William Yurcik
Orcid: 0009-0004-8453-3898Affiliations:
- University of Illinois, USA
According to our database1,
William Yurcik
authored at least 101 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Cybersecurity Monitoring/Mapping of USA Healthcare (All Hospitals) - Magnified Vulnerability due to Shared IT Infrastructure, Market Concentration, & Geographical Distribution.
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
Position Paper: Personal Experience in the Technology Opportunities and Associated Risks of Healthcare Challenges in a Continuing Care Retirement Community (CCRC).
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2008
Proceedings of the 22st International Workshop on Principles of Advanced and Distributed Simulation, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration.
Interactions, 2007
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
CoRR, 2007
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
2006
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
CoRR, 2006
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security)
CoRR, 2006
CoRR, 2006
Tool update: <i>NVisionIP</i> improvements (difference view, sparklines, and shapes).
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
Tool update: <i>visflowconnect-IP</i> with advanced filtering from usability testing.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection Standards.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Proceedings of the Data Mining, 2006
NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
2005
CoRR, 2005
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut
CoRR, 2005
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market
CoRR, 2005
IEEE Commun. Mag., 2005
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers.
Proceedings of the Internet and Network Economics, First International Workshop, 2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
Proceedings of the 2005 workshop on Computer architecture education, 2005
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
The evolution of storage service providers: techniques and challenges to outsourcing storage.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Protecting multimedia data in storage: a survey of techniques emphasizing encryption.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions.
Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), 2005
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
2004
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
CoRR, 2004
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
VisFlowConnect: netflow visualizations of link relationships for security situational awareness.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
NVisionIP: netflow visualizations of system state for security situational awareness.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
Proceedings of the IEEE International Conference on Systems, 2004
Proceedings of the 12th International Workshop on Modeling, 2004
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
VisFlowConnect: providing security situational awareness by visualizing network traffic flows.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003.
Proceedings of the ICETE 2004, 2004
Proceedings of the Financial Cryptography, 2004
2003
ACM SIGCSE Bull., 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
2002
IEEE Technol. Soc. Mag., 2002
Special issue on specialized computer architecture simulators that see the present and may hold the future.
ACM J. Educ. Resour. Comput., 2002
Proceedings of the 2002 workshop on Computer architecture education, 2002
PECTOPAH: promoting education in computer technology using an open-ended pedagogically adaptable hierarchy.
Proceedings of the 2002 workshop on Computer architecture education, 2002
Proceedings of the 2002 workshop on Computer architecture education, 2002
Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education, 2002
Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002
Proceedings of the 2002 International Symposium on Technology and Society, 2002
Proceedings of the 2002 International Symposium on Technology and Society, 2002
Proceedings of the 2002 International Symposium on Technology and Society, 2002
2001
IEEE Softw., 2001
ACM SIGCSE Bull., 2001
Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim.
ACM J. Educ. Resour. Comput., 2001
Proceedings of the 33nd conference on Winter simulation, 2001
Proceedings of the 12th IEEE Visualization Conference, 2001
Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, 2001
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001
2000
Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 2000
Proceedings of the Networked Group Communication, 2000
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000
Providing guaranteed assurance to connection-oriented group communications using disjoint routing.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000
1999
Proceedings of the Networked Group Communication, 1999
1998
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998