Peter L. Reiher

Orcid: 0000-0002-5301-2246

Affiliations:
  • University of California, Los Angeles, USA


According to our database1, Peter L. Reiher authored at least 113 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic.
IEEE Trans. Dependable Secur. Comput., 2024

End-to-End Detection of Middlebox Interference.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

2023
Adaptive Distributed Filtering of DDoS Traffic on the Internet.
CoRR, 2023

A Method for Summarizing and Classifying Evasive Malware.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Toward Adaptive DDoS-Filtering Rule Generation.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
On Capturing DDoS Traffic Footprints on the Internet.
IEEE Trans. Dependable Secur. Comput., 2022

2020
An exploration of targeted provenance for reliability.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
RIoT: A Rapid Exploit Delivery Mechanism against IoT Devices Using Vehicular Botnets.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

SHIELDNET: An Adaptive Detection Mechanism against Vehicular Botnets in VANETs.
Proceedings of the 2019 IEEE Vehicular Networking Conference, 2019

On Multi-Point, In-Network Filtering of Distributed Denial-of-Service Traffic.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
PathFinder: Capturing DDoS Traffic Footprints on the Internet.
Proceedings of the 2018 IFIP Networking Conference and Workshops, 2018

BOTVEILLANCE: A Vehicular Botnet Surveillance Attack against Pseudonymous Systems in VANETs.
Proceedings of the 11th IFIP Wireless and Mobile Networking Conference, 2018

2017
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

RESECT: Self-Learning Traffic Filters for IP Spoofing Defense.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Ghost: Concealing vehicular botnet communication in the VANET control channel.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

Datacomp: Locally Independent Adaptive Compression for Real-World Systems.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

2015
Cashtags: Protecting the Input and Display of Sensitive Data.
Proceedings of the 24th USENIX Security Symposium, 2015

Mobile usage patterns and privacy implications.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

Scalable reactive vehicle-to-vehicle congestion avoidance mechanism.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Drawbridge: software-defined DDoS-resistant traffic engineering.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

End-to-end detection of compression of traffic flows by intermediaries.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Improving the security of Android inter-component communication.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

2012
Securing Legacy Mobile Medical Devices.
Proceedings of the Wireless Mobile Communication and Healthcare, 2012

Scaling Down Off-the-Shelf Data Compression: Backwards-Compatible Fine-Grain Mixing.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Controlling applications by managing network characteristics.
Proceedings of IEEE International Conference on Communications, 2012

Data Tethers: Preventing information leakage by enforcing environmental data access policies.
Proceedings of IEEE International Conference on Communications, 2012

Comparing the Power of Full Disk Encryption Alternatives.
Proceedings of the 2012 International Green Computing Conference, 2012

2011
A Dynamic Recursive Unified Internet Design (DRUID).
Comput. Networks, 2011

Investigating Energy and Security Trade-offs in the Classroom with the Atom LEAP Testbed.
Proceedings of the 4th Workshop on Cyber Security Experimentation and Test, 2011

Shield: DoS filtering using traffic deflecting.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

2010
Host-to-Host Congestion Control for TCP.
IEEE Commun. Surv. Tutorials, 2010

Security Exercises for the Online Classroom with DETER.
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010

2009
Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Secur. Comput., 2009

Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Securing data through avoidance routing.
Proceedings of the 2009 Workshop on New Security Paradigms, 2009

RAD: Reflector Attack Defense Using Message Authentication Codes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise.
IEEE Trans. Computers, 2008

Learning the valid incoming direction of IP packets.
Comput. Networks, 2008

Message from the SAUCE Workshop Organizing Technical Co-chairs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Improving User Satisfaction in a Ubiquitous Computing Application.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Johnny Appleseed: wardriving to reduce interference in chaotic wireless deployments.
Proceedings of the 11th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2008

The Smart Party: A Personalized Location-Aware Multimedia Experience.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
PARAID: A gear-shifting power-aware RAID.
ACM Trans. Storage, 2007

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication.
Simul., 2007

Automating DDoS Experimentation.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2007

When is service really denied?: a user-centric dos metric.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

Information protection via environmental data tethers.
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007

nan0sphere: Location-Driven Fiction for Groups of Users.
Proceedings of the Human-Computer Interaction. HCI Intelligent Multimodal Interaction Environments, 2007

Towards user-centric metrics for denial-of-service measurement.
Proceedings of the Workshop on Experimental Computer Science, 2007

2006
The <i>Conquest</i> file system: Better performance through a disk/persistent-RAM hybrid design.
ACM Trans. Storage, 2006

An Active Self-Optimizing Multiplayer Gaming Architecture.
Clust. Comput., 2006

Measuring denial Of service.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

A Framework for a Collaborative DDoS Defense.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks.
IEEE Trans. Dependable Secur. Comput., 2005

Introducing permuted states for analyzing conflict rates in optimistic replication.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Simulation and Analysis on the Resiliency and Efficiency of Malnets.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

Mobile Contagion: Simulation of Infection and Defense.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

2004
Electric-field-based routing: a reliable framework for routing in MANETs.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

Roam: A Scalable Replication System for Mobility.
Mob. Networks Appl., 2004

Resilient self-organizing overlay networks for security update delivery.
IEEE J. Sel. Areas Commun., 2004

A taxonomy of DDoS attack and DDoS defense mechanisms.
Comput. Commun. Rev., 2004

04441 Abstracts Collection - Mobile Information Management.
Proceedings of the Mobile Information Management, 24.-29. October 2004, 2004

04441 Executive Summary - Mobile Information Management.
Proceedings of the Mobile Information Management, 24.-29. October 2004, 2004

04441 Working Group - Research Issues in Mobile Transactions.
Proceedings of the Mobile Information Management, 24.-29. October 2004, 2004

04441 Working Group - Some Open Aspects of Mobile Ad-hoc NETwork, Peer-to-Peer, and Self-organizing Systems.
Proceedings of the Mobile Information Management, 24.-29. October 2004, 2004

2003
Alliance formation for DDoS defense.
Proceedings of the New Security Paradigms Workshop 2003, 2003

Securing nomads: the case for quarantine, examination, and decontamination.
Proceedings of the New Security Paradigms Workshop 2003, 2003

Source-End DDoS Defense.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Enabling Secure Ubiquitous Interactions.
Proceedings of the International Middleware Conference, 2003

Adaptation Planning for Active Networks.
Proceedings of the Active Networks, IFIP TC6 5th International Workshop, 2003

Detecting Insider Threats by Monitoring System Call Activity.
Proceedings of the IEEE Systems, 2003

DefCOM: Defensive Cooperative Overlay Mesh.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems.
SIGMOD Rec., 2002

Securing distributed adaptation.
Comput. Networks, 2002

Conquest: Better Performance Through a Disk/Persistent-RAM Hybrid File System.
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002

Simplifying automated hoarding methods.
Proceedings of the 5th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2002

SAVE: Source Address Validity Enforcement Protocol.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Attacking DDoS at the Source.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

Understanding the Behavior of the Conflict-Rate Metric in Optimistic Peer Replication.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Panda: Middleware to Provide the Benefits of Active Networks to Legacy Applications.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

Disseminating Security Updates at Internet Scale
Advances in Information Security 8, Springer, 2002

2001
Replication Requirements in Mobile Environments.
Mob. Networks Appl., 2001

The Bengal Database Replication System.
Distributed Parallel Databases, 2001

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona.
Proceedings of the Developing an Infrastructure for Mobile and Wireless Systems, 2001

Adapting Encrypted Data Streams in Open Architectures.
Proceedings of the 3rd Annual International Workshop on Active Middleware Services (AMS 2001), 2001

The Conquest File System's Life after Disks.
Proceedings of HotOS-VIII: 8th Workshop on Hot Topics in Operating Systems, 2001

Peer-through-Peer Communication for Information Logistics.
Proceedings of the Tagungsband der GI/OCG-Jahrestagung - 31. Jahrestagung der Gesellschaft für Informatik, Wirtschaft und Wissenschaft in der Network Economy, 2001

2000
A conceptual framework for network and client adaptation.
Mob. Networks Appl., 2000

URL Forwarding and Compression in Adaptive Web Caching.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

1999
The Remote Processing Framework for Portable Computer Power Saving.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Securing information transmission by redundancy.
Proceedings of the 1999 Workshop on New Security Paradigms, 1999

Peer Replication with Selective Control.
Proceedings of the Mobile Data Access, First International Conference, 1999

A simulation evaluation of optimistic replicated filing in mobile environments.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Conductor: A Framework for Distributed Adaptation.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

Command Management System for Next-Generation User Input.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

Roam: A Scalable Replication System for Mobile Computing.
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999

1998
Perspectives on Optimistically Replicated, Peer-to-Peer Filing.
Softw. Pract. Exp., 1998

Saving portable computer battery power through remote process execution.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998

Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication.
Proceedings of the Advances in Database Technologies, 1998

Measuring the Quality of Service of Optimistic Replication.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

1997
Experience with an Automated Hoarding System.
Pers. Ubiquitous Comput., 1997

1994
Resolving File Conflicts in the Ficus File System.
Proceedings of the USENIX Summer 1994 Technical Conference, 1994

An Analysis of Trace Data for Predictive File Caching in Mobile Computing.
Proceedings of the USENIX Summer 1994 Technical Conference, 1994

1991
Supercritical speedup.
Proceedings of the Proceedings 24th Annual Simulation Symposium (ANSS-24 1991), 1991

1990
Parallel simulation using the time warp operating system.
Proceedings of the 22th Winter Simulation Conference, 1990

A time warp implementation of Sharks World.
Proceedings of the 22th Winter Simulation Conference, 1990

1989
The Performance of a Distributed Combat Simulation with the Time Warp Operating System.
Concurr. Pract. Exp., 1989

Limitation of optimism in the time warp operating system.
Proceedings of the 21st Winter Simulation Conference, 1989

1988
The status of the time warp operating system.
Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, 1988

1987
Locus Naming in a Large Scale Environment.
Proceedings of the Kommunikation in Verteilten Systemen, 1987


  Loading...