Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
Create or connect your ORCID iD
Works (31)
2021 article
Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network
Kim, T. H., Reeves, D., & Dutta, R. (2021, December 1). 2021 IEEE Global Communications Conference (GLOBECOM).
2018 article
Furnace: Self-service Tenant VMI for the Cloud
Bushouse, M., & Reeves, D. (2018, January 1). Lecture Notes in Computer Science.
2018 article
Hyperagents
Bushouse, M., & Reeves, D. (2018, March 13).
2017 article
<italic>T-Chain</italic>: A General Incentive Scheme for Cooperative Computing
Shin, K., Joe-Wong, C., Ha, S., Yi, Y., Rhee, I., & Reeves, D. S. (2017, April 7). IEEE/ACM Transactions on Networking.
2017 chapter
Computer-Aided Human Centric Cyber Situation Awareness
In Theory and Models for Cyber Situation Awareness (pp. 3–25).
2017 article
Goalkeeper: Comprehensive process enforcement from the hypervisor
Bushouse, M., & Reeves, D. (2017, December 12). Computers & Security.
2013 article
Deriving common malware behavior through graph clustering
Park, Y., Reeves, D. S., & Stamp, M. (2013, October 5). Computers & Security.
2012 article
AntiLiar: Defending against cheating attacks in mesh based streaming
So, J. K., & Reeves, D. S. (2012, September 1).
2012 article
Interval-based flow watermarking for tracing interactive traffic
Pyun, Y. J., Park, Y., Reeves, D. S., Wang, X., & Ning, P. (2012, February 3). Computer Networks.
2011 chapter
Defending against Sybil Nodes in BitTorrent
In NETWORKING 2011 (pp. 25–39).
2011 article
Winnowing: Protecting P2P systems against pollution through cooperative index filtering
Shin, K., & Reeves, D. S. (2011, March 17). Journal of Network and Computer Applications.
2010 chapter
How the Public Views Strategies Designed to Reduce the Threat of Botnets
In Trust and Trustworthy Computing (pp. 337–351).
2010 article
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
Wang, X., & Reeves, D. (2010, August 24). IEEE Transactions on Dependable and Secure Computing.
2009 journal article
Edge-Reconfigurable Optical Networks (ERONs): Rationale, Network Design, and Evaluation
Journal of Lightwave Technology, 27(12), 1837–1845.
Contributors: L. Battestilli n , G. Karmous-Edwards n, n, G. Rouskas n , P. Vegesna n & A. Vishwanath n
2009 article
Identification of Bot Commands by Run-Time Execution Monitoring
Park, Y., & Reeves, D. S. (2009, December 1).
2005 chapter
Network Access Control for Mobile Ad-Hoc Networks
In Information and Communications Security (pp. 350–362).
2005 journal article
Network access control for mobile ad-hoc networks
Information and Communications Security, 3783, 350–362.
2004 article
Bandwidth provisioning and pricing for networks with multiple classes of service
Fulp, E. W., & Reeves, D. S. (2004, April 10). Computer Networks.
2004 article
Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic
Wu, K., & Reeves, D. S. (2004, February 4). Telecommunication Systems.
2004 article
Certificate Recommendations to Improve the Robustness of Web of Trust
Jiang, Q., Reeves, D. S., & Ning, P. (2004, January 1). Lecture Notes in Computer Science.
Ed(s):
2004 article
Improving Robustness of PGP Keyrings by Conflict Detection
Jiang, Q., Reeves, D. S., & Ning, P. (2004, January 1). Lecture Notes in Computer Science.
2004 article
Storage-Efficient Stateless Group Key Revocation
Wang, P., Ning, P., & Reeves, D. S. (2004, January 1). Lecture Notes in Computer Science.
Ed(s):
2002 article
Analyzing Intensive Intrusion Alerts via Correlation
Ning, P., Cui, Y., & Reeves, D. S. (2002, January 1). Lecture Notes in Computer Science.
Ed(s):
2002 conference paper
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer.
Ed(s): G. D. Gollmann & M. Waidner
2002 article
The Economic Impact of Network Pricing Intervals
Fulp, E. W., & Reeves, D. S. (2002, January 1). Lecture Notes in Computer Science.
2001 article
Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets
Fulp, E. W., & Reeves, D. S. (2001, January 1). Lecture Notes in Computer Science.
2000 article
A distributed algorithm for delay-constrained unicast routing
Reeves, D. S., & Salama, H. F. (2000, April 1). IEEE/ACM Transactions on Networking.
2000 article
Parallel Image Processing with the Block Data Parallel Architecture
Alexander, W. E., Reeves, D. S., & Gloster, C. S. (2000, September 1). IBM Journal of Research and Development.
2000 article
QoS Rewards and Risks: A Multi-market Approach to Resource Allocation
Fulp, E. W., & Reeves, D. S. (2000, January 1). Lecture Notes in Computer Science.
Ed(s):
1999 article
A survey of statistical source models for variable-bit-rate compressed video
Izquierdo, M. R., & Reeves, D. S. (1999, May 1). Multimedia Systems.
1997 article
Evaluation of multicast routing algorithms for real-time communication on high-speed networks
Salama, H. F., Reeves, D. S., & Viniotis, Y. (1997, April 1). IEEE Journal on Selected Areas in Communications, Vol. 4.