Ira S. Moskowitz

Orcid: 0000-0002-9862-6452

According to our database1, Ira S. Moskowitz authored at least 76 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Responsible Integration of Large Language Models (LLMs) in Navy Operational Plan Generation.
Proceedings of the AAAI 2024 Spring Symposium Series, 2024

2023
A Quantum-like Model of Interdependence for Embodied Human-Machine Teams: Reviewing the Path to Autonomy Facing Complexity and Uncertainty.
Entropy, September, 2023

2022
Mutual Information and Multi-Agent Systems.
Entropy, December, 2022

2021
Agent Team Action, Brownian Motion and Gambler's Ruin.
Proceedings of the Engineering Artificially Intelligent Systems, 2021

2018
Managing risk in high assurance systems by optimizing topological resources.
J. Softw. Evol. Process., 2018

Valuable Information and the Internet of Things.
Proceedings of the 2018 AAAI Spring Symposia, 2018

Meta-Agents: Managing Dynamism in the Internet of Things (IoT) with Multi-agent Networks.
Proceedings of the 2018 AAAI Spring Symposia, 2018

Steganographic Internet of Things: Graph Topology Timing Channels.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Human Information Interaction, Artificial Intelligence, and Errors.
Proceedings of the Autonomy and Artificial Intelligence: A Threat or Savior?, 2017

2016
Modeling User Behaviors to Enable Context-Aware Proactive Decision Support.
Proceedings of the Context-Enhanced Information Fusion, 2016

Network topology and mean infection times.
Soc. Netw. Anal. Min., 2016

Using Network Topology to Supplement High Assurance Systems.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

Bayesian occupancy grid mapping via an exact inverse sensor model.
Proceedings of the 2016 American Control Conference, 2016

Human Caused Bifurcations in a Hybrid Team - A Position Paper.
Proceedings of the 2016 AAAI Spring Symposia, 2016

Fortification Through Topological Dominance: Using Hop Distance and Randomized Topology Strategies to Enhance Network Security.
Proceedings of the 2016 AAAI Spring Symposia, 2016

Human Information Interaction, Artificial Intelligence, and Errors.
Proceedings of the 2016 AAAI Spring Symposia, 2016

2015
A Survey of Community Detection Algorithms Based On Analysis-Intent.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

SINR-based scheduling for minimum latency broadcast.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

A Network Science Approach to Entropy and Training.
Proceedings of the 2015 AAAI Spring Symposia, 2015

A Thermodynamics of Teams: Towards a Robust Computational Model of Autonomous Teams.
Proceedings of the 2015 AAAI Spring Symposia, 2015

2014
Non-data aided doppler shift estimation for underwater acoustic communication.
Proceedings of the 10th International Conference on Communications, 2014

Network Traffic Anomalies, Natural Language Processing, and Random Matrix Theory.
Proceedings of the Complex Adaptive Systems 2014 Conference, 2014

Discovering and analyzing deviant communities: Methods and experiments.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Joint optimal placement and energy allocation of underwater sensors in a tree topology.
Proceedings of the 48th Annual Conference on Information Sciences and Systems, 2014

2013
Capacity of an intensity interferometry channel.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

On the optimal placement of underwater sensors in a tree shaped multi-hop hierarchical network.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013

2012
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels.
IEEE Trans. Inf. Forensics Secur., 2012

Algebraic information theory and stochastic resonance for binary-input binary-output channels.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
On the Partial Ordering of the Discrete Memoryless Channels Arising in Cooperative Sensor Networks.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

On the baseband communication performance of physical layer steganography.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2010
Algebraic information theory for binary channels.
Theor. Comput. Sci., 2010

Directed information and the NRL Network Pump.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Approximations for the capacity of binary input discrete memoryless channels.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

Eigenvalue characterization of the capacity of discrete memoryless channels with invertible channel matrices.
Proceedings of the 44th Annual Conference on Information Sciences and Systems, 2010

2009
An approximation of the capacity of a simple channel.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

2008
Practical Covert Channel Implementation through a Timed Mix-Firewall.
Proceedings of the 2008 IEEE International Performance, 2008

2006
Difference of Sums Containing Products of Binomial Coefficients and Their Logarithms.
SIAM Rev., 2006

Noisy Timing Channels with Binary Inputs and Outputs.
Proceedings of the Information Hiding, 8th International Workshop, 2006

Timing channels, anonymity, mixes, and spikes.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006

2005
Composite signature based watermarking for fingerprint authentication.
Proceedings of the 7th workshop on Multimedia & Security, 2005

The Pump: A Decade of Covert Fun.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Anonymity and Covert Channels in Simple Timed Mix-Firewalls.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

2003
An Agent-Based Approach to Inference Prevention in Distributed Database Systems.
Int. J. Artif. Intell. Tools, 2003

Covert channels and anonymizing networks.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Metrics for Trafic Analysis Prevention.
Proceedings of the Privacy Enhancing Technologies, Third International Workshop, 2003

2002
Capacity is the wrong paradigm.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis.
Proceedings of the Information Hiding, 5th International Workshop, 2002

A Study of Inference Problems in Distributed Databases.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Randomly roving agents for intrusion detection.
Proceedings of the Database and Application Security XV, 2001

2000
A new paradigm hidden in steganography.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

An Integrated Framework for Database Privacy Protection.
Proceedings of the Data and Application Security, 2000

1999
An Entropy-Based Framework for Database Inference.
Proceedings of the Information Hiding, Third International Workshop, 1999

A Strategy for an MLS Workflow Management System.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1998
An Analysis of the Timed Z-Channel.
IEEE Trans. Inf. Theory, 1998

Design and Assurance Strategy for the NRL Pump.
Computer, 1998

Parsimonious Downgrading and Decision Trees Applied to the Inference Problem.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

Bayesian Methods to the Database Inference Problem.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
An insecurity flow model.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

Critical analysis of security in voice hiding techniques.
Proceedings of the Information and Communication Security, First International Conference, 1997

An Architecture for Multilevel Secure Interoperability.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
A Network Pump.
IEEE Trans. Software Eng., 1996

Covert Channels - A Context-Based View.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

A framework for MLS interoperability.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

A Case Study Of Two Nrl Pump Prototypes.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
A network version of the Pump.
Proceedings of the 1995 IEEE Symposium on Security and Privacy, 1995

The Modulated-Input Modulated-Output Model.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Simple timing channels.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

1993
Information Theory (Robert B. Ash).
SIAM Rev., 1993

A Pump for Rapid, Reliable, Secure Communication.
Proceedings of the CCS '93, 1993

1992
The channel capacity of a certain noisy timing channel.
IEEE Trans. Inf. Theory, 1992

The influence of delay upon an idealized channel's bandwidth.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

A classical Automata Approach to Noninterference Type Problems.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
Variable Noise Effects Upon a Simple Timing Channel.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

Analysis of a Storage Channel in the Two-Phase Commit Protocol.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Quotient States and Probabilistic Channels.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990


  Loading...