Seguir
Douglas H Summerville
Douglas H Summerville
Binghamton University, State University of New York
Dirección de correo verificada de binghamton.edu
Título
Citado por
Citado por
Año
Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices
DH Summerville, KM Zach, Y Chen
IEEE International Performance Computing and Communications Conference, 2015
1822015
A survey on the application of FPGAs for network infrastructure security
H Chen, Y Chen, DH Summerville
IEEE Communications Surveys & Tutorials 13 (4), 541-561, 2010
982010
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
J Feng, Y Chen, D Summerville, WS Ku, Z Su
2011 IEEE Consumer Communications and Networking Conference (CCNC), 521-522, 2011
582011
Fast DDP-based ciphers: from hardware to software
ND Goots, NA Moklovyan, PA Moldovyanu, DH Summerville
2003 46th Midwest Symposium on Circuits and Systems 2, 770-773, 2003
362003
A fair multi-party non-repudiation scheme for storage clouds
J Feng, Y Chen, DH Summerville
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
292011
Prevention of information attacks by run-time detection of self-replication in computer codes
V Skormin, A Volynkin, D Summerville, J Moronski
Journal of Computer Security 15 (2), 273-302, 2007
242007
Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”
VA Skormin, DH Summerville, JS Moronski
Computer Network Security: Second International Workshop on Mathematical …, 2003
232003
A programmable dynamic interconnection network router with hidden refresh
JG Delgado-Frias, J Nyathi, DH Summerville
IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1998
221998
Detection of anomalous network packets using lightweight stateless payload inspection
N Nwanze, D Summerville
2008 33rd IEEE Conference on Local Computer Networks (LCN), 911-918, 2008
212008
On Software Implementation of Fast DDP-based Ciphers.
NA Moldovyan, PA Moldovyanu, DH Summerville
Int. J. Netw. Secur. 4 (1), 81-89, 2007
192007
Two-stage decomposition of SNORT rules towards efficient hardware implementation
H Chen, DH Summerville, Y Chen
2009 7th International Workshop on Design of Reliable Communication Networks …, 2009
172009
Run-Time detection of malicious self-replication in binary executables
V Skormin, A Volynkin, D Summerville, J Moronski
Journal of Computer Security 15 (2), 273-301, 2007
172007
Evaluation of run-time detection of self-replication in binary executable malware
Volynkin, Skormin, Summerville, Moronski
2006 IEEE Information Assurance Workshop, 184-191, 2006
142006
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection
H Chen, T Gaska, Y Chen, D Summerville
Computers \& Electrical Engineering 39 (2), 295-308, 2013
132013
EEO: An efficient MDS-like RAID-6 code for parallel implementation
J Feng, Y Chen, D Summerville
2010 IEEE Sarnoff Symposium, 1-5, 2010
132010
Wireless networks security and cipher design based on data-dependent operations: Classification of the FPGA suitable controlled elements
N Moldovyan, A Moldovyan, M Eremeev, D Summerville
Proceedings of the CCCT 4, 123-128, 2004
132004
A VLSI interconnection network router using a D-CAM with hidden refresh
JG Delgado-Frias, J Nyathi, CL Miller, DH Summerville
Proceedings of the Sixth Great Lakes Symposium on VLSI, 246-251, 1996
121996
Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller II: Digital and Analog Hardware Interfacing
DH Summerville
Synthesis Lectures on Digital Circuits and Systems 4 (1), 1-139, 2009
112009
Associative ternary cache for IP routing
JJ Rooney, JG Delgado-Frias, DH Summerville
IEE Proceedings-Computers and Digital Techniques 151 (6), 409-416, 2004
112004
Anomalous packet identification for network intrusion detection
DH Summerville, N Nwanze, VA Skormin
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
112004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20