Douglas S. Reeves

Orcid: 0000-0002-1775-0639

Affiliations:
  • North Carolina State University, Raleigh, USA


According to our database1, Douglas S. Reeves authored at least 83 papers between 1987 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network.
Proceedings of the IEEE Global Communications Conference, 2021

2018
Goalkeeper: Comprehensive process enforcement from the hypervisor.
Comput. Secur., 2018

Furnace: Self-service Tenant VMI for the Cloud.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Hyperagents: Migrating Host Agents to the Hypervisor.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Computer-Aided Human Centric Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

T-Chain: A General Incentive Scheme for Cooperative Computing.
IEEE/ACM Trans. Netw., 2017

Arav: monitoring a cloud's virtual routers.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2015
Traceback and Anonymity
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4939-3441-6, 2015

EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

2013
Deriving common malware behavior through graph clustering.
Comput. Secur., 2013

2012
Winnowing: Protecting P2P systems against pollution through cooperative index filtering.
J. Netw. Comput. Appl., 2012

Interval-based flow watermarking for tracing interactive traffic.
Comput. Networks, 2012

AntiLiar: Defending against cheating attacks in mesh based streaming.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

2011
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.
IEEE Trans. Dependable Secur. Comput., 2011

Defending against Sybil Nodes in BitTorrent.
Proceedings of the NETWORKING 2011, 2011

Adaptive neighbor management for cooperative P2P video-on-demand streaming.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Deriving common malware behavior through graph clustering.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
How the Public Views Strategies Designed to Reduce the Threat of Botnets.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Highly available component sharing in large-scale multi-tenant cloud systems.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010

Fast malware classification by automated behavioral graph matching.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

AntiBot: Clustering Common Semantic Patterns for Bot Detection.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

User identification via process profiling: extended abstract.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Identification of Bot Commands by Run-Time Execution Monitoring.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Edge Reconfigurable Optical Network (ERON): Enabling dynamic sharing of static lightpaths.
Proceedings of the 5th International ICST Conference on Broadband Communications, 2008

Bluetooth Network-Based Misuse Detection.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Tracing Traffic through Intermediate Hosts that Repacketize Flows.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Analyzing network traffic to detect self-decrypting exploit code.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A <i>k</i>-anonymous communication protocol for overlay networks.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Strategic deployment of network monitors for attack attribution.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

MetaAware: Identifying Metamorphic Malware.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Self-Stabilizing Structured Ring Topology P2P Systems.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Secure Address Auto-con.guration for Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Network Access Control for Mobile Ad-Hoc Networks.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Defending against Sybil Attacks in Sensor Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Techniques and tools for analyzing intrusion alerts.
ACM Trans. Inf. Syst. Secur., 2004

Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic.
Telecommun. Syst., 2004

Bandwidth provisioning and pricing for networks with multiple classes of service.
Comput. Networks, 2004

Explicit proactive handoff with motion prediction for mobile IP.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

Storage-Efficient Stateless Group Key Revocation.
Proceedings of the Information Security, 7th International Conference, 2004

Certificate Recommendations to Improve the Robustness of Web of Trust.
Proceedings of the Information Security, 7th International Conference, 2004

Improving Robustness of PGP Keyrings by Conflict Detection.
Proceedings of the Topics in Cryptology, 2004

Reasoning About Complementary Intrusion Evidence.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Analyzing Intensive Intrusion Alerts via Correlation.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

The Economic Impact of Network Pricing Intervals.
Proceedings of the From QoS Provisioning to QoS Charging, 2002

Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
Proceedings of the Computer Security, 2002

Constructing attack scenarios through correlation of intrusion alerts.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Optimal Web cache sizing: scalable methods for exact solutions.
Comput. Commun., 2001

Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets.
Proceedings of the Networking, 2001

Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
A distributed algorithm for delay-constrained unicast routing.
IEEE/ACM Trans. Netw., 2000

Parallel image processin gwith the block data paralel architecture.
IBM J. Res. Dev., 2000

QoS Rewards and Risks: A Multi-market Approach to Resource Allocation.
Proceedings of the NETWORKING 2000, 2000

A Simple Refinement of Slow-Start of TCP Congestion Control.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1999
A Survey of Statistical Source Models for Variable-bit-rate Compressed Video.
Multim. Syst., 1999

1998
Distributed Network Flow Control based on Dynamic Competitive Markets.
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998

1997
Evaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks.
IEEE J. Sel. Areas Commun., 1997

A course on multimedia technology for computer science and computer engineering students.
Proceedings of the 28th SIGCSE Technical Symposium on Computer Science Education, 1997

The delay-constrained minimum spanning tree problem.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

A Distributed Algorithm for Delay-Constrained Unicast Routing.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

On-line Dynamic Bandwidth Allocation.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
Parallel image processing with the block data parallel architecture.
Proc. IEEE, 1996

Calypso: an implementation of the order graph method.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

1995
Routing and admission control algorithms for multimedia traffic.
Comput. Commun., 1995

Evaluation of multicast routing algorithms for real-time communication on high-speed networks.
Proceedings of the High Performance Networking VI, 1995

1994
Real-time communication in packet-switched networks.
Proc. IEEE, 1994

Adaptive Routing for Hypercube Multiprocessors: a Performance Study.
Int. J. High Speed Comput., 1994

Guest Editors' Introduction: Parallel and Distributed Real-Time Computing.
IEEE Parallel Distributed Technol. Syst. Appl., 1994

A Programmable Simulator for Analyzing the Block Data Flow Architecture.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

An Evalutaion of Routing and Admission Control Algorithms for Real-Time Traffic in Packet-Switched Networks.
Proceedings of the High Performance Networking V, Proceedings of the IFIP TC6/WG6.4 Fifth International Conference on High Performance Networking, Grenoble, France, 27 June, 1994

End-to-end guaranteed QoS with statistical multiplexing for ATM networks.
Proceedings of the ATM Networks, 1994

1992
The TInMANN VLSI chip.
IEEE Trans. Neural Networks, 1992

The Segmented Bus: A Dynamically Segmentable Interprocessor Communication Network For Intelligent Mobile Robot Systems.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 1992

1991
The Interlocking Bus Network for Fault-Tolerant Processor Arrays.
Proceedings of the Fault-Tolerant Computing Systems, Tests, Diagnosis, 1991

1990
VLSI Implementation of TInMANN.
Proceedings of the Advances in Neural Information Processing Systems 3, 1990

Using the stuck-at fault model: how well does it work?
Proceedings of the 28th Annual Southeast Regional Conference, 1990

1987
Fast Methods for Switch-Level Verification of MOS Circuits.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1987


  Loading...