Douglas Reeves Kim, T. H., Reeves, D., & Dutta, R. (2021). Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/GLOBECOM46510.2021.9685237 Bushouse, M., & Reeves, D. (2018). Furnace: Self-service Tenant VMI for the Cloud. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, Vol. 11050, pp. 647–669. https://doi.org/10.1007/978-3-030-00470-5_30 Bushouse, M., & Reeves, D. (2018). Goalkeeper: Comprehensive process enforcement from the hypervisor. COMPUTERS & SECURITY, 73, 459–473. https://doi.org/10.1016/j.cose.2017.11.020 Bushouse, M., & Reeves, D. (2018). Hyperagents: Migrating Host Agents to the Hypervisor. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), pp. 212–223. https://doi.org/10.1145/3176258.3176317 Albanese, M., Cooke, N., Coty, G., Hall, D., Healey, C., Jajodia, S., … Yen, J. (2017). Computer-Aided Human Centric Cyber Situation Awareness. In Theory and Models for Cyber Situation Awareness (pp. 3–25). https://doi.org/10.1007/978-3-319-61152-5_1 Shin, K., Joe-Wong, C., Ha, S., Yi, Y., Rhee, I., & Reeves, D. S. (2017). T-Chain: A General Incentive Scheme for Cooperative Computing. IEEE-ACM TRANSACTIONS ON NETWORKING, 25(4), 2122–2137. https://doi.org/10.1109/tnet.2017.2685560 Park, Y., Reeves, D. S., & Stamp, M. (2013). Deriving common malware behavior through graph clustering. COMPUTERS & SECURITY, 39, 419–430. https://doi.org/10.1016/j.cose.2013.09.006 So, J. K., & Reeves, D. S. (2012). AntiLiar: Defending against cheating attacks in mesh based streaming. 2012 IEEE 12th international conference on peer-to-peer computing (p2p), 115–125. https://doi.org/10.1109/p2p.2012.6335791 Pyun, Y. J., Park, Y., Reeves, D. S., Wang, X., & Ning, P. (2012). Interval-based flow watermarking for tracing interactive traffic. COMPUTER NETWORKS, 56(5), 1646–1665. https://doi.org/10.1016/j.comnet.2012.01.017 Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35(1), 72–84. https://doi.org/10.1016/j.jnca.2011.02.015 So, J. K., & Reeves, D. S. (2011). Defending against Sybil Nodes in BitTorrent. In NETWORKING 2011 (pp. 25–39). https://doi.org/10.1007/978-3-642-20798-3_3 Wang, X., & Reeves, D. S. (2011). Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 8(3), 434–449. https://doi.org/10.1109/tdsc.2010.35 Rowe, B., Wood, D., & Reeves, D. (2010). How the Public Views Strategies Designed to Reduce the Threat of Botnets. In Trust and Trustworthy Computing (pp. 337–351). https://doi.org/10.1007/978-3-642-13869-0_25 Karmous-Edwards, G., Vishwanath, A., Reeves, D. S., Battestilli, L., Vegesna, P. B., & Rouskas, G. N. (2009). Edge-Reconfigurable Optical Networks (ERONs): Rationale, Network Design, and Evaluation. Journal of Lightwave Technology, 27(12), 1837–1845. https://doi.org/10.1109/JLT.2009.2021279 Park, Y., & Reeves, D. S. (2009). Identification of bot commands by run-time execution monitoring. 25th Annual Computer Security Applications Conference, 321–330. https://doi.org/10.1109/acsac.2009.37 Wang, P., Ning, P., & Reeves, D. S. (2005). Network Access Control for Mobile Ad-Hoc Networks. In Information and Communications Security (pp. 350–362). https://doi.org/10.1007/11602897_30 Wang, P., Ning, P., & Reeves, D. S. (2005). Network access control for mobile ad-hoc networks. Information and Communications Security, 3783, 350–362. Fulp, E. W., & Reeves, D. S. (2004). Bandwidth provisioning and pricing for networks with multiple classes of service. COMPUTER NETWORKS, 46(1), 41–52. https://doi.org/10.1016/j.comnet.2004.03.018 Wu, K. H., & Reeves, D. S. (2004). Capacity planning of DiffServ networks with best-effort and Expedited Forwarding traffic. TELECOMMUNICATION SYSTEMS, 25(3-4), 193–207. https://doi.org/10.1023/B:TELS.0000014781.92903.7f Jiang, Q. L., Reeves, D. S., & Ning, P. (2004). Certificate recommendations to improve the robustness of web of trust. In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303). https://doi.org/10.1007/978-3-540-30144-8_25 Jiang, Q. L., Reeves, D. S., & Ning, P. (2004). Improving robustness of PGP keyrings by conflict detection. In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207). https://doi.org/10.1007/978-3-540-24660-2_16 Wang, P., Ning, P., & Reeves, D. S. (2004). Storage-efficient stateless group key revocation. In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38). https://doi.org/10.1007/978-3-540-30144-8_3 Ning, P., Cui, Y., & Reeves, D. S. (2002). Analyzing intensive intrusion alerts via correlation. In G. V. A. Wespi & L. Deri (Eds.), Recent advances in intrusion detection, 5th international symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002: Proceedings (Vol. 2516, pp. 74–94). https://doi.org/10.1007/3-540-36084-0_5 Wang, X. Y., Reeves, D. S., & Wu, S. F. (2002). Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In G. K. D. Gollmann & M. Waidner (Eds.), Computer security--ESORICS 2002: 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002: proceedings (Lecture notes in computer science ; 2502) (Vol. 2502, pp. 244–263). New York: Springer. Fulp, E. W., & Reeves, D. S. (2002). The economic impact of network pricing intervals. In Burkhard Stiller ...[et al.] (Eds.), From QoS provisioning to QoS charging: Third COST 263 International Workshop on Quality of Future Internet Services, QofIS 2002 and second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, Zurich, Switzerland, October 16-18, 2002 (Vol. 2511, pp. 315–324). https://doi.org/10.1007/3-540-45859-x_30 Fulp, E. W., & Reeves, D. S. (2001). Optimal provisioning and pricing of Internet differentiated services in hierarchical markets. In Networking-ICN 2001: First international conference, Colmar, France, July 9-13, 2001: Proceedings (Vol. 2093, pp. 409–418). https://doi.org/10.1007/3-540-47728-4_40 Reeves, D. S., & Salama, H. F. (2000). A distributed algorithm for delay-constrained unicast routing. IEEE-ACM TRANSACTIONS ON NETWORKING, 8(2), 239–250. https://doi.org/10.1109/90.842145 Alexander, W. E., Reeves, D. S., & Gloster, C. S. (2000, September). Parallel image processing with the block data parallel architecture (Reprinted from Proceedings of the IEEE, vol 84, pg 947-968, 1996). IBM JOURNAL OF RESEARCH AND DEVELOPMENT, Vol. 44, pp. 681–702. https://doi.org/10.1147/rd.445.0681 Fulp, E. W., & Reeves, D. S. (2000). QoS rewards and risks: A multi-market approach to resource allocation. In Networking 2000: Broadband communications, high performance networking, and performance of communication networks / IFIP-TC6/European Commission International Conference, Paris, France, May 2000, proceedings (Vol. 1815, pp. 945–956). https://doi.org/10.1007/3-540-45551-5_79 Izquierdo, M. R., & Reeves, D. S. (1999). A survey of statistical source models for variable-bit-rate compressed video. MULTIMEDIA SYSTEMS, 7(3), 199–213. https://doi.org/10.1007/s005300050122 Salama, H. F., Reeves, D. S., & Viniotis, Y. (1997). Evaluation of multicast routing algorithms for real-time communication on high-speed networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 15(3), 332–345. https://doi.org/10.1109/49.564132