Seguir
Douglas Reeves
Douglas Reeves
Professor of Computer Science, N.C. State University
Dirección de correo verificada de ncsu.edu
Título
Citado por
Citado por
Año
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
8632002
Evaluation of multicast routing algorithms for real-time communication on high-speed networks
HF Salama, DS Reeves, Y Viniotis
IEEE Journal on Selected Areas in Communications 15 (3), 332-345, 1997
5941997
Real-time communication in packet-switched networks
CM Aras, JF Kurose, DS Reeves, H Schulzrinne
Proceedings of the IEEE 82 (1), 122-139, 1994
4541994
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
4272004
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
X Wang, DS Reeves
Proceedings of the 10th ACM conference on Computer and communications …, 2003
3592003
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
2702010
Analyzing intensive intrusion alerts via correlation
P Ning, Y Cui, DS Reeves
Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002
2572002
A distributed algorithm for delay-constrained unicast routing
HF Salama, DS Reeves, Y Viniotis
Proceedings of INFOCOM'97 1, 84-91, 1997
2521997
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
X Wang, DS Reeves, SF Wu
Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002
2302002
A distributed algorithm for delay-constrained unicast routing
DS Reeves, HF Salama
IEEE/ACM Transactions on networking 8 (2), 239-250, 2000
2302000
Sleepy watermark tracing: An active network-based intrusion response framework
X Wang, DS Reeves, SF Wu, J Yuill
Trusted Information: The New Decade Challenge 16, 369-384, 2001
2262001
On the secrecy of timing-based active watermarking trace-back techniques
P Peng, P Ning, DS Reeves
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-349, 2006
2022006
Metaaware: Identifying metamorphic malware
Q Zhang, DS Reeves
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
1962007
Defending against sybil attacks in sensor networks
Q Zhang, P Wang, DS Reeves, P Ning
25th ieee international conference on distributed computing systems …, 2005
1872005
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1592007
Deriving common malware behavior through graph clustering
Y Park, D Reeves
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1532011
A survey of statistical source models for variable-bit-rate compressed video
MR Izquierdo, DS Reeves
Multimedia systems 7, 199-213, 1999
1161999
Self-stabilizing structured ring topology p2p systems
A Shaker, DS Reeves
Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05), 39-46, 2005
1032005
Analyzing network traffic to detect self-decrypting exploit code
Q Zhang, DS Reeves, P Ning, SP Iyer
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
1012007
The delay-constrained minimum spanning tree problem
HF Salama, DS Reeves, Y Viniotis
Proceedings Second IEEE Symposium on Computer and Communications, 699-703, 1997
961997
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20