101. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
102. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
104. A Disruptive Computer Design Idea: Architectures with Repeatable Timing Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Liu, Isaac; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
105. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
106. A Network Access Control Mechanism Based on Behavior Profiles Frias-Martinez, Vanessa; Sherrick, Joseph; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
107. Anonymity in Wireless Broadcast Networks Blaze, Matt; Ioannidis, John; Keromytis, Angelos D.; Malkin, Tal G.; Rubin, Avi 2009 Articles Computer science
108. A novel analysis space for pointer analysis and its application for bug finding Buss, Marcio; Brand, Daniel; Sreedhar, Vugranam; Edwards, Stephen A. 2009 Articles Computer science
109. APOD: Anonymous Physical Object Delivery Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
110. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
111. A Survey of Voice Over IP Security Research Keromytis, Angelos D. 2009 Articles Computer science
112. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
113. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2009 Articles Computer science
114. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D. 2009 Articles Computer science
115. Brave New World: Pervasive Insecurity of Embedded Network Devices Cui, Ang; Song, Yingbo; Prabhu, Pratap; Stolfo, Salvatore 2009 Articles Computer scienceRouters (Computer networks)Webcams
116. Buffer Sharing in CSP-like Programs Vasudevan, Nalini; Edwards, Stephen A. 2009 Articles Computer science
117. Capturing Information Flow with Concatenated Dynamic Taint Analysis Kim, Hyung Chan; Keromytis, Angelos D.; Covington, Michael; Sahita, Ravi 2009 Articles Computer science
118. Celling SHIM: Compiling Deterministic Concurrency to a Heterogeneous Multicore Vasudevan, Nalini; Edwards, Stephen A. 2009 Articles Computer science
119. Compile-Time Analysis and Specialization of Clocks in Concurrent Programs Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2009 Articles Computer science
120. Concurrency and Communication: Lessons from the SHIM Project Edwards, Stephen A. 2009 Articles Computer science
121. Configuration Management and Security Bellovin, Steven Michael; Bush, Randy 2009 Articles Computer science
122. Cybersecurity through an Identity Management System Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2009 Articles Computer science
123. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
124. Designing Host and Network Sensors to Mitigate the Insider Threat Bowen, Brian M.; Ben Salem, Malek; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
125. Discovering influential variables: A method of partitions Chernoff, Herman; Lo, Shaw-Hwa; Zheng, Tian 2009 Articles Computer scienceStatistics
126. DoubleCheck: Multi-path Verification Against Man-in-the-Middle Attacks Alicherry, Mansoor; Keromytis, Angelos D. 2009 Articles Computer science
127. Dynamic Trust Management Blaze, Matt; Kannan, Sampath; Lee, Insup; Sokolsky, Oleg; Smith, Jonathan M.; Keromytis, Angelos D.; Lee, Wenke 2009 Articles Computer science
128. Elastic Block Ciphers: Method, Security and Instantiations Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2009 Articles Computer science
129. Evaluating a Collaborative Defense Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2009 Articles Computer science
130. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Articles Computer science
131. Gone Rogue: An Analysis of Rogue Security Software Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2009 Articles Computer science
132. Laissez-faire file sharing: Access control designed for individuals at the endpoints Johnson, Maritza Lupe; Bellovin, Steven Michael; Reeder, Robert W.; Schechter, Stuart E. 2009 Articles Computer scienceComputer file sharingComputers--Access control
133. On the Deployment of Dynamic Taint Analysis for Application Communities Kim, Hyung Chan; Keromytis, Angelos D. 2009 Articles Computer science
134. Randomized Instruction Sets and Runtime Environments: Past Research and Future Directions Keromytis, Angelos D. 2009 Articles Computer science
135. Reconciling Repeatable Timing with Pipelining and Memory Hierarchy Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
136. Secure Anonymous Database Search Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2009 Articles Computer science
138. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
139. Synthesis and Optimization of Pipelined Packet Processors Soviani, Cristian; Hadzic, Ilija; Edwards, Stephen A. 2009 Articles Computer science
141. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
142. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
143. A Deterministic Multi-Way Rendezvous Library for Haskell Vasudevan, Nalini; Singh, Satnam; Edwards, Stephen A. 2008 Articles Computer science
144. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
145. Asynchronous Policy Evaluation and Enforcement Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
146. Authentication on Untrusted Remote Hosts with Public-key Sudo Burnside, Matthew Spindel; Lu, Mack; Keromytis, Angelos D. 2008 Articles Computer science
147. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
148. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore J.; Keromytis, Angelos D. 2008 Articles Computer scienceAnomaly detection (Computer security)Computer securityCyberterrorism
149. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2008 Articles Computer science
150. Decentralized Access Control in Distributed File Systems Miltchev, Stefan; Smith, Jonathan M.; Prevelakis, Vassilis; Ioannidis, Sotiris; Keromytis, Angelos D. 2008 Articles Computer science