Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices DH Summerville, KM Zach, Y Chen IEEE International Performance Computing and Communications Conference, 2015 | 188 | 2015 |
A survey on the application of FPGAs for network infrastructure security H Chen, Y Chen, DH Summerville IEEE Communications Surveys & Tutorials 13 (4), 541-561, 2010 | 102 | 2010 |
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol J Feng, Y Chen, D Summerville, WS Ku, Z Su 2011 IEEE Consumer Communications and Networking Conference (CCNC), 521-522, 2011 | 58 | 2011 |
Fast DDP-based ciphers: from hardware to software ND Goots, NA Moklovyan, PA Moldovyanu, DH Summerville 2003 46th Midwest Symposium on Circuits and Systems 2, 770-773, 2003 | 35 | 2003 |
A fair multi-party non-repudiation scheme for storage clouds J Feng, Y Chen, DH Summerville 2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011 | 29 | 2011 |
Prevention of information attacks by run-time detection of self-replication in computer codes V Skormin, A Volynkin, D Summerville, J Moronski Journal of Computer Security 15 (2), 273-302, 2007 | 22 | 2007 |
Detecting Malicious Codes by the Presence of Their “Gene of Self-replication” VA Skormin, DH Summerville, JS Moronski Computer Network Security: Second International Workshop on Mathematical …, 2003 | 22 | 2003 |
A programmable dynamic interconnection network router with hidden refresh JG Delgado-Frias, J Nyathi, DH Summerville IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1998 | 22 | 1998 |
Detection of anomalous network packets using lightweight stateless payload inspection N Nwanze, D Summerville 2008 33rd IEEE Conference on Local Computer Networks (LCN), 911-918, 2008 | 21 | 2008 |
On Software Implementation of Fast DDP-based Ciphers. NA Moldovyan, PA Moldovyanu, DH Summerville Int. J. Netw. Secur. 4 (1), 81-89, 2007 | 21 | 2007 |
Two-stage decomposition of SNORT rules towards efficient hardware implementation H Chen, DH Summerville, Y Chen 2009 7th International Workshop on Design of Reliable Communication Networks …, 2009 | 17 | 2009 |
Run-Time detection of malicious self-replication in binary executables V Skormin, A Volynkin, D Summerville, J Moronski Journal of Computer Security 15 (2), 273-301, 2007 | 15 | 2007 |
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection H Chen, T Gaska, Y Chen, D Summerville Computers \& Electrical Engineering 39 (2), 295-308, 2013 | 13 | 2013 |
EEO: An efficient MDS-like RAID-6 code for parallel implementation J Feng, Y Chen, D Summerville 2010 IEEE Sarnoff Symposium, 1-5, 2010 | 13 | 2010 |
Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller II: Digital and Analog Hardware Interfacing DH Summerville Synthesis Lectures on Digital Circuits and Systems 4 (1), 1-139, 2009 | 13 | 2009 |
Wireless networks security and cipher design based on data-dependent operations: Classification of the FPGA suitable controlled elements N Moldovyan, A Moldovyan, M Eremeev, D Summerville Proceedings of the CCCT 4, 123-128, 2004 | 13 | 2004 |
Evaluation of run-time detection of self-replication in binary executable malware Volynkin, Skormin, Summerville, Moronski 2006 IEEE Information Assurance Workshop, 184-191, 2006 | 12 | 2006 |
A VLSI interconnection network router using a D-CAM with hidden refresh JG Delgado-Frias, J Nyathi, CL Miller, DH Summerville Proceedings of the Sixth Great Lakes Symposium on VLSI, 246-251, 1996 | 12 | 1996 |
Anomalous packet identification for network intrusion detection DH Summerville, N Nwanze, VA Skormin Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 11 | 2004 |
A high performance pattern associative oblivious router for tree topologies DH Summerville, JG Delgado-Frias, S Vassiliadis Proceedings of 8th International Parallel Processing Symposium, 541-545, 1994 | 11 | 1994 |