Search results
- Using Machine Learning to Maintain Pub/Sub System QoS in Dynamic Environments, Joe Hoffert, Daniel Mack, Douglas Schmidt, 8th Workshop on Adaptive and Reflective Middleware, December, 2009
- A Study of User-Friendly Hash Comparison Schemes, Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang, Hiroaki Kikuchi, Proceedings of Annual Computer Security Applications Conference (ACSAC), December, 2009
- Redundancy Minimizing Techniques for Robust Transmission in Wireless Networks, Anna Kacewicz, Stephen Wicker, Journal of Communications and Networks, 564-573, December, 2009
- Learning Privacy Policy from Audit Logs, Bradley Malin, 30, November, 2009
- Agenda for a Science of Security, Fred Schneider, 30, November, 2009
- Efficient Character-Level Taint Tracking for Java, Erika Chin, 30, November, 2009
- JavaScript Heap Analysis: From Exploiting Browsers to Building Safe JavaScript Subsets, Joel Weinberger, 30, November, 2009
- Competitive Cyber-Insurance and Network Security, Galina Schwartz, 30, November, 2009
- Reasoning about Concrete Security in Protocol Proofs, Arnab Roy, 30, November, 2009
- TRUST Health Infrastructures Overview, Janos Sztipanovits, 30, November, 2009
- A Logic of Secure Systems and its Application to Trusted Computing, Jason Franklin, 30, November, 2009
- Body Sensors for In-Home Patient Monitoring, Yuan Xue, Posu Yan, 30, November, 2009
- Stratified Negation and HIPAA Compliance, John C. Mitchell, 30, November, 2009
- Guideline Driven Patient Management Systems, Janos Laszlo Mathe, Jason Martin, 30, November, 2009
- Stealthy Deception Attacks on Water SCADA Systems, Saurabh Amin, 29, November, 2009
- The Economics (and Behavioral Economics) of Privacy, Alessandro Acquisti, 29, November, 2009
- Reintroducing Consistency Guarantees in Cloud Computing Systems, Ken Birman, 29, November, 2009
- Critical Infrastructure Protection and Privacy-Aware Design, Stephen Wicker, 29, November, 2009
- Secure Control Against Replay Attacks, Bruno Sinopoli, 29, November, 2009
- TRUST for SCADA: A Simulation-Based Experimental Platform, Gabor Karsai, 29, November, 2009
- TRUST Physical Infrastructures Overview, Stephen Wicker, 29, November, 2009
- Overview of NIST Cybersecurity Activities, Donna Dodson, 29, November, 2009
- Efficient Character-level Taint Tracking for Java, Erika Chin, David Wagner, 2009 ACM Workshop on Secure Web Services, 13, November, 2009
- Evaluating Transport Protocols for Real-time Event Stream Processing Middleware and Applications, Joe Hoffert, Douglas Schmidt, Aniruddha Gokhale, 11th International Symposium on Distributed Objects, Middleware, and Applications (DOA '09), November, 2009
- ANTIDOTE: Understanding and Defending against Poisoning of Anomaly Detectors, B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar, November, 2009
- Poster - Intrusion-Tolerant Distributed Disaster Area Assessment, Adrian Lauf, William H. Robinson, October, 2009
- Berkeley Fit - An Interactive Social Mobile Application For Promoting Physical Activity, Edmund Seto , Irving Lin, Michael Roy, Victor Shia, Curtis Wang, Posu Yan, Allen Yang , Ruzena Bajcsy, 2009 mHealth Summit, October, 2009
- Cloudifying Source Code Repositories: How Much Does it Cost?, Hakim Weatherspoon, Large-Scale Distributed Systems and Middleware (LADIS 2009, October, 2009
- Code-Partitioning Gossip, Ken Birman, Programming Languages and Operating Systems, October, 2009
- Nonparametric Belief Propagation for Distributed Tracking of Robot Networks with Noisy Inter-Distance Measurements., Jeremy Schiff, Erik Sudderth, Ken Goldberg, IEEE International Conference on Intelligent Robots and Systems (IROS)., October, 2009
- Wireless Sensor Networks: a Building Block for Mass Creativity and Learning, S. Hsu and J. D. Tygar., October, 2009
- PhishCatch - A Phishing Detection Tool, Weider D. Yu, Shruti Nargundkar, Nagapriya Tiruthani, The 33rd 2009 IEEE International Computer Software and Applications Conference, IEEE Computer Society, 491-496, 22, September, 2009
- Rethinking Reliable Transport for the Datacenter, Mahesh Balakrishnan, Joe Hoffert, Ken Birman, Douglas Schmidt, Proceedings of the Large-Scale Distributed Systems and Middleware Workshop (LADIS 2008), September, 2009
- GO: Platform Support For Gossip Applications., Ymir Vigfusson, Ken Birman, IEEE P2P 2009, September, 2009
- FLEXible Middleware And Transports (FLEXMAT) for Real-time Event Stream Processing (RT-ESP) Applications, Joe Hoffert, Douglas Schmidt, July, 2009
- Implementing Reliable Event Streams in Large Systems via Distributed Data Flows and Recursive Delegation., Ken Birman, Krzysztof Ostrowski, 3rd ACM International Conference on Distributed Event-Based Systems (DEBS 2009)., July, 2009
- Hardware Authentication Leveraging Performance Limits in Detailed Simulations and Emulations, Daniel Y. Deng, Andrew H. Chan, and G. Edward Suh, Proceedings of the 46th Design Automation Conference (DAC'09), July, 2009
- Slicing Distributed Systems, Ymir Vigfusson, Robbert van Renesse, Ken Birman, TRANSACTIONS ON COMPUTERS, SPECIAL SECTION, July, 2009
- ASPIER: An Automated Framework for Verifying Security Protocol Implementations, S. Chaki, A. Datta, 22nd IEEE Computer Security Foundations Symposium, July, 2009
- The Price of Uncertainty in Security Games, Jens Grossklags, Benjamin Johnson, Nicolas Christin, Proceedings (online) of the 8th Workshop on Economics of Information Security, June, 2009
- Live Distributed Objects for Service Oriented Collaboration, Ken Birman, Daniel Freedman, Krzysztof Ostrowski, Third International Conference on Intelligent Technologies for Interactive Entertainment (Intetain '09),, June, 2009
- Respectful Cameras: Detecting Visual Markers in Real-Time to Address Privacy Concerns, Jeremy Schiff, Marci Meingast, Deirdre Mulligan, Shankar Sastry, Ken Goldberg, Protecting Privacy in Video Surveillance, Andrew W. Senior, Springer., June, 2009
- Stealthy Poisoning Attacks on PCAbased Anomaly Detectors, B. Rubinstein, B. Nelson, L. Huang, A. Joseph, S. Lau, S. Rao, N. Taft, and J. D. Tygar, June, 2009
- CLAMP: Practical Prevention of Large-Scale Data Leaks, Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David Andersen, Adrian Perrig, Proceedings of IEEE Symposium on Security and Privacy, May, 2009
- A Logic of Secure Systems and its Application to Trusted Computing, Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kaynar, Proceedings of 30th IEEE Symposium on Security and Privacy, May, 2009
- TRUST Annual Report 2008-2009, Faculty and Staff, May, 2009
- Secure encrypted-data aggregation for wireless sensor networks, Shiuhpyng Winston Shieh, Shih-I Eric Huang, Doug Tygar, ACM journal of Wireless Networks, May, 2009
- • Automatic Dimension Inference and Checking for Object-Oriented Programs, Sudheendra Hangal and Monica S. Lam, 31st International Conference on Software Engineering, May, 2009
- Reducing Power Consumption with Relaxed Quasi Delay-Insensitive Circuits, Christopher LaFrieda, Rajit Manohar, IEEE International Symposium on Asynchronous Circuits and Systems, May, 2009
- A Logic of Secure Systems and its Application to Trusted Computing, A. Datta, J. Franklin, D. Garg, D. Kaynar, 30th IEEE Symposium on Security and Privacy, May, 2009
- Ethics in Botnet Research, Aaron Burstein, 21, April, 2009
- Composite Intrusion Detection in Process Control Networks, Julian L. Rrushi, University of Milano, April, 2009
- It is a Dangerous World Out There - The Interplay of Security, Safety and Policy, Sigurd Meldal, 6, March, 2009
- It is a Dangerous World Out There - The Interplay of Security, Safety and Policy, Sigurd Meldal, IEEE IACC 2009, Deepak Garg, 6, March, 2009
- .Smoke and Mirrors: Reflecting Files at a Geographically Remote Location Without Loss of Performance, Hakim Weatherspoon, Lakshmi Ganesh, Tudor Marian, Mahesh Balakrishnan, Ken Birman, 7th USENIX Conference on File and Storage Technologies, February, 2009
- Co-design Environment for Secure Embedded Systems, Matthew Eby, Janos Laszlo Mathe, Jan Werner, Gabor Karsai, Sandeep Neema, Janos Sztipanovits, Yuan Xue, February, 2009
- Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication, C. Karlof, J. D. Tygar, and D. Wagner, February, 2009
- Blue versus Red: Towards a model of distributed security attacks, Neal Fultz and Jens Grossklags, Proceedings of the Thirteenth International Conference Financial Cryptography and Data Security, February, 2009
- Adaptively Parallelizing Distributed Range Queries., Ymir Vigfusson, VLDB Conference. Lyon, France. August, 2009
- Maintaining QoS for Publish/Subscribe Middleware in Dynamic Environments, Joe Hoffert, Douglas Schmidt, 3rd ACM International Conference on Distributed Event-Based Systems, 2009
- SmartFuzz and MetaFuzz, David A Molnar, David Wagner, University of California Berkeley, 2009
- Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication, Chris Karlof, Doug Tygar, David Wagner, Sixteenth Annual Network and Distributed Systems Security Symposium, 2009
- Storing and Accessing Live Mashup Content in the Cloud, Ken Birman, Krzysztof Ostrowski, 3rd ACM SIGOPS International Workshop on Large Scale Distributed Systems and Middleware (LADIS 2009)., 2009
- Quantitative Measurement Optimization-based Routing Restoration Strategies for Multi-hop Wireless Networks, Shanshan Jiang, Yuan Xue, the 4th IEEE Workshop on Wireless Mesh Networks (WiMesh), co-located with SECON, 2009
- Adaptive Voice Spam Control with User Behavior Analysis, Yan Bai, Xiao Su, Bharat Bhargava, Proc. 11th IEEE Int'l Conf. on High Performance Computing and Communications, 354-361, 2009
- Providing Survivability against Jamming Attack via Joint Dynamic Routing and Channel Assignment, Shanshan Jiang, Yuan Xue, Proceedings of the 7th International Workshop on the Design of Reliable Communication Networks (DRCN), 2009
- Optimal Wireless Network Restoration Under Jamming Attack, Shanshan Jiang, Yuan Xue, Proceedings of the 18th International Conference on Computer Communications and Networks (ICCCN), 2009
- Secrecy and Reliability using Raptor Codes in the Presence of a Wiretapper in a Multiple Path Wireless Network, Anna Kacewicz, Stephen Wicker, IEEE WCSP, 2009
- Robust Medical Data Delivery for Wireless Pervasive Healthcare, Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy, Proceedings of the 2nd International Workshop on Smart Homes for Tele-Health (SmarTel), 2009
- Balancing Gossip Exchanges in Networks with Firewalls, Robbert van Renesse, Balancing Gossip Exchanges in Networks with Firewalls, 2009
- Providing QoS Support for Wireless Remote Healthcare System, Shanshan Jiang, Yuan Xue, Annarita Giani, Ruzena Bajcsy, Workshops on Multimedia Aspects in Pervasive Healthcare, held in conjunction with the IEEE International Conference on Multimedia & Expo (ICME), 2009
- A Wireless Body Sensor Network for the Prevention and Management of Asthma, Edmund Y. W. Seto, Annarita Giani, Victor Shia, Curtis Wang, Posu Yan, Allen Y. Yang, Michael Jerrett, Ruzena Bajcsy, of Industrial Embedded Systems SIES 2009 - Special Session on Health-care, 2009
- The Monoculture Risk Put into Context, Fred Schneider, Ken Birman, IEEE Security & Privacy Magazine, 2009
- Automatic Dimension Inference and Checking for Object-Oriented Programs, Sudheendra Hangal and Monica S. Lam, International Conference on Software Engineering, 2009
- DexterNet: An Open Platform for Heterogeneous Body Sensor Networks and Its Applications,, Philip Kuryloski , Annarita Giani, Roberta Giannantonio , Katherine Gilani , Raffaele Gravina, Ville-Pekka Sepp, Edmund Seto , Victor Shia, Curtis Wang , Posu Yan , Allen Y. Yang , Jari Hyttinen , Shankar Sastry , Stephen Wicker, Ruzena Bajcsy, of Body sensor Network, 2009
- Trustworthiness as a Limitation on Network Neutrality, Fred Schneider, Aaron Burstein, Federal Communications Law Journal, 61, 2009
- Trustworthiness as a Limitation on Network Neutrality, Aaron Burstein, Fred Schneider, Federal Communications Law Journal, 61, 3, 2009
- On Voting Machine Design for Verification and Testability, Cynthia Sturton, Susmit Jha, Sanjit Seshia, David Wagner, Conference on Computer and Communications Security, 2009
- Misleading learners: Co-opting your spam filter, B. Nelson, M. Barreno, F. Chi, A. Joseph, B. Rubinstein, U. Saini, C. Sutton, D. Tygar, K. Xia, Springer, 17-51, 2009
- Quantifying Information Flow with Beliefs, Andrew C. Myers, Michael R. Clarkson, Fred Schneider, Journal of Computer Security, 2009
- Predicting Social Security Numbers from Public Data, Alessandro Acquisti, Proceedings of the National Academy of Science, 2009
- A Model-Integrated, Guideline-Driven, Clinical Decision-Support System, Janos Laszlo Mathe, Jason Martin, Peter Miller, Akos Ledeczi, Liza Weavind, Andras Nadas, Anne Miller, David Maron, Janos Sztipanovits, IEEE Software, 26, 4, 54-61, 2009
Found 82 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.