关注
Douglas H Summerville
Douglas H Summerville
Binghamton University, State University of New York
在 binghamton.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices
DH Summerville, KM Zach, Y Chen
IEEE International Performance Computing and Communications Conference, 2015
1892015
A survey on the application of FPGAs for network infrastructure security
H Chen, Y Chen, DH Summerville
IEEE Communications Surveys & Tutorials 13 (4), 541-561, 2010
1022010
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
J Feng, Y Chen, D Summerville, WS Ku, Z Su
2011 IEEE Consumer Communications and Networking Conference (CCNC), 521-522, 2011
582011
Fast DDP-based ciphers: from hardware to software
ND Goots, NA Moklovyan, PA Moldovyanu, DH Summerville
2003 46th Midwest Symposium on Circuits and Systems 2, 770-773, 2003
352003
A fair multi-party non-repudiation scheme for storage clouds
J Feng, Y Chen, DH Summerville
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
292011
Prevention of information attacks by run-time detection of self-replication in computer codes
V Skormin, A Volynkin, D Summerville, J Moronski
Journal of Computer Security 15 (2), 273-302, 2007
222007
Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”
VA Skormin, DH Summerville, JS Moronski
Computer Network Security: Second International Workshop on Mathematical …, 2003
222003
A programmable dynamic interconnection network router with hidden refresh
JG Delgado-Frias, J Nyathi, DH Summerville
IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1998
221998
Detection of anomalous network packets using lightweight stateless payload inspection
N Nwanze, D Summerville
2008 33rd IEEE Conference on Local Computer Networks (LCN), 911-918, 2008
212008
On Software Implementation of Fast DDP-based Ciphers.
NA Moldovyan, PA Moldovyanu, DH Summerville
Int. J. Netw. Secur. 4 (1), 81-89, 2007
212007
Two-stage decomposition of SNORT rules towards efficient hardware implementation
H Chen, DH Summerville, Y Chen
2009 7th International Workshop on Design of Reliable Communication Networks …, 2009
172009
Run-Time detection of malicious self-replication in binary executables
V Skormin, A Volynkin, D Summerville, J Moronski
Journal of Computer Security 15 (2), 273-301, 2007
152007
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection
H Chen, T Gaska, Y Chen, D Summerville
Computers \& Electrical Engineering 39 (2), 295-308, 2013
132013
EEO: An efficient MDS-like RAID-6 code for parallel implementation
J Feng, Y Chen, D Summerville
2010 IEEE Sarnoff Symposium, 1-5, 2010
132010
Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller II: Digital and Analog Hardware Interfacing
DH Summerville
Synthesis Lectures on Digital Circuits and Systems 4 (1), 1-139, 2009
132009
Wireless networks security and cipher design based on data-dependent operations: Classification of the FPGA suitable controlled elements
N Moldovyan, A Moldovyan, M Eremeev, D Summerville
Proceedings of the CCCT 4, 123-128, 2004
132004
Evaluation of run-time detection of self-replication in binary executable malware
Volynkin, Skormin, Summerville, Moronski
2006 IEEE Information Assurance Workshop, 184-191, 2006
122006
A VLSI interconnection network router using a D-CAM with hidden refresh
JG Delgado-Frias, J Nyathi, CL Miller, DH Summerville
Proceedings of the Sixth Great Lakes Symposium on VLSI, 246-251, 1996
121996
Anomalous packet identification for network intrusion detection
DH Summerville, N Nwanze, VA Skormin
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
112004
A high performance pattern associative oblivious router for tree topologies
DH Summerville, JG Delgado-Frias, S Vassiliadis
Proceedings of 8th International Parallel Processing Symposium, 541-545, 1994
111994
系统目前无法执行此操作,请稍后再试。
文章 1–20