2008 |
81 | | Spyros Antonatos,
Michele Bezzi,
Elisa Boschi,
Brian Trammell,
William Yurcik:
Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008
ACM 2008 |
80 | | Yongdae Kim,
William Yurcik:
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008
ACM 2008 |
79 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case.
ARES 2008: 237-244 |
78 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
Financial Cryptography 2008: 323-324 |
77 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
The SCRUB security data sharing infrastructure.
NOMS 2008: 630-644 |
76 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data.
NOMS 2008: 991-994 |
2007 |
75 | EE | Ramona Su Thompson,
Esa M. Rantanen,
William Yurcik,
Brian P. Bailey:
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection.
CHI 2007: 1205 |
74 | EE | William Yurcik,
Clay Woolam,
Greg Hellings,
Latifur Khan,
Bhavani M. Thuraisingham:
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
CoRR abs/0710.3979: (2007) |
73 | EE | William Yurcik,
Ramona Su Thompson,
Michael B. Twidale,
Esa M. Rantanen:
If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration.
Interactions 14(1): 12-14 (2007) |
2006 |
72 | | William Yurcik,
Stefan Axelsson,
Kiran Lakkaraju,
Soon Tee Teoh:
3rd Workshop on Visualization for Computer Security (VizSEC 2006), 3 November 2006, Alexandria, Virginia, USA
ACM 2006 |
71 | EE | Matthew Smith,
Michael Engel,
Thomas Friese,
Bernd Freisleben,
Gregory A. Koenig,
William Yurcik:
Security Issues in On-Demand Grid and Cluster Computing.
CCGRID 2006: 24 |
70 | EE | Nadir Kiyanclar,
Gregory A. Koenig,
William Yurcik:
Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing.
CCGRID 2006: 28 |
69 | EE | Dmitry Mogilevsky,
Gregory A. Koenig,
William Yurcik:
Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters.
CCGRID 2006: 30 |
68 | EE | Charis Ermopoulos,
William Yurcik:
NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters.
CLUSTER 2006 |
67 | EE | Adam J. Slagell,
Rafael Bonilla,
William Yurcik:
A survey of PKI components and scalability issues.
IPCCC 2006 |
66 | EE | Zahid Anwar,
William Yurcik,
Ralph E. Johnson,
Munawar Hafiz,
Roy H. Campbell:
Multiple design patterns for voice over IP (VoIP) security.
IPCCC 2006 |
65 | EE | Xiaoxin Yin,
William Yurcik,
Adam J. Slagell:
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts.
SEC 2006: 284-295 |
64 | EE | Ragib Hasan,
William Yurcik:
A statistical analysis of disclosed storage security breaches.
StorageSS 2006: 1-8 |
63 | EE | William Yurcik:
Tool update: visflowconnect-IP with advanced filtering from usability testing.
VizSEC 2006: 63-64 |
62 | EE | William Yurcik:
Tool update: NVisionIP improvements (difference view, sparklines, and shapes).
VizSEC 2006: 65-66 |
61 | EE | Ruperto P. Majuca,
William Yurcik,
Jay P. Kesan:
The Evolution of Cyberinsurance
CoRR abs/cs/0601020: (2006) |
60 | EE | Katherine Luo,
Yifan Li,
Charis Ermopoulos,
William Yurcik,
Adam J. Slagell:
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
CoRR abs/cs/0601079: (2006) |
59 | EE | Gregory Pluta,
Larry Brumbaugh,
William Yurcik:
Using SMART for Customized Monitoring of Windows Services
CoRR abs/cs/0603114: (2006) |
58 | EE | Charis Ermopoulos,
William Yurcik:
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security)
CoRR abs/cs/0606089: (2006) |
57 | EE | William Yurcik,
Cristina Abad,
Ragib Hasan,
Moazzam Saleem,
Shyama Sridharan:
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
CoRR abs/cs/0607111: (2006) |
56 | EE | Aashish Sharma,
William Yurcik:
Security Assessment of E-Tax Filing Websites
CoRR abs/cs/0608034: (2006) |
2005 |
55 | | Vijay Atluri,
Pierangela Samarati,
William Yurcik,
Larry Brumbaugh,
Yuanyuan Zhou:
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005
ACM 2005 |
54 | | Kwan-Liu Ma,
Stephen C. North,
William Yurcik:
IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA
IEEE Computer Society 2005 |
53 | EE | William Yurcik,
Chao Liu:
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior.
CCGRID 2005: 111-120 |
52 | EE | Gregory A. Koenig,
Xin Meng,
Adam J. Lee,
Michael Treaster,
Nadir Kiyanclar,
William Yurcik:
Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
CCGRID 2005: 121-132 |
51 | EE | Adam J. Lee,
Gregory A. Koenig,
Xin Meng,
William Yurcik:
Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
CCGRID 2005: 146-151 |
50 | EE | Makan Pourzandi,
David Gordon,
William Yurcik,
Gregory A. Koenig:
Clusters and security: distributed security for distributed systems.
CCGRID 2005: 96-104 |
49 | EE | Cristina Abad,
Indranil Gupta,
William Yurcik:
Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay.
ICDCS Workshops 2005: 5-11 |
48 | EE | Ragib Hasan,
Zahid Anwar,
William Yurcik,
Larry Brumbaugh,
Roy H. Campbell:
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems.
ITCC (2) 2005: 205-213 |
47 | | Xiaoxin Yin,
William Yurcik,
Adam J. Slagell:
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness.
IWIA 2005: 141-153 |
46 | EE | Zahid Anwar,
William Yurcik,
Salman Baset,
Henning Schulzrinne,
Roy H. Campbell:
A First Step Towards Call Survivability in Cellular Networks.
LCN 2005: 501-502 |
45 | EE | William Yurcik:
Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite.
LISA 2005: 169-176 |
44 | EE | Joseph Tucek,
Paul Stanton,
Elizabeth Haubert,
Ragib Hasan,
Larry Brumbaugh,
William Yurcik:
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions.
MSST 2005: 329-340 |
43 | EE | Zahid Anwar,
Jalal Al-Muhtadi,
William Yurcik,
Roy H. Campbell:
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
MobiQuitous 2005: 192-201 |
42 | EE | Ragib Hasan,
William Yurcik,
Suvda Myagmar:
The evolution of storage service providers: techniques and challenges to outsourcing storage.
StorageSS 2005: 1-8 |
41 | EE | Ragib Hasan,
Suvda Myagmar,
Adam J. Lee,
William Yurcik:
Toward a threat model for storage systems.
StorageSS 2005: 94-102 |
40 | EE | Kiran Lakkaraju,
Ratna Bearavolu,
Adam J. Slagell,
William Yurcik,
Stephen C. North:
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
VizSEC 2005: 9 |
39 | EE | Wen Ding,
William Yurcik,
Xiaoxin Yin:
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers.
WINE 2005: 947-958 |
38 | EE | Wen Ding,
William Yurcik:
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market
CoRR abs/cs/0506038: (2005) |
37 | EE | Zahid Anwar,
William Yurcik,
Vivek Pandey,
Asim Shankar,
Indranil Gupta,
Roy H. Campbell:
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut
CoRR abs/cs/0509095: (2005) |
36 | EE | Dmitry Mogilevsky,
Adam J. Lee,
William Yurcik:
Defining a Comprehensive Threat Model for High Performance Computational Clusters
CoRR abs/cs/0510046: (2005) |
2004 |
35 | | Carla E. Brodley,
Philip Chan,
Richard Lippman,
William Yurcik:
Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 29 October 2004, Washington DC, USA
ACM 2004 |
34 | EE | William Yurcik:
Visualization Tools for Security Administrators.
Financial Cryptography 2004: 112-113 |
33 | | Aashish Sharma,
William Yurcik:
An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003.
ICETE (2) 2004: 257-262 |
32 | EE | Gregory Pluta,
Larry Brumbaugh,
William Yurcik:
BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments.
LCN 2004: 394-395 |
31 | EE | William Yurcik,
Xin Meng,
Gregory A. Koenig:
A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept.
LCN 2004: 427-428 |
30 | EE | Gregory Pluta,
Larry Brumbaugh,
William Yurcik,
Joseph Tucek:
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments.
LISA 2004: 177-186 |
29 | EE | Ahmed Sobeih,
William Yurcik,
Jennifer C. Hou:
VRing: A Case for Building Application-Layer Multicast Rings (Rather Than Trees).
MASCOTS 2004: 437-446 |
28 | EE | Kiran Lakkaraju,
William Yurcik,
Ratna Bearavolu,
Adam J. Lee:
NVisionIP: an interactive network flow visualization tool for security.
SMC (3) 2004: 2675-2680 |
27 | EE | William Yurcik,
Xin Meng,
Nadir Kiyanclar:
NVisionCC: a visualization framework for high performance cluster security.
VizSEC 2004: 133-137 |
26 | EE | Xiaoxin Yin,
William Yurcik,
Michael Treaster,
Yifan Li,
Kiran Lakkaraju:
VisFlowConnect: netflow visualizations of link relationships for security situational awareness.
VizSEC 2004: 26-34 |
25 | EE | Kiran Lakkaraju,
William Yurcik,
Adam J. Lee:
NVisionIP: netflow visualizations of system state for security situational awareness.
VizSEC 2004: 65-72 |
24 | EE | Michael Treaster,
Nadir Kiyanclar,
Gregory A. Koenig,
William Yurcik:
A Distributed Economics-based Infrastructure for Utility Computing
CoRR abs/cs/0412121: (2004) |
23 | EE | Adam J. Slagell,
William Yurcik:
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
CoRR cs.CR/0409005: (2004) |
2003 |
22 | EE | Cristina Abad,
Jed Taylor,
Cigdem Sengul,
William Yurcik,
Yuanyuan Zhou,
Kenneth E. Rowe:
Log Correlation for Intrusion Detection: A Proof of Concept.
ACSAC 2003: 255-265 |
21 | EE | Carlos Iván Chesñevar,
Maria Laura Cobo,
William Yurcik:
Using theoretical computer simulators for formal languages and automata theory.
SIGCSE Bulletin 35(2): 33-37 (2003) |
2002 |
20 | EE | William Yurcik:
Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept.
LCN 2002: 134-135 |
19 | EE | Gregory S. Wolffe,
William Yurcik,
Hugh Osborne,
Mark A. Holliday:
Teaching computer organization/architecture with limited resources using simulators.
SIGCSE 2002: 176-180 |
18 | | William Yurcik:
Special issue on specialized computer architecture simulators that see the present and may hold the future.
ACM Journal of Educational Resources in Computing 2(1): 1-3 (2002) |
2001 |
17 | EE | Alexander Gubin,
William Yurcik,
Larry Brumbaugh:
PingTV: A Case Study in Visual Network Monitoring.
IEEE Visualization 2001 |
16 | EE | Mary Grzywa,
Ajit Dharmik,
William Yurcik,
Larry Brumbaugh:
Application-Level Survivable Software: rFTP Proof-of-Concept .
LCN 2001: 203-205 |
15 | EE | Alexander Gubin,
William Yurcik,
Larry Brumbaugh:
Network Management Visualization with PingTV.
LCN 2001: 62-65 |
14 | EE | William Yurcik,
Larry Brumbaugh:
A web-based little man computer simulator.
SIGCSE 2001: 204-208 |
13 | EE | William Yurcik,
Hugh Osborne:
A crowd of little man computers: visual computer simulator teaching tools.
Winter Simulation Conference 2001: 1632-1639 |
12 | | William Yurcik:
Editorial.
ACM Journal of Educational Resources in Computing 1(4): 1-3 (2001) |
11 | | Cecile Yehezkel,
William Yurcik,
Murray Pearson,
Dean Armstrong:
Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim.
ACM Journal of Educational Resources in Computing 1(4): 60-80 (2001) |
10 | EE | William Yurcik,
David Doss:
Internet Attacks: A Policy Framework for Rules of Engagement
CoRR cs.CY/0109078: (2001) |
9 | EE | William Yurcik,
David Doss:
Achieving Fault-Tolerant Software with Rejuvenation and Reconfiguration.
IEEE Software 18(4): 48-52 (2001) |
8 | EE | Lillian (Boots) Cassel,
Mark A. Holliday,
Deepak Kumar,
John Impagliazzo,
Kevin Bolding,
Murray Pearson,
Jim Davies,
Gregory S. Wolffe,
William Yurcik:
Distributed expertise for teaching computer organization & architecture.
SIGCSE Bulletin 33(2): 111-126 (2001) |
2000 |
7 | EE | Samuel Patton,
David Doss,
William Yurcik:
Open Source Versus Commercial Firewalls: Functional Comparison.
LCN 2000: 223-224 |
6 | EE | Samuel Patton,
Bryan Smith,
David Doss,
William Yurcik:
A Virtual Private Network Deployment Framework.
LCN 2000: 225- |
5 | EE | Samuel Patton,
David Doss,
William Yurcik:
Distributed Weakness in Virtual Private Networks.
LCN 2000: 96- |
4 | | William Yurcik,
David Tipper,
Deep Medhi:
The use of hop-limits to provide survivable ATM group communications.
Networked Group Communication 2000: 131-140 |
3 | EE | William Yurcik,
David Tipper:
A survivability framework for connection-oriented group communications.
PRDC 2000: 53-58 |
1999 |
2 | | William Yurcik:
Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings.
Networked Group Communication 1999: 235-243 |
1998 |
1 | EE | William Yurcik:
Providing ATM Multipoint Survivability Via Disjoint VC Mesh Backup Groups.
ICCCN 1998: 129-139 |