Thomas Daniels

Affiliations:
  • Iowa State University, Ames, IA, USA
  • Purdue University, West Lafayette, IN, USA (Ph.D., 2002)


According to our database1, Thomas Daniels authored at least 30 papers between 1999 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing Environments.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

2021
T-PKI for Anonymous Attestation in TPM.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

ARA: A Wireless Living Lab Vision for Smart and Connected Rural Communities.
Proceedings of the WiNTECH'21: Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, 2021

2016
Device Measurement and Origin of Variation.
Proceedings of the Digital Fingerprinting, 2016

2012
Physical-Layer Identification of Wired Ethernet Devices.
IEEE Trans. Inf. Forensics Secur., 2012

Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems.
Proceedings of the Security and Privacy in Communication Networks, 2012

2010
Node Behavior Based Fast Malware Detection for Enterprise Networks.
Proceedings of the Global Communications Conference, 2010

2009
Correlation Based Node Behavior Profiling for Enterprise Network Security.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Xen worlds: leveraging virtualization in distance education.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

P2P botnet detection using behavior clustering & statistical tests.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

2008
A Graph Based Approach Toward Network Forensics Analysis.
ACM Trans. Inf. Syst. Secur., 2008

The role of virtualization in computing education.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008

SCWIM an Integrity Model for SOA Networks.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Reference models for network data anonymization.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
Special issue on secure knowledge management.
Inf. Syst. Frontiers, 2007

2006
A testbed for evaluation and analysis of stepping stone attack attribution techniques.
Proceedings of the 2nd International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2006), 2006

Diffusion and graph spectral methods for network forensic analysis.
Proceedings of the New Security Paradigms Workshop 2006, 2006

Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach.
Proceedings of the Network and Distributed System Security Symposium, 2006

Monitor placement for stepping stone analysis.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

A Simple Framework for Distributed Forensics.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Network Forensics Analysis with Evidence Graphs.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

Building Evidence Graphs for Network Forensics Analysis.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
A functional reference model of passive systems for tracing network traffic.
Digit. Investig., 2004

Topology Based Packet Marking.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2002
Reference models for the concealment and observation of origin identity in store -and -forward networks
PhD thesis, 2002

Digging For Worms, Fishing For Answers.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2000
Network traffic tracking systems: folly in the large?
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities.
J. Comput. Secur., 1999


  Loading...