Works (31)

Updated: July 5th, 2023 16:04

2021 article

Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network

2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: T. Kim  n, D. Reeves n & R. Dutta n 

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Internet of Things; security; DNS; authentication; authorization; enterprise IoT network
Sources: Web Of Science, ORCID
Added: May 23, 2022

2018 article

Furnace: Self-service Tenant VMI for the Cloud

RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, Vol. 11050, pp. 647–669.

By: M. Bushouse n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Cloud security; Virtual machine introspection; Sandboxing
Source: Web Of Science
Added: August 12, 2019

2018 journal article

Goalkeeper: Comprehensive process enforcement from the hypervisor

COMPUTERS & SECURITY, 73, 459–473.

By: M. Bushouse n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Virtual machine introspection; Process whitelisting; Dynamic analysis; Virtualization; Security policy
Source: Web Of Science
Added: August 6, 2018

2018 article

Hyperagents: Migrating Host Agents to the Hypervisor

PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), pp. 212–223.

By: M. Bushouse n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Cloud security; virtual machine introspection; computer forensics
Source: Web Of Science
Added: November 11, 2019

2017 chapter

Computer-Aided Human Centric Cyber Situation Awareness

In Theory and Models for Cyber Situation Awareness (pp. 3–25).

By: M. Albanese *, N. Cooke *, G. Coty*, D. Hall *, C. Healey n, S. Jajodia *, P. Liu *, M. McNeese* ...

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Crossref
Added: February 24, 2020

2017 journal article

T-Chain: A General Incentive Scheme for Cooperative Computing

IEEE-ACM TRANSACTIONS ON NETWORKING, 25(4), 2122–2137.

By: K. Shin*, C. Joe-Wong *, S. Ha *, Y. Yi *, I. Rhee* & D. Reeves n

co-author countries: Korea (Republic of) πŸ‡°πŸ‡· United States of America πŸ‡ΊπŸ‡Έ
author keywords: Cooperative communication; reciprocity; symmetric encryption
Source: Web Of Science
Added: August 6, 2018

2013 journal article

Deriving common malware behavior through graph clustering

COMPUTERS & SECURITY, 39, 419–430.

By: Y. Park*, D. Reeves n & M. Stamp *

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Malware; Dynamic analysis; Graph clustering; Intrusion detection; Virtualization
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

AntiLiar: Defending against cheating attacks in mesh based streaming

2012 IEEE 12th international conference on peer-to-peer computing (p2p), 115–125.

By: J. So n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Interval-based flow watermarking for tracing interactive traffic

COMPUTER NETWORKS, 56(5), 1646–1665.

By: Y. Pyun n, Y. Park n, D. Reeves n, X. Wang * & P. Ning n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Intrusion tracing; Stepping stones; Flow watermarking; Flow correlation
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Winnowing: Protecting P2P systems against pollution through cooperative index filtering

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35(1), 72–84.

By: K. Shin* & D. Reeves n

co-author countries: Korea (Republic of) πŸ‡°πŸ‡· United States of America πŸ‡ΊπŸ‡Έ
author keywords: Peer-to-peer; Pollution; Distributed hash table (DHT); Reputation; Filtering
Source: Web Of Science
Added: August 6, 2018

2011 chapter

Defending against Sybil Nodes in BitTorrent

In NETWORKING 2011 (pp. 25–39).

By: J. So n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Crossref
Added: August 28, 2020

2011 journal article

Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 8(3), 434–449.

By: X. Wang * & D. Reeves*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Network-level security and protection; intrusion tracing; correlation; stepping stone
Source: Web Of Science
Added: August 6, 2018

2010 chapter

How the Public Views Strategies Designed to Reduce the Threat of Botnets

In Trust and Trustworthy Computing (pp. 337–351).

By: B. Rowe*, D. Wood * & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Crossref
Added: August 28, 2020

2009 journal article

Edge-Reconfigurable Optical Networks (ERONs): Rationale, Network Design, and Evaluation

Journal of Lightwave Technology, 27(12), 1837–1845.

By: G. Karmous-Edwards n, A. Vishwanath n, D. Reeves n, L. Battestilli n , P. Vegesna n & G. Rouskas n 

co-author countries: United States of America πŸ‡ΊπŸ‡Έ

Contributors: L. Battestilli n , G. Karmous-Edwards n, D. Reeves n, G. Rouskas n , P. Vegesna n & A. Vishwanath n

author keywords: Dynamic circuits; network design; optical networks
Sources: Web Of Science, Crossref, ORCID
Added: August 6, 2018

2009 conference paper

Identification of bot commands by run-time execution monitoring

25th Annual Computer Security Applications Conference, 321–330.

By: Y. Park n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Network Access Control for Mobile Ad-Hoc Networks

In Information and Communications Security (pp. 350–362).

By: P. Wang  n, P. Ning  n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Crossref
Added: August 28, 2020

2005 journal article

Network access control for mobile ad-hoc networks

Information and Communications Security, 3783, 350–362.

By: P. Wang, P. Ning & D. Reeves

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

Bandwidth provisioning and pricing for networks with multiple classes of service

COMPUTER NETWORKS, 46(1), 41–52.

By: E. Fulp* & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: connection management; SLA; DiffServ; bandwidth pricing; microeconomics
Source: Web Of Science
Added: August 6, 2018

2004 journal article

Capacity planning of DiffServ networks with best-effort and Expedited Forwarding traffic

TELECOMMUNICATION SYSTEMS, 25(3-4), 193–207.

By: K. Wu n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: DiffServ; capacity planning; Lagrangian relaxation
Source: Web Of Science
Added: August 6, 2018

2004 chapter

Certificate recommendations to improve the robustness of web of trust

In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303).

By: Q. Jiang*, D. Reeves* & P. Ning*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ

Ed(s): . K. Zhang & Y. Zheng

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Improving robustness of PGP keyrings by conflict detection

In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207).

By: Q. Jiang*, D. Reeves* & P. Ning*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Storage-efficient stateless group key revocation

In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38).

By: P. Wang  n, P. Ning n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ

Ed(s): . K. Zhang & Y. Zheng

Source: NC State University Libraries
Added: August 6, 2018

2002 chapter

Analyzing intensive intrusion alerts via correlation

In G. V. A. Wespi & L. Deri (Eds.), Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94).

By: P. Ning n, Y. Cui  n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ

Ed(s): G. A. Wespi & L. Deri

Source: NC State University Libraries
Added: August 6, 2018

2002 conference paper

Inter-packet delay based correlation for tracing encrypted connections through stepping stones

In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer.

By: X. Wang, D. Reeves & S. Wu

Ed(s): G. D. Gollmann & M. Waidner

Source: NC State University Libraries
Added: August 6, 2018

2002 chapter

The economic impact of network pricing intervals

In Burkhard Stiller ...[et al.] (Eds.), From QoS provisioning to QoS charging: Third COST 263 International Workshop on Quality of Future Internet Services, QofIS 2002 and second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, Zurich, Switzerland, October 16-18, 2002 (Vol. 2511, pp. 315–324).

By: E. Fulp* & D. Reeves*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2001 chapter

Optimal provisioning and pricing of Internet differentiated services in hierarchical markets

In Networking-ICN 2001: First international conference, Colmar, France, July 9-13, 2001: Proceedings (Vol. 2093, pp. 409–418).

By: E. Fulp* & D. Reeves*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2000 journal article

A distributed algorithm for delay-constrained unicast routing

IEEE-ACM TRANSACTIONS ON NETWORKING, 8(2), 239–250.

By: D. Reeves n & H. Salama*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: delay constraints; distributed algorithms; quality of service; routing
Source: Web Of Science
Added: August 6, 2018

2000 article

Parallel image processing with the block data parallel architecture (Reprinted from Proceedings of the IEEE, vol 84, pg 947-968, 1996)

Alexander, W. E., Reeves, D. S., & Gloster, C. S. (2000, September). IBM JOURNAL OF RESEARCH AND DEVELOPMENT, Vol. 44, pp. 681–702.

By: W. Alexander n, D. Reeves n & C. Gloster n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: August 6, 2018

2000 chapter

QoS rewards and risks: A multi-market approach to resource allocation

In Networking 2000: Broadband communications, high performance networking, and performance of communication networks / IFIP-TC6/European Commission International Conference, Paris, France, May 2000, proceedings (Vol. 1815, pp. 945–956).

By: E. Fulp n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

1999 journal article

A survey of statistical source models for variable-bit-rate compressed video

MULTIMEDIA SYSTEMS, 7(3), 199–213.

By: M. Izquierdo & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: video modeling; VBR; variable bit rate; MPEG; H.261; TES; self-similar
Source: Web Of Science
Added: August 6, 2018

1997 journal article

Evaluation of multicast routing algorithms for real-time communication on high-speed networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 15(3), 332–345.

By: H. Salama n, D. Reeves n & Y. Viniotis n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: admission control; multicast routing; quality of service; reverse path multicasting
Source: Web Of Science
Added: August 6, 2018