Found 196 results
"Simulation Logic", Logic and Logical Philosophy, In Press.
"“Hello, World” Autonomous Agent", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience: Army Research Laboratory, pp. 26-31, 04/2018.
"Preventing the “Killer Robot” Scenario", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience: Army Research Laboratory, pp. 22-25, 04/2018.
"Toward a Taxonomy of Fundamental System Properties of Cyber Resilience", NATO IST-153 Workshop on Cyber Resilience: Army Research Laboratory , pp. 2-6, 04/2018.
"The Analysis and Prediction of Eye Gaze When Viewing Statistical Graphs", International Conference on Augmented Cognition, Vancouver, Canada, Springer, pp. 148-165, 05/2017.
"Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection", Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), 2017.
"Big Data, Little Security: Addressing Security Issues in your Platform", SPIE Proceedings, Next-Generation Analyst V, Anaheim, California, SPIE Defense + Security, pp. 1-10, 05/2017.
Commonality and Variability Analysis for Xenon Family of Separation Virtual Machine Monitors (CVAX), , 2017.
"Distributed Measurement with Private Set-Union Cardinality", The 24th ACM Conference on Computer and Communications Security (CCS 2017), 10/2017.
"Federated Cybersecurity Policy Arbitration", NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defense and Resilience, Munich, Germany, International Journal of Security and Networks, pp. 83-85, 10/2017.
"The Once and Future Onion", Proceedings of the 22nd European Symposium on Research in Computer Security (ESORICS 2017) , 07/2017.
"Stealthy Protocols: Metrics and Open Problems", Proceedings of Concurrency, Security, and Puzzles, pp. 1-17, 01/2017.
"Bake in .onion for Tear-Free and Stronger Website Authentication", IEEE Security & Privacy Magazine, 2016.
"PeerFlow: Secure Load Balancing in Tor", Proceedings on Privacy Enhancing Technologies, vol. 2017, issue 2, 12/2016.
"Safely Measuring Tor", 23rd ACM Conference on Computer and Communications Security, 10/2016.
"20,000 In League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables Proceedings on Privacy Enhancing Technologies", Proceedings on Privacy Enhancing Technologies, vol. 1, issue 1, pp. 4-24, 04/2015.
"Defending Tor from Network Adversaries: A Case Study of Network Path Prediction", Proceedings on Privacy Enhancing Technologies, vol. 1, 05/2015.
"Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication", IEEE Workshop on Web 2.0 Security & Privacy, 05/2015.
"Hidden-service statistics reported by relays", NRL Technical Reports, no. 2015-04-001, 06/2015.
"Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications", 8th Workshop on Cyber Security Experimentation and Test (CSET), 08/2015.
"Accelerating Software Radio on ARM: Adding NEON Support to VOLK", IEEE Radio and Wireless Symposium, 11/2014.
"Distributed Logics", NRL Memorandum Report, no. 9565, 2014.
"From Onions to Shallots: Rewarding Tor Relays with TEARS", 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), 2014.
"IMUX: Managing Tor Connections from Two to Infinity, and Beyond", Workshop on Privacy in Electronic Society (WPES), 11/2014.
"Never Been KIST: Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport", 23rd Usenix Security Symposium, 08/2014.