ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

Journal articles and other publications can be found here.

Exploring Visible Internet Hosts through Census and SurveyJ. Heidemann, Y. Pradkin, R. Govindan, C. Papadopoulos, J. Bannister,
ISI-TR-2007-640
2007

Design Principles for SecurityBenzel, T. V., Irvine, C. E., Levin, T. E., Bhaskara, G., Nguyen, T. D., and Clark, P. C.
ISI-TR-605
November, 2006

A Recursive Network ArchitectureJ. D. Touch, Y. - S. Wang, and V. Pingali
ISI-TR-626
October, 2006

Enabling Interoperability and Extensibility of Future SCADA SystemsW. Ye and J. Heidemann
ISI-TR-625
October, 2006

Medium Access of Underwater Acoustic Sensor NetworksA. Syed, W. Ye, and J. Heidemann
ISI-TR-624
October, 2006

Inherent Behaviors for On-line Detection of Peer-to-Peer File SharingG. Bartlett, J. Heidemann, and C. Papadopoulos
ISI-TR-627
October, 2006

Preliminary Security Requirements for SecureCore HardwareT. D. Nguyen, T. E. Levin, C. E. Irvine, T. V. Benzel, and G. Bhaskara
ISI-TR-621
September, 2006

Initial SecureCore Security ArchitectureT. E. Levin, C. E. Irvine, T. D. Nguyen, T. V. Benzel, and G. Bhaskara
ISI-TR-622
September, 2006

Virtualization and Integration of SP Services in SecureCoreG. Bhaskara, T. E. Levin, T. D. Nguyen, C. E. Irvine, T. V. Benzel, J. Dwoskin, and R. Lee
ISI-TR-623
September, 2006

Integration of User Specific Hardware for SecureCore Cryptographic ServicesG. Bhaskara, T. E. Levin, T. D. Nguyen, T. V. Benzel, C. E. Irvine, and P. C. Clark
ISI-TR-620
August, 2006