Works (30)

2018 article

Furnace: Self-service Tenant VMI for the Cloud

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, pp. 647–669.

By: M. Bushouse & D. Reeves

Source: Web Of Science
Added: August 12, 2019

2018 journal article

Goalkeeper: Comprehensive process enforcement from the hypervisor

Computers & Security, 73, 459–473.

By: M. Bushouse & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2018 article

Hyperagents: Migrating Host Agents to the Hypervisor

PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), pp. 212–223.

By: M. Bushouse & D. Reeves

Source: Web Of Science
Added: November 11, 2019

2017 chapter

Computer-Aided Human Centric Cyber Situation Awareness

In Theory and Models for Cyber Situation Awareness (pp. 3–25).

By: M. Albanese, N. Cooke, G. Coty, D. Hall, C. Healey, S. Jajodia, P. Liu, M. McNeese ...

Source: Crossref
Added: February 24, 2020

2017 journal article

T-chain: A general incentive scheme for cooperative computing

IEEE/ACM Transactions on Networking, 25(4), 2122–2137.

By: K. Shin, C. Joe-Wong, S. Ha, Y. Yi, I. Rhee & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

Deriving common malware behavior through graph clustering

Computers & Security, 39, 419–430.

By: Y. Park, D. Reeves & M. Stamp

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

AntiLiar: Defending against cheating attacks in mesh based streaming

2012 IEEE 12th international conference on peer-to-peer computing (p2p), 115–125.

By: J. So & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Interval-based flow watermarking for tracing interactive traffic

Computer Networks (Amsterdam, Netherlands : 1999), 56(5), 1646–1665.

By: Y. Pyun, Y. Park, D. Reeves, X. Wang & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Winnowing: Protecting P2P systems against pollution through cooperative index filtering

Journal of Network and Computer Applications, 35(1), 72–84.

By: K. Shin & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2011 chapter

Defending against Sybil Nodes in BitTorrent

In NETWORKING 2011 (pp. 25–39).

By: J. So & D. Reeves

Source: Crossref
Added: August 28, 2020

2011 journal article

Robust correlation of encrypted attack traffic through stepping stones by flow watermarking

IEEE Transactions on Dependable and Secure Computing, 8(3), 434–449.

By: X. Wang & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2010 chapter

How the Public Views Strategies Designed to Reduce the Threat of Botnets

In Trust and Trustworthy Computing (pp. 337–351).

By: B. Rowe, D. Wood & D. Reeves

Source: Crossref
Added: August 28, 2020

2009 journal article

Edge-reconfigurable optical networks (ERONs): Rationale, network design, and evaluation

Journal of Lightwave Technology, 27(12), 1837–1845.

By: G. Karmous-Edwards, A. Vishwanath, D. Reeves, L. Battestilli, P. Vegesna & G. Rouskas

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Identification of bot commands by run-time execution monitoring

25th Annual Computer Security Applications Conference, 321–330.

By: Y. Park & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Network Access Control for Mobile Ad-Hoc Networks

In Information and Communications Security (pp. 350–362).

By: P. Wang, P. Ning & D. Reeves

Source: Crossref
Added: August 28, 2020

2005 journal article

Network access control for mobile ad-hoc networks

Information and Communications Security, 3783, 350–362.

By: P. Wang, P. Ning & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

Bandwidth provisioning and pricing for networks with multiple classes of service

Computer Networks (Amsterdam, Netherlands : 1999), 46(1), 41–52.

By: E. Fulp & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

Capacity planning of DiffServ networks with best-effort and Expedited Forwarding traffic

Telecommunication Systems, 25(04-Mar), 193–207.

By: K. Wu & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Certificate recommendations to improve the robustness of web of trust

In Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303).

By: Q. Jiang, D. Reeves & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Improving robustness of PGP keyrings by conflict detection

In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207).

By: Q. Jiang, D. Reeves & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Storage-efficient stateless group key revocation

In Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38).

By: P. Wang, P. Ning & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2002 chapter

Analyzing intensive intrusion alerts via correlation

In Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94).

By: P. Ning, Y. Cui & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2002 conference paper

Inter-packet delay based correlation for tracing encrypted connections through stepping stones

Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502), 2502, 244–263. New York: Springer.

By: X. Wang, D. Reeves & S. Wu

Source: NC State University Libraries
Added: August 6, 2018

2002 chapter

The economic impact of network pricing intervals

In Burkhard Stiller ...[et al.] (Eds.), From QoS provisioning to QoS charging: Third COST 263 International Workshop on Quality of Future Internet Services, QofIS 2002 and second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, Zurich, Switzerland, October 16-18, 2002 (Vol. 2511, pp. 315–324).

By: E. Fulp & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2001 chapter

Optimal provisioning and pricing of Internet differentiated services in hierarchical markets

In Networking-ICN 2001: First international conference, Colmar, France, July 9-13, 2001: Proceedings (Vol. 2093, pp. 409–418).

By: E. Fulp & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2000 journal article

A distributed algorithm for delay-constrained unicast routing

IEEE/ACM Transactions on Networking, 8(2), 239–250.

By: D. Reeves & H. Salama

Source: NC State University Libraries
Added: August 6, 2018

2000 journal article

Parallel image processing with the block data parallel architecture (Reprinted from Proceedings of the IEEE, vol 84, pg 947-968, 1996)

IBM Journal of Research and Development, 44(5), 681–702.

By: W. Alexander, D. Reeves & C. Gloster

Source: NC State University Libraries
Added: August 6, 2018

2000 chapter

QoS rewards and risks: A multi-market approach to resource allocation

In Networking 2000: Broadband communications, high performance networking, and performance of communication networks / IFIP-TC6/European Commission International Conference, Paris, France, May 2000, proceedings (Vol. 1815, pp. 945–956).

By: E. Fulp & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

1999 journal article

A survey of statistical source models for variable-bit-rate compressed video

Multimedia Systems, 7(3), 199–213.

By: M. Izquierdo & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

1997 journal article

Evaluation of multicast routing algorithms for real-time communication on high-speed networks

IEEE Journal on Selected Areas in Communications, 15(3), 332–345.

By: H. Salama, D. Reeves & I. Viniotis

Source: NC State University Libraries
Added: August 6, 2018