default search action
Daniel Fleck
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c19]Ataollah Fatahi Baarzi, George Kesidis, Dan Fleck, Angelos Stavrou:
Microservices made attack-resilient using unsupervised service fissioning. EuroSec@EuroSys 2020: 31-36
2010 – 2019
- 2018
- [j3]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
On early detection of application-level resource exhaustion and starvation. J. Syst. Softw. 137: 430-447 (2018) - [c18]Daniel Fleck, Angelos Stavrou, George Kesidis, Neda Nasiriani, Yuquan Shan, Takis Konstantopoulos:
Moving-Target Defense Against Botnet Reconnaissance and an Adversarial Coupon-Collection Model. DSC 2018: 1-8 - [c17]George Kesidis, Yuquan Shan, Daniel Fleck, Angelos Stavrou, Takis Konstantopoulos:
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*. MALWARE 2018: 61-67 - 2017
- [c16]Yuquan Shan, George Kesidis, Daniel Fleck:
Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CCSW 2017: 1-10 - [c15]Mohamed Elsabagh, Dan Fleck, Angelos Stavrou:
Strict Virtual Call Integrity Checking for C++ Binaries. AsiaCCS 2017: 140-154 - [c14]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Detecting ROP with Statistical Learning of Program Characteristics. CODASPY 2017: 219-226 - [c13]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems. MALWARE 2017: 67-74 - [c12]Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen:
Practical and Accurate Runtime Application Protection Against DoS Attacks. RAID 2017: 450-471 - [i2]Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems. CoRR abs/1704.06794 (2017) - [i1]Neda Nasiriani, Yuquan Shan, George Kesidis, Daniel Fleck, Angelos Stavrou:
Changing proxy-server identities as a proactive moving-target defense against reconnaissance for DDoS attacks. CoRR abs/1712.01102 (2017) - 2016
- [j2]Angelos Stavrou, Daniel Fleck, Constantinos Kolias:
On the Move: Evading Distributed Denial-of-Service Attacks. Computer 49(3): 104-107 (2016) - 2015
- [c11]Dan Fleck, Fengwei Zhang, Sharath Hiremagalore, Stephen Reese, Liam McGhee:
Class-Chord: Efficient Messages to Classes of Nodes in Chord. CSCloud 2015: 165-174 - [c10]Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck:
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. RAID 2015: 405-424 - [c9]Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. RAID 2015: 515-537 - 2014
- [j1]Huangxin Wang, Quan Jia, Dan Fleck, Walter Powell, Fei Li, Angelos Stavrou:
A moving target DDoS defense mechanism. Comput. Commun. 46: 10-21 (2014) - [c8]Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter Powell:
Catch Me If You Can: A Cloud-Enabled DDoS Defense. DSN 2014: 264-275 - [c7]Sharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, Angelos Stavrou:
transAD: An Anomaly Detection Network Intrusion Sensor for the Web. ISC 2014: 477-489 - 2013
- [c6]Dan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou, Tomas Nykodym:
PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior. ARES 2013: 92-101 - 2011
- [c5]Daniel Fleck, Zoran Duric:
Predicting image matching using affine distortion models. CVPR 2011: 105-112 - [c4]Daniel Fleck, Zoran Duric:
Using Grid Based Feature Localization for Fast Image Matching. ICIAR (1) 2011: 221-231 - 2010
- [b1]Daniel Fleck:
Efficient Affine Image Matching for Building and Maintaining 3D Models. George Mason University, Fairfax, Virginia, USA, 2010 - [c3]Daniel Fleck, Zoran Duric:
Using Local Affine Invariants to Improve Image Matching. ICPR 2010: 1844-1847
2000 – 2009
- 2009
- [c2]Daniel Fleck, Zoran Duric:
Affine Invariant-Based Classification of Inliers and Outliers for Image Matching. ICIAR 2009: 268-277 - [c1]Daniel Fleck, Zoran Duric:
An Evaluation of Affine Invariant-Based Classification for Image Matching. ISVC (2) 2009: 417-429
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint