William Yurcik

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

81 Spyros Antonatos, Michele Bezzi, Elisa Boschi, Brian Trammell, William Yurcik: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
80 Yongdae Kim, William Yurcik: Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
79EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. ARES 2008: 237-244
78EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. Financial Cryptography 2008: 323-324
77EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: The SCRUB security data sharing infrastructure. NOMS 2008: 630-644
76EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. NOMS 2008: 991-994
75EERamona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey: Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. CHI 2007: 1205
74EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs CoRR abs/0710.3979: (2007)
73EEWilliam Yurcik, Ramona Su Thompson, Michael B. Twidale, Esa M. Rantanen: If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. Interactions 14(1): 12-14 (2007)
72 William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh: 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 3 November 2006, Alexandria, Virginia, USA ACM 2006
71EEMatthew Smith, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik: Security Issues in On-Demand Grid and Cluster Computing. CCGRID 2006: 24
70EENadir Kiyanclar, Gregory A. Koenig, William Yurcik: Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing. CCGRID 2006: 28
69EEDmitry Mogilevsky, Gregory A. Koenig, William Yurcik: Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters. CCGRID 2006: 30
68EECharis Ermopoulos, William Yurcik: NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. CLUSTER 2006
67EEAdam J. Slagell, Rafael Bonilla, William Yurcik: A survey of PKI components and scalability issues. IPCCC 2006
66EEZahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell: Multiple design patterns for voice over IP (VoIP) security. IPCCC 2006
65EEXiaoxin Yin, William Yurcik, Adam J. Slagell: VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. SEC 2006: 284-295
64EERagib Hasan, William Yurcik: A statistical analysis of disclosed storage security breaches. StorageSS 2006: 1-8
63EEWilliam Yurcik: Tool update: visflowconnect-IP with advanced filtering from usability testing. VizSEC 2006: 63-64
62EEWilliam Yurcik: Tool update: NVisionIP improvements (difference view, sparklines, and shapes). VizSEC 2006: 65-66
61EERuperto P. Majuca, William Yurcik, Jay P. Kesan: The Evolution of Cyberinsurance CoRR abs/cs/0601020: (2006)
60EEKatherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam J. Slagell: SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting CoRR abs/cs/0601079: (2006)
59EEGregory Pluta, Larry Brumbaugh, William Yurcik: Using SMART for Customized Monitoring of Windows Services CoRR abs/cs/0603114: (2006)
58EECharis Ermopoulos, William Yurcik: NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security) CoRR abs/cs/0606089: (2006)
57EEWilliam Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan: UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs CoRR abs/cs/0607111: (2006)
56EEAashish Sharma, William Yurcik: Security Assessment of E-Tax Filing Websites CoRR abs/cs/0608034: (2006)
55 Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005
54 Kwan-Liu Ma, Stephen C. North, William Yurcik: IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA IEEE Computer Society 2005
53EEWilliam Yurcik, Chao Liu: A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. CCGRID 2005: 111-120
52EEGregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik: Cluster security with NVisionCC: process monitoring by leveraging emergent properties. CCGRID 2005: 121-132
51EEAdam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik: Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. CCGRID 2005: 146-151
50EEMakan Pourzandi, David Gordon, William Yurcik, Gregory A. Koenig: Clusters and security: distributed security for distributed systems. CCGRID 2005: 96-104
49EECristina Abad, Indranil Gupta, William Yurcik: Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. ICDCS Workshops 2005: 5-11
48EERagib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, Roy H. Campbell: A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. ITCC (2) 2005: 205-213
47 Xiaoxin Yin, William Yurcik, Adam J. Slagell: The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. IWIA 2005: 141-153
46EEZahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, Roy H. Campbell: A First Step Towards Call Survivability in Cellular Networks. LCN 2005: 501-502
45EEWilliam Yurcik: Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. LISA 2005: 169-176
44EEJoseph Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, William Yurcik: Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. MSST 2005: 329-340
43EEZahid Anwar, Jalal Al-Muhtadi, William Yurcik, Roy H. Campbell: Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment. MobiQuitous 2005: 192-201
42EERagib Hasan, William Yurcik, Suvda Myagmar: The evolution of storage service providers: techniques and challenges to outsourcing storage. StorageSS 2005: 1-8
41EERagib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik: Toward a threat model for storage systems. StorageSS 2005: 94-102
40EEKiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North: Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. VizSEC 2005: 9
39EEWen Ding, William Yurcik, Xiaoxin Yin: Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. WINE 2005: 947-958
38EEWen Ding, William Yurcik: A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market CoRR abs/cs/0506038: (2005)
37EEZahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indranil Gupta, Roy H. Campbell: Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut CoRR abs/cs/0509095: (2005)
36EEDmitry Mogilevsky, Adam J. Lee, William Yurcik: Defining a Comprehensive Threat Model for High Performance Computational Clusters CoRR abs/cs/0510046: (2005)
35 Carla E. Brodley, Philip Chan, Richard Lippman, William Yurcik: Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 29 October 2004, Washington DC, USA ACM 2004
34EEWilliam Yurcik: Visualization Tools for Security Administrators. Financial Cryptography 2004: 112-113
33 Aashish Sharma, William Yurcik: An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003. ICETE (2) 2004: 257-262
32EEGregory Pluta, Larry Brumbaugh, William Yurcik: BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments. LCN 2004: 394-395
31EEWilliam Yurcik, Xin Meng, Gregory A. Koenig: A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept. LCN 2004: 427-428
30EEGregory Pluta, Larry Brumbaugh, William Yurcik, Joseph Tucek: Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. LISA 2004: 177-186
29EEAhmed Sobeih, William Yurcik, Jennifer C. Hou: VRing: A Case for Building Application-Layer Multicast Rings (Rather Than Trees). MASCOTS 2004: 437-446
28EEKiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee: NVisionIP: an interactive network flow visualization tool for security. SMC (3) 2004: 2675-2680
27EEWilliam Yurcik, Xin Meng, Nadir Kiyanclar: NVisionCC: a visualization framework for high performance cluster security. VizSEC 2004: 133-137
26EEXiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju: VisFlowConnect: netflow visualizations of link relationships for security situational awareness. VizSEC 2004: 26-34
25EEKiran Lakkaraju, William Yurcik, Adam J. Lee: NVisionIP: netflow visualizations of system state for security situational awareness. VizSEC 2004: 65-72
24EEMichael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik: A Distributed Economics-based Infrastructure for Utility Computing CoRR abs/cs/0412121: (2004)
23EEAdam J. Slagell, William Yurcik: Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization CoRR cs.CR/0409005: (2004)
22EECristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe: Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-265
21EECarlos Iván Chesñevar, Maria Laura Cobo, William Yurcik: Using theoretical computer simulators for formal languages and automata theory. SIGCSE Bulletin 35(2): 33-37 (2003)
20EEWilliam Yurcik: Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept. LCN 2002: 134-135
19EEGregory S. Wolffe, William Yurcik, Hugh Osborne, Mark A. Holliday: Teaching computer organization/architecture with limited resources using simulators. SIGCSE 2002: 176-180
18 William Yurcik: Special issue on specialized computer architecture simulators that see the present and may hold the future. ACM Journal of Educational Resources in Computing 2(1): 1-3 (2002)
17EEAlexander Gubin, William Yurcik, Larry Brumbaugh: PingTV: A Case Study in Visual Network Monitoring. IEEE Visualization 2001
16EEMary Grzywa, Ajit Dharmik, William Yurcik, Larry Brumbaugh: Application-Level Survivable Software: rFTP Proof-of-Concept . LCN 2001: 203-205
15EEAlexander Gubin, William Yurcik, Larry Brumbaugh: Network Management Visualization with PingTV. LCN 2001: 62-65
14EEWilliam Yurcik, Larry Brumbaugh: A web-based little man computer simulator. SIGCSE 2001: 204-208
13EEWilliam Yurcik, Hugh Osborne: A crowd of little man computers: visual computer simulator teaching tools. Winter Simulation Conference 2001: 1632-1639
12 William Yurcik: Editorial. ACM Journal of Educational Resources in Computing 1(4): 1-3 (2001)
11 Cecile Yehezkel, William Yurcik, Murray Pearson, Dean Armstrong: Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim. ACM Journal of Educational Resources in Computing 1(4): 60-80 (2001)
10EEWilliam Yurcik, David Doss: Internet Attacks: A Policy Framework for Rules of Engagement CoRR cs.CY/0109078: (2001)
9EEWilliam Yurcik, David Doss: Achieving Fault-Tolerant Software with Rejuvenation and Reconfiguration. IEEE Software 18(4): 48-52 (2001)
8EELillian (Boots) Cassel, Mark A. Holliday, Deepak Kumar, John Impagliazzo, Kevin Bolding, Murray Pearson, Jim Davies, Gregory S. Wolffe, William Yurcik: Distributed expertise for teaching computer organization & architecture. SIGCSE Bulletin 33(2): 111-126 (2001)
7EESamuel Patton, David Doss, William Yurcik: Open Source Versus Commercial Firewalls: Functional Comparison. LCN 2000: 223-224
6EESamuel Patton, Bryan Smith, David Doss, William Yurcik: A Virtual Private Network Deployment Framework. LCN 2000: 225-
5EESamuel Patton, David Doss, William Yurcik: Distributed Weakness in Virtual Private Networks. LCN 2000: 96-
4 William Yurcik, David Tipper, Deep Medhi: The use of hop-limits to provide survivable ATM group communications. Networked Group Communication 2000: 131-140
3EEWilliam Yurcik, David Tipper: A survivability framework for connection-oriented group communications. PRDC 2000: 53-58
2 William Yurcik: Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings. Networked Group Communication 1999: 235-243
1EEWilliam Yurcik: Providing ATM Multipoint Survivability Via Disjoint VC Mesh Backup Groups. ICCCN 1998: 129-139

Coauthor Index

1Cristina Abad [22] [49] [57]
2Jalal Al-Muhtadi [43]
3Spyros Antonatos [81]
4Zahid Anwar [37] [43] [46] [48] [66]
5Dean Armstrong [11]
6Vijayalakshmi Atluri (Vijay Atluri) [55]
7Stefan Axelsson [72]
8Brian P. Bailey [75]
9Salman Baset [46]
10Ratna Bearavolu [28] [40]
11Michele Bezzi [81]
12Kevin Bolding [8]
13Rafael Bonilla [67]
14Elisa Boschi [81]
15Carla E. Brodley [35]
16Larry Brumbaugh [14] [15] [16] [17] [30] [32] [44] [48] [55] [59]
17Roy H. Campbell [37] [43] [46] [48] [66]
18Lillian N. Cassel (Lillian (Boots) Cassel) [8]
19Philip Chan [35]
20Carlos Iván Chesñevar [21]
21Maria Laura Cobo [21]
22Jim Davies [8]
23Ajit Dharmik [16]
24Wen Ding [38] [39]
25David Doss [5] [6] [7] [9] [10]
26Michael Engel [71]
27Charis Ermopoulos [58] [60] [68]
28Bernd Freisleben [71]
29Thomas Friese [71]
30David Gordon [50]
31Mary Grzywa [16]
32Alexander Gubin [15] [17]
33Indranil Gupta [37] [49]
34Munawar Hafiz [66]
35Ragib Hasan [41] [42] [44] [48] [57] [64]
36Elizabeth Haubert [44]
37Greg Hellings [74] [76] [77] [78] [79]
38Mark A. Holliday [8] [19]
39Jennifer C. Hou (Chao-Ju Hou) [29]
40John Impagliazzo [8]
41Ralph E. Johnson [66]
42Jay P. Kesan [61]
43Latifur Khan [74] [76] [77] [78] [79]
44Yongdae Kim [80]
45Nadir Kiyanclar [24] [27] [52] [70]
46Gregory A. Koenig [24] [31] [50] [51] [52] [69] [70] [71]
47Deepak Kumar [8]
48Kiran Lakkaraju [25] [26] [28] [40] [72]
49Adam J. Lee [25] [28] [36] [41] [51] [52]
50Yifan Li [26] [60]
51Richard Lippman [35]
52Chao Liu [53]
53Katherine Luo [60]
54Kwan-Liu Ma [54]
55Ruperto P. Majuca [61]
56Deep Medhi (D. Medhi) [4]
57Xin Meng [27] [31] [51] [52]
58Dmitry Mogilevsky [36] [69]
59Suvda Myagmar [41] [42]
60Stephen C. North [40] [54]
61Hugh Osborne [13] [19]
62Vivek Pandey [37]
63Samuel Patton [5] [6] [7]
64Murray Pearson [8] [11]
65Gregory Pluta [30] [32] [59]
66Makan Pourzandi [50]
67Esa M. Rantanen [73] [75]
68Kenneth E. Rowe [22]
69Moazzam Saleem [57]
70Pierangela Samarati [55]
71Henning Schulzrinne [46]
72Cigdem Sengul [22]
73Asim Shankar [37]
74Aashish Sharma [33] [56]
75Adam J. Slagell [23] [40] [47] [60] [65] [67]
76Bryan Smith [6]
77Matthew Smith [71]
78Ahmed Sobeih [29]
79Shyama Sridharan [57]
80Paul Stanton [44]
81Jed Taylor [22]
82Soon Tee Teoh [72]
83Ramona Su Thompson [73] [75]
84Bhavani M. Thuraisingham [74] [76] [77] [78] [79]
85David Tipper [3] [4]
86Brian Trammell [81]
87Michael Treaster [24] [26] [52]
88Joseph Tucek [30] [44]
89Michael Twidale (Michael B. Twidale) [73]
90Gregory S. Wolffe [8] [19]
91Clay Woolam [74] [76] [77] [78] [79]
92Cecile Yehezkel [11]
93Xiaoxin Yin [26] [39] [47] [65]
94Yuanyuan Zhou [22] [55]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)