Seguir
Douglas Reeves
Douglas Reeves
Professor of Computer Science, N.C. State University
Dirección de correo verificada de ncsu.edu
Título
Citado por
Citado por
Año
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
8662002
Evaluation of multicast routing algorithms for real-time communication on high-speed networks
HF Salama, DS Reeves, Y Viniotis
IEEE Journal on Selected Areas in Communications 15 (3), 332-345, 1997
5831997
Real-time communication in packet-switched networks
CM Aras, JF Kurose, DS Reeves, H Schulzrinne
Proceedings of the IEEE 82 (1), 122-139, 1994
4461994
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
4302004
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
X Wang, DS Reeves
Proceedings of the 10th ACM conference on Computer and communications …, 2003
3652003
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
2752010
Analyzing intensive intrusion alerts via correlation
P Ning, Y Cui, DS Reeves
Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002
2632002
A distributed algorithm for delay-constrained unicast routing
HF Salama, DS Reeves, Y Viniotis
Proceedings of INFOCOM'97 1, 84-91, 1997
2581997
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
X Wang, DS Reeves, SF Wu
Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002
2312002
Sleepy watermark tracing: An active network-based intrusion response framework
X Wang, DS Reeves, SF Wu, J Yuill
Trusted Information: The New Decade Challenge 16, 369-384, 2001
2302001
A distributed algorithm for delay-constrained unicast routing
DS Reeves, HF Salama
IEEE/ACM Transactions on networking 8 (2), 239-250, 2000
2282000
Metaaware: Identifying metamorphic malware
Q Zhang, DS Reeves
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
2032007
On the secrecy of timing-based active watermarking trace-back techniques
P Peng, P Ning, DS Reeves
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-349, 2006
2032006
Defending against sybil attacks in sensor networks
Q Zhang, P Wang, DS Reeves, P Ning
25th ieee international conference on distributed computing systems …, 2005
1912005
Deriving common malware behavior through graph clustering
Y Park, D Reeves
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1612011
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1602007
A survey of statistical source models for variable-bit-rate compressed video
MR Izquierdo, DS Reeves
Multimedia systems 7, 199-213, 1999
1161999
Self-stabilizing structured ring topology p2p systems
A Shaker, DS Reeves
Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05), 39-46, 2005
1042005
Analyzing network traffic to detect self-decrypting exploit code
Q Zhang, DS Reeves, P Ning, SP Iyer
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
982007
Preventing denial of service attacks on quality of service
E Fulp, Z Fu, DS Reeves, SF Wu, X Zhang
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
972001
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20