Publications
2022
(7)
In Proceedings of 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), 2022.
In RAID, 2022.
In Privacy Enhancing Technologies Symposium (PETS), 2022.
In Cyber Security Experimentation and Test (CSET), 2022.
In Globecom, 2022.
In 31st ACM International Conference on Information & Knowledge Management (CKIM), 2022.
In CoNext, 2022.
2020
(6)
In Proceedings of Special Interest Group on Computer Science Education Symposium (SIGCSE), 2020.
In 27th Annual Network and Distributed System Security Symposium, NDSS, pages 23–26, 2020.
In Workshop on Cyber Range Technologies and Applications (CACOE), 2020.
In Proceedings of the ACM Internet Measurement Conference, pages 360–369, 2020.
In Proceedings of the IEEE CloudNet, 2020.
In Proceedings of International Networking Conference (INC), 2020.
2019
(6)
. 2019.
ACM Transactions on Privacy and Security (TOPS), 22(2): 11. 2019.
Technical Report ISI-TR-737, 2019.
In Humans and CyberSecurity Workshop (HACS), 2019.
In Midscale Education and Research Infrastructure and Tools (MERIT) Workshop, pages 1–2, 2019. IEEE
In Midscale Education and Research Infrastructure and Tools (MERIT) Workshop, pages 1–2, 2019. IEEE
2018
(7)
ACM Transactions on Privacy and Security (TOPS), 21(1): 2. 2018.
Korea Institute of Information Security and Cryptology, 28(1): 29–35. 2018.
In ACM Conference on Human Factors in Computing Systems (CHI), 2018.
In Proceedings of Cyber Security Experimentation and Test (CSET) Workshop, 2018.
In Proceedings of Cyber Security Experimentation and Test (CSET) Workshop, 2018.
In International Symposium on Research in Attacks, Intrusions, and Defenses (RAID), pages 250–270, 2018. Springer
In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC), pages 266–277, 2018. ACM
2017
(6)
In ACM SDNNFV Security Workshop, 2017.
In Traffic Measurement and Analysis Conference (TMA), 2017.
In Proceedings of the Symposium on Applied Computing, pages 1703–1710, 2017. ACM
In Learning from Authoritative Security Experiment Results (LASER) Workshop, 2017. USENIX Association
In Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC), pages 566–576, 2017. ACM
In Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC), pages 474–485, 2017. ACM
2016
(3)
2015
(5)
ACM SIGCOMM Computer Communication Review, 44(4): 349–350. 2015.
IEEE Security & Privacy, 13(2): 75–80. 2015.
In 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15), 2015.
IEEE Security & Privacy, 13(3): 63–69. 2015.
In 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops, pages 56–63, 2015. IEEE
2014
(7)
Computer Networks. 2014.
In Symposium on Usable Privacy and Security (SOUPS), 2014.
2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). 2014.
In 7th Workshop on Cyber Security Experimentation and Test (CSET 14), 2014.
In 23rd USENIX Security Symposium (USENIX Security 14), pages 271–285, 2014.
In Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, pages 13–20, 2014. ACM
In Open Networking Summit (ONS 2014), 2014.
2012
(3)
IEEE Security & Privacy, 10(1): 73–76. 2012.
In Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test, pages 2–2, 2012. USENIX Association
In Proceedings of the 2012 ACM conference on Internet measurement conference, pages 495–508, 2012. ACM
2011
(4)
IEEE Transactions on Dependable and Secure Computing, 8(2): 218–232. 2011.
In Proc. of the USENIX Symposium on Networked Systems Design and Implementation, 2011.
In ACM SIGCOMM Workshop on Education, 2011.
In Encyclopedia of Cryptography and Security, pages 217–220. Springer US, 2011.
2010
(3)
2009
(7)
IEEE Transactions on Dependable and Secure Computing, 6(2): 81–95. 2009.
In 2009 IEEE International Conference on Communications (ICC), pages 1–6, 2009. IEEE
In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology, pages 57–70, 2009. IEEE
In Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security, pages 103–117, 2009.
In 2009 Annual Computer Security Applications Conference (ACSAC), pages 269–278, 2009. IEEE
In Cybersecurity Applications & Technology Conference For Homeland Security (CATCH)., pages 57–70, 2009. IEEE
Proceedings of IEEE Transactions on Dependable and Secure Computing,218–232. 2009.
2008
(8)
In Proceedings of the 1st ACM workshop on Network Data Anonymization, pages 3–10, 2008. ACM
In 4th Workshop on Secure Network Protocols, 2008. NPSec 2008. , pages 45–51, 2008. IEEE
IEEE Transactions on Computers, 57(8): 1098–1112. 2008.
In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, pages 125–130, 2008. ACM
In Invited paper at the Sarnoff Symposium, 2008.
In 2008 IEEE International Conference on Communications, pages 1708–1714, 2008. IEEE
In CSET, 2008.
Computer Networks, 52(2): 399–417. 2008.
2007
(8)
In Proceedings of the 2007 workshop on Experimental Computer Science, pages 8, 2007. ACM
In Proceedings of the 2007 workshop on Large Scale Attack Defense, pages 105–112, 2007. ACM
In Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on, pages 1–7, 2007. IEEE
In Proc. of the DETER Community Workshop on Cyber Security Experimentation and Test. USENIX Association, 2007.
In ACM SIGMETRICS Performance Evaluation Review, volume 35, pages 357–358, 2007. ACM
In Proc. of Workshop on Experimental Comp. Sci, 2007.
Electronic Notes in Theoretical Computer Science, 179: 17–30. 2007.
In In Proceedings of the 3rd IEEE Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2007, 2007. Citeseer
2006
(8)
In 22nd Annual Computer Security Applications Conference (ACSAC), pages 33–42, 2006. IEEE
In Proceedings of the 2nd ACM workshop on Quality of Protection, pages 53–58, 2006. ACM
In MILCOM 2006-2006 IEEE Military Communications Conference, pages 1–10, 2006. IEEE
In Proceedings of the WORLDCOMP International Conference on Data Mining DMIN, volume 6, pages 269–75, 2006.
In Proceedings of the DETER Community Workshop on Cyber Security Experimentation, 2006.
In Proceedings of the 1st international conference on Performance evaluation methodolgies and tools, pages 28, 2006. ACM
In Proceedings of the DETER Community Workshop on Cyber Security Experimentation, 2006.
University of Delaware CIS Department Technical Report CIS-TR-2006-332. 2006.
2005
(3)
IEEE transactions on Dependable and Secure Computing, 2(3): 216–232. 2005.
In Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation, pages 71–79, 2005. IEEE Computer Society
University of Delaware CIS Department Technical Report CIS-TR-2005-02. 2005.
2004
(3)
2003
(4)
Ph.D. Thesis, University of California Los Angeles, 2003.
In Proceedings of the 2003 workshop on New Security Paradigms, pages 11–18, 2003. ACM
In Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003., pages 171–178, 2003. IEEE
In DARPA Information Survivability Conference and Exposition, 2003. Proceedings, volume 2, pages 101–102, 2003. IEEE
2002
(5)
In 10th IEEE International Conference on Network Protocols (ICNP), pages 312–321, 2002. IEEE
In INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, volume 3, pages 1557–1566, 2002. IEEE
In Western Network Processors Conference, 2002.
Technical Report UCLA technical report, 2002.
In Proceedings of the Network Processors Conference (NPC), 2002.
2001
(2)