Shield: DoS filtering using traffic deflecting E Kline, A Afanasyev, P Reiher 2011 19th IEEE International Conference on Network Protocols, 37-42, 2011 | 28 | 2011 |
Bin2vec: learning representations of binary executable programs for security tasks S Arakelyan, S Arasteh, C Hauser, E Kline, A Galstyan Cybersecurity 4, 1-14, 2021 | 23 | 2021 |
RAD: Reflector attack defense using message authentication codes E Kline, M Beaumont-Gay, J Mirkovic, P Reiher 2009 Annual Computer Security Applications Conference, 269-278, 2009 | 19 | 2009 |
Securing data through avoidance routing E Kline, P Reiher Proceedings of the 2009 workshop on New security paradigms workshop, 115-124, 2009 | 19 | 2009 |
Cybersecurity experimentation at program scale: Guidelines and principles for future testbeds S Schwab, E Kline 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019 | 12 | 2019 |
Data Tethers: Preventing information leakage by enforcing environmental data access policies C Fleming, P Peterson, E Kline, P Reiher 2012 IEEE International Conference on Communications (ICC), 835-840, 2012 | 12 | 2012 |
The {DComp} Testbed R Goodfellow, S Schwab, E Kline, L Thurlow, G Lawler 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19), 2019 | 11 | 2019 |
Resect: Self-learning traffic filters for ip spoofing defense J Mirkovic, E Kline, P Reiher Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 11 | 2017 |
Replicated testbed experiments for the evaluation of a wide-range of ddos defenses A Hussain, D DeAngelis, E Kline, S Schwab 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 46-55, 2020 | 7 | 2020 |
Conflict-based search for the virtual network embedding problem Y Zheng, S Ravi, E Kline, S Koenig, TKS Kumar Proceedings of the International Conference on Automated Planning and …, 2022 | 5 | 2022 |
Capturing domain knowledge through extensible components E Kline, G Bartlett, G Lawler, R Story, M Elkins Testbeds and Research Infrastructures for the Development of Networks and …, 2019 | 4 | 2019 |
Securing 5G Slices using Homomorphic Encryption E Kline, S Ravi, D Cousins, S Rv 2022 IEEE Wireless Communications and Networking Conference (WCNC), 43-48, 2022 | 3 | 2022 |
Decentralized Privacy-Preserving Path Validation for Multi-Slicing-Authority 5G Networks W Jin, S Ravi, E Kline 2022 IEEE Wireless Communications and Networking Conference (WCNC), 31-36, 2022 | 3 | 2022 |
Priority-based search for the virtual network embedding problem Y Zheng, H Ma, S Koenig, E Kline, TKS Kumar Proceedings of the International Conference on Automated Planning and …, 2023 | 2 | 2023 |
Explaining Deep Learning Models for Per-packet Encrypted Network Traffic Classification L Garcia, G Bartlett, S Ravi, H Ibrahim, W Hardaker, E Kline 2022 IEEE International Symposium on Measurements & Networking (M&N), 1-6, 2022 | 2 | 2022 |
The FastMap pipeline for facility location problems O Thakoor, A Li, S Koenig, S Ravi, E Kline, TK Satish Kumar International Conference on Principles and Practice of Multi-Agent Systems …, 2022 | 1 | 2022 |
Cypress: A Testbed for Research in Networked Cyber-Physical Systems R Goodfellow, E Kline 10th EAI International Conference on Testbeds and Research Infrastructures …, 2015 | 1 | 2015 |
HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security A Cohen, DB Cousins, N Genise, E Kline, Y Polyakov, RV Saraswathy Cryptology ePrint Archive, 2024 | | 2024 |
Improved Conflict-Based Search for the Virtual Network Embedding Problem Y Zheng, S Ravi, E Kline, L Thurlow, S Koenig, TKS Kumar 2023 32nd International Conference on Computer Communications and Networks …, 2023 | | 2023 |
P3V: Privacy-Preserving Path Validation System for Multi-Authority Sliced Networks W Jin, E Kline, TKS Kumar, L Thurlow, S Ravi Cryptology ePrint Archive, 2023 | | 2023 |