Funding Data Link References Status API Help
type
year
publication
category
publisher
funder name
source
Page 1 of 45524 results
Sort by: relevance publication year

A First Step Toward Network Security Virtualization: From Concept To Prototype

Journal Article published Oct 2015 in IEEE Transactions on Information Forensics and Security volume 10 issue 10 on pages 2236 to 2249

Research funded by Air Force Office of Scientific Research (FA-9550-13-1-0077) | National Science Foundation (CNS-0954096) | Google Faculty Research Awards.

Authors: Seungwon Shin, Haopei Wang, Guofei Gu

Communication Delay Co-Design in $\mathcal{ H}_{2}$-Distributed Control Using Atomic Norm Minimization

Journal Article published Jun 2017 in IEEE Transactions on Control of Network Systems volume 4 issue 2 on pages 267 to 278

Research funded by National Science Foundation | Air Force Office of Scientific Research | Advanced Research Projects Agency - Energy | Institute for Collaborative Biotechnologies (W911NF-09-0001) | Army Research Office

Authors: Nikolai Matni

Network Modeling for Security Analytics

Conference Paper published 2016 in Proceedings of the 11th Annual Cyber and Information Security Research Conference on - CISRC '16

Research funded by National Science Foundation (1524940)

Authors: Bailey Smith, Whitney Caruthers, Dalton Stewart, Peter Hawrylak, John Hale

Trusted Click

Conference Paper published 2017 in Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization - SDN-NFVSec '17

Research funded by National Science Foundation (1406192)

Authors: Michael Coughlin, Eric Keller, Eric Wustrow

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

Journal Article published 1 Jan 2016 in IEEE Transactions on Computers volume 65 issue 1 on pages 244 to 255

Research funded by State Key Development Program for Basic Research of China (2014CB340303) | National Science Foundation (61422208, 61472252, 61272443, 61171067, 61133006) | Division of Computing and Communication Foundations | Scientific Research Foundation | Returned Overseas Chinese Scholars | Jiangsu Future Network Research Project (BY2013095-1-10)

Authors: Tong Meng, Fan Wu, Zheng Yang, Guihai Chen, Athanasios V. Vasilakos

Location Privacy Leakage through Sensory Data

Journal Article published 2017 in Security and Communication Networks volume 2017 on pages 1 to 12

Research funded by National Science Foundation (CNS-1252292, 61502116, 61370084)

Authors: Yi Liang, Zhipeng Cai, Qilong Han, Yingshu Li

Timing SDN Control Planes to Infer Network Configurations

Conference Paper published 2016 in Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization - SDN-NFV Security '16

Research funded by National Science Foundation (1406192, 1406225, 1406177)

Authors: John Sonchack, Adam J. Aviv, Eric Keller

vTC

Conference Paper published 2016 in Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization - SDN-NFV Security '16

Research funded by National Science Foundation (1547428 1541434 1440737 1450996)

Authors: Lu He, Chen Xu, Yan Luo

Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications

Journal Article published 9 Feb 2015 in Security and Communication Networks volume 8 issue 17 on pages 2973 to 2980

Research funded by National Science Foundation (1263283)

Authors: Chris DelBello, Kazi Raihan, Tao Zhang

Automatic generation of inter-component communication exploits for Android applications

Conference Paper published 2017 in Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017

Research funded by National Science Foundation (CCF-1252644) | U.S. Department of Homeland Security (HSHQDC-14-C-B0040) | Air Force Office of Scientific Research (FA95501610030)

Authors: Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek

Communication satellite power amplifiers: current and future SSPA and TWTA technologies

Journal Article published 12 Mar 2015 in International Journal of Satellite Communications and Networking volume 34 issue 2 on pages 95 to 113

Research funded by Air Force Office of Sponsored Research (AFOSR) (FA9550-13-1-0099) | National Science Foundation

Authors: Whitney Q. Lohmeyer, Raichelle J. Aniceto, Kerri L. Cahoy

Energy-Based Lifetime Maximization and Security of Wireless-Sensor Networks With General Nonideal Battery Models

Journal Article published Jun 2017 in IEEE Transactions on Control of Network Systems volume 4 issue 2 on pages 323 to 335

Research funded by National Science Foundation (CNS-1239021, IIP-1430145) | Air Force Office of Scientific Research (FA9550-12-1-0113) | Office of Naval Research (N00014-09-1-1051) | Army Research Office (W911NF-11-1-0227)

Authors: Sepideh Pourazarm, Christos G. Cassandras

Multi-stage quantum secure communication using polarization hopping

Journal Article published 1 Oct 2015 in Security and Communication Networks volume 8 issue 18 on pages 4333 to 4342

Research funded by National Science Foundation (1117179)

Authors: Mayssaa El Rifai, Kam Wai Clifford Chan, Pramode K. Verma

Visualizing Traffic Causality for Analyzing Network Anomalies

Conference Paper published 2015 in Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics - IWSPA '15

Research funded by National Science Foundation (CAREER CNS-0953638) | Army Research Office (YIP W911NF-14-1-0535)

Authors: Hao Zhang, Maoyuan Sun, Danfeng (Daphne) Yao, Chris North

Using Architecture to Reason about Information Security

Journal Article published 9 Dec 2015 in ACM Transactions on Information and System Security volume 18 issue 2 on pages 1 to 30

Research funded by National Science Foundation (1054172) | Air Force Office of Scientific Research | Australian Research Council Discovery (DP1097203)

Authors: Stephen Chong, Ron Van Der Meyden

dRMT

Conference Paper published 2017 in Proceedings of the Conference of the ACM Special Interest Group on Data Communication - SIGCOMM '17

Research funded by Israeli Consortium for Network Programming | Cisco Research Center | National Science Foundation (CNS-1563826) | Hasso Plattner Institute Research School | Technion Fund for Security Research | Ministry of Science and Technology, Israel | Gordon Fund for Systems Engineering | Shillman Fund for Global Security

Authors: Sharad Chole, Isaac Keslassy, Ariel Orda, Tom Edsall, Andy Fingerhut, Sha Ma, Anirudh Sivaraman, Shay Vargaftik, Alon Berger, Gal Mendelson, Mohammad Alizadeh, Shang-Tse Chuang

Network Topology and Communication-Computation Tradeoffs in Decentralized Optimization

Journal Article published May 2018 in Proceedings of the IEEE volume 106 issue 5 on pages 953 to 976

Research funded by Office of Naval Research (N000014-16-1-2245) | National Science Foundation (CMMI-1463262) | Air Force Office of Scientific Research (FA-95501510394) | Natural Sciences and Engineering Research Council of Canada (RGPIN-2012-341596, RGPIN-2017-06266)

Authors: Angelia Nedic, Alex Olshevsky, Michael G. Rabbat

Machine Learning-Based Detection of Ransomware Using SDN

Conference Paper published 2018 in Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization - SDN-NFV Sec'18

Research funded by National Science Foundation (1700527)

Authors: Greg Cusack, Oliver Michel, Eric Keller

Scaling Multi-Core Network Processors without the Reordering Bottleneck

Journal Article published 1 Mar 2016 in IEEE Transactions on Parallel and Distributed Systems volume 27 issue 3 on pages 900 to 912

Research funded by Shillman, Erteschik and Greenberg Research Funds | Gordon Fund for Systems Engineering | Connecticut Innovations | CAIDA | Technion Funds for Security Research | Ministry of Science and Technology | Hasso Plattner Institute Research School | U.S. Department of Homeland Security | European Research Council Starting (210389) | National Science Foundation | Neptune Magnet Consortium

Authors: Alexander Shpiner, Isaac Keslassy, Rami Cohen

Network attacks: Taxonomy, tools and systems

Journal Article published Apr 2014 in Journal of Network and Computer Applications volume 40 on pages 307 to 324

Research funded by Department of Information Technology (DIT) | Council of Scientific & Industrial Research (CSIR) | Government of India | National Science Foundation (CNS-095876, CNS-0851783)

Authors: N. Hoque, Monowar H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, J.K. Kalita