributed Network Flow Control based on Dynamic Competitive Markets.
ICNP 1998: 119-128 |
1997 |
15 | EE | Errin W. Fulp,
Douglas S. Reeves:
On-line Dynamic Bandwidth Allocation.
ICNP 1997: 134-141 |
14 | | Hussein F. Salama,
Douglas S. Reeves,
Yannis Viniotis:
A Distributed Algorithm for Delay-Constrained Unicast Routing.
INFOCOM 1997: 84-91 |
13 | EE | Douglas S. Reeves:
A course on multimedia technology for computer science and computer engineering students.
SIGCSE 1997: 174-178 |
12 | | Hussein F. Salama,
Douglas S. Reeves,
Yannis Viniotis:
Evaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks.
IEEE Journal on Selected Areas in Communications 15(3): 332-345 (1997) |
1995 |
11 | | Hussein F. Salama,
Douglas S. Reeves,
Yannis Viniotis,
Tsang-Ling Sheu:
Evaluation of multicast routing algorithms for real-time communication on high-speed networks.
HPN 1995: 27-42 |
10 | EE | Sanjeev Rampal,
Douglas S. Reeves:
Routing and admission control algorithms for multimedia traffic.
Computer Communications 18(10): 755-768 (1995) |
1994 |
9 | | Sanjeev Rampal,
Douglas S. Reeves,
Dharma P. Agrawal:
An Evalutaion of Routing and Admission Control Algorithms for Real-Time Traffic in Packet-Switched Networks.
HPN 1994: 79-93 |
8 | | Sean Alexandre,
Winser E. Alexander,
Douglas S. Reeves:
A Programmable Simulator for Analyzing the Block Data Flow Architecture.
MASCOTS 1994: 399-400 |
7 | | Sanjeev Rampal,
Douglas S. Reeves,
Dharma P. Agrawal:
End-to-end guaranteed QoS with statistical multiplexing for ATM networks.
Modelling and Evaluation of ATM Networks 1994: 485-497 |
6 | EE | Douglas S. Reeves,
Edward F. Gehringer:
Adaptive Routing for Hypercube Multiprocessors: a Performance Study.
International Journal of High Speed Computing 6(1): 1-29 (1994) |
1992 |
5 | | Mladen A. Vouk,
Douglas S. Reeves,
Cherri M. Pancake:
Proceedings of the 30th Annual Southeast Regional Conference, 1992, Raleigh, North Carolina, USA, April 8-10, 1992
ACM 1992 |
1991 |
4 | | Markus Siegle,
Douglas S. Reeves,
Krzysztof Kozminski:
The Interlocking Bus Network for Fault-Tolerant Processor Arrays.
Fault-Tolerant Computing Systems 1991: 348-359 |
1990 |
3 | EE | A. A. Fennisi,
Douglas S. Reeves:
Using the stuck-at fault model: how well does it work?
ACM Southeast Regional Conference 1990: 40-46 |
2 | EE | Matt Melton,
Tan Phan,
Douglas S. Reeves,
David E. van den Bout:
VLSI Implementation of TInMANN.
NIPS 1990: 1046-1052 |
1987 |
1 | EE | Douglas S. Reeves,
Mary Jane Irwin:
Fast Methods for Switch-Level Verification of MOS Circuits.
IEEE Trans. on CAD of Integrated Circuits and Systems 6(5): 766-779 (1987) |