Found 224 results
In Press
Harrison, W. L., D. Andrews, and G. Allwein, "Simulation Logic", Logic and Logical Philosophy, In Press. PDF icon 12-1231-2384.pdf (281.37 KB)
2020
Jansen, R., "Reducing Kernel Queuing Delays with TCP Window Space Events", The 14th Technical Conference on Linux Networking (NetDev 0x14), 03/2020. PDF icon Reducing Kernel Queuing Delays with TCP Window Space Events.pdf (215.23 KB)
2019
Traudt, M., and P. Syverson, "Does Pushing Security on Clients Make Them Safer?", 12th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs2019), 06/2019. PDF icon Does Pushing Security on Clients Make Them Safer_.pdf (113.15 KB)
Shing, L., A. Wollaber, S. Chikkagoudar, J. Yuen, P. Alvino, A. Chambers, and T. Allard, "Extracting Workflows from Natural Language Documents: A First Step", First International Workshop on Artificial Intelligence for Business Process Management (AI4BPM): Springer, Cham, pp. 294-300, 2019. PDF icon AI4BPM_Shing_et_al.pdf (283.95 KB)
Wan, G., A. Johnson, R. Wails, S. Wagh, and P. Mittal, "Guard Placement Attacks on Path Selection Algorithms for Tor", Proceedings on Privacy Enhancing Technologies (PoPETS 2019), vol. 2019, issue 4, 07/2019. PDF icon guard-placement-popets2019.19-1231-1780.pdf (2.04 MB)
Jansen, R., T. Vaidya, and M. Sherr, "Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor", 28th USENIX Security Symposium (Sec 2019), 08/2019. PDF icon pointbreak-sec2019.pdf (714.85 KB)
Livingston, M. A., D. Brock, J. W. Decker, D. J. Perzanowski, C. Van Dolson, J. Mathews, and A. S. Lulushi, "A Query Generation Technique for Measuring Comprehension of Statistical Graphics", 10th International Conference on Applied Human Factors and Ergonomics, 06/2019. PDF icon LivingstonEtAl_2019_AHFE_QueryGeneration.pdf (194.07 KB)
Syverson, P., and M. Traudt, "Self-Authenticating Traditional Domain Names", IEEE Secure Development Conference (SecDev), McLean Virginia, USA, IEEE, 09/2019. PDF icon 19-1231-2433_syverson_secdev19.pdf (432.62 KB)
2018
Kirby, J., "Decision-Based Behavior Modeling of Software-Intensive System", 17th Annual Conference on Systems Engineering Research (CSER), 10/2018. PDF icon Decision-Based Behavior Modeling of Software-Intensive System.pdf (1.18 MB)
Kang, M., A. Kim, A. Velazquez, A. Chowdhary, A. Sabur, and D. Huang, "A DFW-based Security States Analysis Framework for Large-Scale Data Center Networks", 49th IEEE/IFIP International Conference on Dependable Systems and Networks, 12/2019, 2018. PDF icon A DFW-based Security States Analysis Framework for Large-Scale Data Center Networks[2].pdf (2.26 MB)
Arthur-Durett, K., T. E. Carroll, and S. Chikkagoudar, "Discovering Significant Co-Occurrences to Characterize Network Behaviors", 20th International Conference on Human Computer Interaction (HCII 2018): Springer, Cham, pp. 609-623, 06/2018. PDF icon 2400_final(1).pdf (174.48 KB)
Guarino, A., J. Komárková, and J. Rowell, "“Hello, World” Autonomous Agent", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience: Army Research Laboratory, pp. 26-31, 04/2018. PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
Tracey, J., R. Jansen, and I. Goldberg, "High Performance Tor Experimentation from the Magic of Dynamic ELFs", 11th Workshop on Cyber Security Experimentation and Test (CSET 2018), 08/2018. PDF icon shadowelf-cset2018.pdf (298.64 KB)
Jansen, R., M. Juarez, R. Galvez, T. Elahi, and C. Diaz, "Inside Job: Applying Traffic Analysis to Measure Tor from Within", 25th Symposium on Network and Distributed System Security (NDSS 2018), 02/2018. PDF icon insidejob-ndss2018.pdf (1.27 MB)
Jansen, R., M. Traudt, J. Geddes, C. Wacek, M. Sherr, and P. Syverson, "KIST: Kernel-Informed Socket Transport for Tor", ACM Transactions on Privacy and Security (TOPS 2018), vol. 22, issue 1, 12/2018. PDF icon kist-tops2018.pdf (2.89 MB)
Mathews, J., "Navy Malware Catalog", 2017 NRL Review, pp. 149-151, 08/2018. PDF icon 2017_NRL_Review_Mathews.pdf (209.26 KB)
Kang, M., J. Lou, D. Huang, C-J. Chung, and Q. Dong, "PoP- Building Private Blockchains over Public Blockchains", ACSAC 2018, 06/2018. PDF icon PoP- Building Private Blockchains over Public Blockchains[1][1].pdf (4.24 MB)
Blowers, M., H. Harney, and G. Wehner, "Preventing the “Killer Robot” Scenario", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience: Army Research Laboratory, pp. 22-25, 04/2018. PDF icon Report of IST-152 workshop Prague 2017.pdf (1.15 MB)
Jansen, R., M. Traudt, and N. Hopper, "Privacy-Preserving Dynamic Learning of Tor Network Traffic", 25th ACM Conference on Computer and Communication Security (CCS 2018), 10/2018. PDF icon tmodel-ccs2018.pdf (1.5 MB)
Kang, M., J. Lou, A. Chowdhary, A. Alshamrani, D. Huang, and C-J. Chung, "SDNSOC: Object Oriented SDN Framework", INFOCOM, 08/2018. PDF icon SDNSOC- Object Oriented SDN Framework[3][1].pdf (3.45 MB)
Wails, R., Y. Sun, A. Johnson, M. Chiang, and P. Mittal, "Temporal Dynamics in Anonymity Systems", Proceedings on Privacy Enhancing Technologies (PoPETS 2018), vol. 2018, issue 3, 07/2018. PDF icon tempest-popets2018.17-1231-3634.pdf (718.27 KB)
Blakely, B., D. Henshel, G. Wehner, and J. Rowell, "Toward a Taxonomy of Fundamental System Properties of Cyber Resilience", NATO IST-153 Workshop on Cyber Resilience: Army Research Laboratory , pp. 2-6, 04/2018. PDF icon Report of IST-153 workshop Munich 2017.pdf (1.55 MB)
Macklin, T., and P. West, "Towards a Trustworthy Foundation for Assured Autonomous Systems", NATO IST-166 Specialist's Meeting on Mission Assurance for Autonomous Unmanned Systems: NATO RTO, pp. 15, 10/2018. PDF icon MP-IST-166-04.pdf (428.26 KB)
Kang, M., A. Kim, A. Velazquez, A. Chowdhary, A. Alshamrani, and D. Huang, "TRUFL: Distributed Trust Management Framework in SDN", IEEE International Conference on Communications, 11/2018. PDF icon TRUFL- Distributed Trust Management framework in SDN[1][1].pdf (1.59 MB)
Mani, A., T. Wilson-Brown, R. Jansen, A. Johnson, and M. Sherr, "Understanding Tor Usage with Privacy-Preserving Measurement", Internet Measurement Conference 2018 (IMC 2018), 10/2018. PDF icon tor-usage-imc18.18-1231-2064.pdf (1.02 MB)

Pages