Networking and Cybersecurity

Publications

This form enables you to search through publications from Networking and Cybersecurity researchers.

If you don’t find publications on a specific topic or from a specific individual, please contact the individual or research group for more information.

within
499 publications total
Returned 499 results.

2020

Toward Orchestration of Complex Networking ExperimentsA. Hussain, P. Jaipuria, G. Lawler, S. Schwab, T. Benzel
In 13th $$USENIX$$ Workshop on Cyber Security Experimentation and Test ($$CSET$$ 20)
2020BibTex

2019

2018

NRE-18: Americas Lightpaths Express and Protect Enhances Infrastructure for Research and EducationH. Newman, H. Morgan, J. Ibarra, J. Bezerra
In Supercomputing Conference (SC18) - SCinet Network Research Exhibition
2018, Demonstration pagesBibTex
FARM: Architecture for Distributed Agent-based Social SimulationsJ. Blythe, A. Tregubov
In IJCAI/AAMAS Workshop on Massively Multi-Agent Systems
2018BibTex
Evaluation of Cross-Project Multitasking in Software ProjectsA. Tregubov, J. A. Lane, B. Boehm
In Disciplinary Convergence in Systems Engineering Research
2018, 559–572 pagesBibTex

2017

A Comparative Study of Network Testbed Usage CharacteristicsJ. Mirkovic, A. Hussain, H. Shi
In Usenix Conference on Learning from Authoritative Security Experiment Results (LASER)
2017BibTex
Profiting from attacks on real-time price communications in smart gridsP. Wood, S. Bagchi, A. Hussain
In 2017 9th International Conference on Communication Systems and Networks (COMSNETS)
2017, 158–165 pagesBibTex
Hiding Debuggers from Malware with ApateH. Shi, J. Mirkovic
In Proceedings of the ACM Symposium on Applied Computing
2017BibTex
Mitigating the Risks of Supporting Multiple Control Plans in a Production SDN Network: A Use CaseJ. Bezerra, J. Ibarra, M. Schwarz, H. Freitas, H. Morgan
In Brazilian Symposium on Computer Networks and Distributed Systems - XXXV SBRC
2017, 34-37 pagesBibTex
Impact of Task Switching and Work Interruptions on Software Development ProcessesA. Tregubov, B. Boehm, N. Rodchenko, J. A. Lane
In Proceedings of the 2017 International Conference on Software and System Process
2017, 134–138 pagesBibTex

2016

Mitigating Denial-of-Service attacks in wide-area LQR controlN. Chockalingam, A. Chakrabortty, A. Hussain
In 2016 IEEE Power and Energy Society General Meeting (PESGM)
2016, 1–5 pagesBibTex
Tutorial: Resilience, a key property of Infrastructure CPSA. Hussain
In 2016 American Control Conference (ACC)
2016, 2668–2668 pagesBibTex
Defending against strategic adversaries in dynamic pricing markets for smart gridsP. Wood, S. Bagchi, A. Hussain
In 2016 8th International Conference on Communication Systems and Networks (COMSNETS)
2016, 1–8 pagesBibTex
Foundations of infrastructure-CPSA. M. Annaswamy, A. Hussainy, A. Chakraborttyz, M. Cvetković
In 2016 American Control Conference (ACC)
2016, 2649–2664 pagesBibTex
Accelerating physical level sub-component power simulation by online power partitioningS. S. Bhargav, A. Kolb, Y. H. Cho
In Quality Electronic Design (ISQED), 2016 17th International Symposium on
2016, 221–226 pagesBibTex
Good Automatic Authentication Question GenerationS. Woo, Z. Li, J. Mirkovic
In Proceedings of the International Natural Language Generation conference
2016BibTex
Life-Experience Passwords (LEPs)S. Woo, E. Kaiser, R. Artstein, J. Mirkovic
In Proceedings of the Annual Computer Security Applications Conference (ACSAC)
2016BibTex
AuntieTuna: Personalized Content-Based Phishing DetectionC. Ardi, J. Heidemann
In Proceedings of the NDSS Workshop on Usable Security
2016, to appear pagesBibTex
Assessing Co-Locality of IP BlocksM. Gharaibeh, H. Zhang, C. Papadopoulos, J. Heidemann
In Proceedings of the 19th IEEE Global Internet Symposium
2016BibTex
Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based MethodologyY. Wadhawan, C. Neuman
In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy
2016, 71–80 pagesBibTex
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic ApproachY. Wadhawan, C. Neuman
In Proceedings of the 1st International Workshop on AI for Privacy and Security
2016, 7 pagesBibTex
What does it mean to be Lean in SoSE environment?A. Tregubov, J. A. Lane
In INCOSE International Symposium
2016, 1347-1358 pagesBibTex
DATASEM: A simulation suite for SoSE management researchR. Turner, L. Yilmaz, J. Smith, D. Li, S. Chada, A. Smith, A. Tregubov
In 2016 11th System of Systems Engineering Conference (SoSE)
2016, 1-6 pagesBibTex

2015

Dbit: A methodology for comparing content distribution networksZ. Akhtar, A. Hussain, E. Katz-Bassett, R. Govindan
In University of Southern California, Computer Science Department, Tech. Rep
2015, 15–957 pagesBibTex
Optimizing defensive investments in energy-based cyber-physical systemsP. Wood, S. Bagchi, A. Hussain
In 2015 IEEE International Parallel and Distributed Processing Symposium Workshop
2015, 1042–1051 pagesBibTex
Accurate power measurement technique for digital systems using independent component analysisS. S. Bhargav, Y. H. Cho
In 2015 Conference on Design of Circuits and Integrated Systems (DCIS)
2015, 1–6 pagesBibTex
Accurate in-situ runtime measurement of energy per operation of system-on-chip on FPGAS. S. Bhargav, R. K. Prabakar, Y. H. Cho
In 2015 International Conference on ReConFigurable Computing and FPGAs (ReConFig)
2015, 1–8 pagesBibTex

2014

Openwave: Collaboration Between Industry and GovernmentH. Alvarez, D. A. Cox, J. Ibarra
In Managing Critical Infrastructure in a Changing Natural and Socio-Economic Environment, 2014 ICPC Plenary Meeting
2014BibTex

2013

Replay of malicious traffic in network testbedsA. Hussain, Y. Pradkin, J. Heidemann
In 2013 IEEE International Conference on Technologies for Homeland Security (HST)
2013, 322–327 pagesBibTex
A phantom study of tumor localization using biomimetic electrostatic imagingJ. Friedman, P. Golshani, Y. Cho, M. B. Srivastava
In Biomedical Engineering and Informatics (BMEI), 2013 6th International Conference on
2013, 12–17 pagesBibTex
Efficient pmu networking with software defined networksA. Goodney, S. Kumar, A. Ravi, Y. H. Cho
In Smart Grid Communications (SmartGridComm), 2013 IEEE International Conference on
2013, 378–383 pagesBibTex
Open Science Data Cloud Automate ProvisioningR. Grossman, H. Alvarez, P. Grosso, A. Barker, V. Chergarova
In Lightening Talks: Trans-European Research and Education Networking Association TNC2013
2013BibTex

2012

Experience with heterogenous clock-skew based device fingerprintingS. Sharma, A. Hussain, H. Saran
In Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results
2012, 9–18 pagesBibTex
Reducing allocation errors in network testbedsJ. Mirkovic, H. Shi, A. Hussain
In Proceedings of the 2012 Internet Measurement Conference
2012, 495–508 pagesBibTex
NCS security experimentation using DETERA. Hussain, S. Amin
In Proceedings of the 1st international conference on High Confidence Networked Systems
2012, 73–80 pagesBibTex
Markov model based experiment comparisonS. Sharma, A. Hussain
In 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)
2012, 1–2 pagesBibTex
Physical layer sensing using long pseudo noise codesA. Goodney, Y. H. Cho
In Proceedings of the Seventh ACM International Conference on Underwater Networks and Systems
2012, 5 pagesBibTex
Realtime in-ocean submerged collision avoidance via biomimetic electrostatic imagingJ. Friedman, H. Herman, N. Truong, Y. H. Cho, M. B. Srivastava
In Proceedings of the Seventh ACM International Conference on Underwater Networks and Systems
2012, 1 pagesBibTex
Water temperature sensing with microtomographyA. Goodney, Y. H. Cho
In International Journal of Sensor Networks
2012, 65–77 pagesBibTex
Resiliency-aware scheduling for reconfigurable VLIW processorsJ. Abramson, P. C. Diniz
In 2012 International Conference on Reconfigurable Computing and FPGAs
2012, 1–7 pagesBibTex
Resiliency-aware scheduling: Resource allocation for hardened computation on configurable devicesJ. Abramson, P. C. Diniz
In 2012 International Conference on Field-Programmable Technology
2012, 129–134 pagesBibTex
A resiliency-aware scheduling approach for FPGA configuration: Preliminary resultsJ. Abramson, P. C. Diniz
In 22nd International Conference on Field Programmable Logic and Applications (FPL)
2012, 471–472 pagesBibTex

2011

Multiresolution semantic visualization of network trafficA. Hussain, A. Viswanathan
In 2011 IEEE Fifth International Conference on Semantic Computing
2011, 364–367 pagesBibTex
A semantic framework for data analysis in networked systemsA. Viswanathan, A. Hussain, J. Mirkovic, S. Schwab, J. Wroclawski
In Proc. USENIX Symp. Netw. Syst. Des. Implement.(NSDI)
2011, 127–140 pagesBibTex
Steam-powered sensingC. Zhang, A. Syed, Y. Cho, J. Heidemann
In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
2011, 204–217 pagesBibTex

2010

Tools for worm experimentation on the DETER testbedS. Wei, A. Hussain, J. Mirkovic, C. Ko
In International Journal of Communication Networks and Distributed Systems
2010, 151–171 pagesBibTex
NetFPGA logic analyzerA. Goodney, S. Narayan, M. Wang, P. Sun, V. Bhandwalkar, Y. H. Cho
In 2nd North American NetFPGA developers workshop
2010BibTex
Hardware-accelerated RNA secondary-structure alignmentJ. Moscola, R. K. Cytron, Y. H. Cho
In ACM Transactions on Reconfigurable Technology and Systems (TRETS)
2010, 14 pagesBibTex

2009

Toward quality of information aware rate control for sensor networksZ. M. Charbiwala, S. Zahedi, Y. Kim, Y. H. Cho, M. B. Srivastava
In Fourth International Workshop on Feedback Control Implemenation and Design in Computing Systems and Networks
2009BibTex
A learning and collaboration platform based on SAGEJ. Delgado, M. Joselli, S. Stanzani, S. M. Sadjadi, E. Clua, H. Alvarez
In 14th Western Canadian Conference on Computing Education (WCCCE 2009)
2009BibTex

2008

Angle-of-arrival assisted radio interferometry (ARI) target localizationJ. Friedman, Z. Charbiwala, T. Schmid, Y. Cho, M. Srivastava
In Military Communications Conference, 2008. MILCOM 2008. IEEE
2008, 1–7 pagesBibTex
Low-power high-accuracy timing systems for efficient duty cyclingT. Schmid, J. Friedman, Z. Charbiwala, Y. H. Cho, M. B. Srivastava
In Proceedings of the 2008 international symposium on Low Power Electronics & Design
2008, 75–80 pagesBibTex
Integrating heterogeneous network monitoring dataC. Zhang, B. Liu, X. Su, H. L. Alvarez, J. Ibarra
In Telecommunication Systems 2008 Vol.37
2008, 71-84 pagesBibTex

2007

DDoS benchmarks and experimentation workbench for the DETER testbedJ. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab
In In Proceedings of the 3rd IEEE Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2007
2007BibTex
When is service really denied? a user-centric dos metricJ. Mirkovic, A. Hussain, B. Willson, S. Fahmy, W. - M. Yao, P. Reiher, S. Schwab, R. Thomas
In Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
2007, 357–358 pagesBibTex
Seer: A security experimentation environment for deterS. Schwab, B. Wilson, C. Ko, A. Hussain
In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
2007, 2–2 pagesBibTex
Towards user-centric metrics for denial-of-service measurementJ. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. - M. Yao, S. Schwab
In Proceedings of the 2007 workshop on Experimental computer science
2007, 8–es pagesBibTex
DDoS benchmarks and experimenter's workbench for the DETER testbedJ. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas, S. Schwab, S. Fahmy, R. Chertov, P. Reiher
In 2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities
2007, 1–7 pagesBibTex
When is service really denied? a user-centric DoS metricJ. Mirkovic, A. Hussain, B. Willson, S. Fahmy, W. - M. Yao, P. Reiher, S. Schwab, R. Thomas
In Proceedings of the ACM SIGMETRICS international conference on Measurement and modeling of computer systems
2007, 357–358 pagesBibTex
SEER: A security experimentation environment for DETERS. Schwab, B. Wilson, C. Ko, A. Hussain
In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test
2007, 2–2 pagesBibTex
Towards user-centric metrics for Denial-of-Service measurementJ. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. - M. Yao, S. Schwab
In Proceedings of the 2007 workshop on Experimental computer science
2007, 8–es pagesBibTex
Formative assessment of the effectiveness of collaboration in GCBX. Hang, D. V. Castillo, M. Sadjadi, H. Alvarez
In International Conference on Information Society (i-Society 2007)
2007BibTex
An Experimental Approach to Integrating NetFlow Flow-level Records and NLANR Packet-level TracesC. Zhang, B. Liu, X. Su, H. Alvarez, J. Ibarra
In 2nd International Conference on Internet Monitoring and Protection (IEEE Computer Society Press)
2007BibTex

2006

Identification of repeated denial of service attacksA. Hussain, J. Heidemann, C. Papadopoulos
In INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings
2006, 1–15 pagesBibTex
Measuring denial of serviceJ. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussain, S. Schwab, C. Ko
In Proceedings of the 2nd ACM workshop on Quality of protection
2006, 53–58 pagesBibTex
Towards systematic IDS evaluationC. Ko, A. Hussain, S. Schwab, R. Thomas, B. Wilson
In Proceedings of DETER Community Workshop
2006, 20–23 pagesBibTex
Measuring impact of dos attacksJ. Mirkovic, S. Fahmy, P. Reiher, R. Thomas, A. Hussain, S. Schwab, C. Ko
In Proceedings of the DETER community workshop on cyber security experimentation
2006BibTex
DDoS experiment methodologyA. Hussain, S. Schwab, R. Thomas, S. Fahmy, J. Mirkovic
In Proceedings of the DETER community workshop on cyber security experimentation
2006BibTex
Measuring impact of DoS attacksJ. Mirkovic, S. Fahmy, P. Reiher, R. Thomas, A. Hussain, S. Schwab, C. Ko
In Proceedings of the DETER community workshop on cyber security experimentation
2006BibTex
Measuring Denial of ServiceJ. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussain, S. Schwab, C. Ko
In Proceedings of the 2nd ACM workshop on Quality of protection
2006, 53–58 pagesBibTex
Identification of repeated Denial of Service AttacksA. Hussain, J. Heidemann, C. Papadopoulos
In 25th IEEE International Conference on Computer Communications. Proceedings (INFOCOM)
2006, 1–15 pagesBibTex

2005

Experiences with a continuous network tracing infrastructureA. Hussain, G. Bartlett, Y. Pryadkin, J. Heidemann, C. Papadopoulos, J. Bannister
In Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
2005, 185–190 pagesBibTex
Spectral analysis of bottleneck trafficX. He, C. Papadopoulos, J. Heidemann, U. Mitra, U. Riaz, A. Hussain
In University of Southern California, Department of Computer Science, Tech. Rep. USC-CSDTR-05-854
2005BibTex

2004

The effect of detail on Ethernet simulationA. Hussain, A. Kapoor, J. Heidemann
In 18th Workshop on Parallel and Distributed Simulation, 2004. PADS 2004.
2004, 97–104 pagesBibTex

2003

Effect of malicious traffic on the networkK. -chan Lan, A. Hussain, D. Dutta
In Passive and Active Measurement Workshop (PAM)
2003BibTex
Cossack: Coordinated suppression of simultaneous attacksC. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan
In Proceedings DARPA Information Survivability Conference and Exposition
2003, 2–13 pagesBibTex
A framework for classifying denial of service attacksA. Hussain, J. Heidemann, C. Papadopoulos
In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
2003, 99–110 pagesBibTex
COSSACK: Coordinated suppression of simultaneous attacksC. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan
In Proceedings DARPA Information Survivability Conference and Exposition
2003, 2–13 pagesBibTex
A Framework for classifying Denial of Dervice AttacksA. Hussain, J. Heidemann, C. Papadopoulos
In Proceedings of the Conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM)
2003, 99–110 pagesBibTex

2002

2001

2000

An Empirical Study of Real Audio TrafficA. Mena, J. Heidemann
In proc # ieee-infocom
2000, 101–110 pagesBibTex

1999

1998

1997

1996

1995

1994

1993

1992

1991

1990

1986