default search action
Douglas S. Reeves
Person information
- affiliation: North Carolina State University, Raleigh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c62]Tae Hyun Kim, Douglas S. Reeves, Rudra Dutta:
Advanced Secure DNS Name Autoconfiguration with Authentication for Enterprise IoT Network. GLOBECOM 2021: 1-6
2010 – 2019
- 2018
- [j21]Micah Bushouse, Douglas S. Reeves:
Goalkeeper: Comprehensive process enforcement from the hypervisor. Comput. Secur. 73: 459-473 (2018) - [c61]Micah Bushouse, Douglas S. Reeves:
Hyperagents: Migrating Host Agents to the Hypervisor. CODASPY 2018: 212-223 - [c60]Micah Bushouse, Douglas S. Reeves:
Furnace: Self-service Tenant VMI for the Cloud. RAID 2018: 647-669 - 2017
- [j20]Kyuyong Shin, Carlee Joe-Wong, Sangtae Ha, Yung Yi, Injong Rhee, Douglas S. Reeves:
T-Chain: A General Incentive Scheme for Cooperative Computing. IEEE/ACM Trans. Netw. 25(4): 2122-2137 (2017) - [c59]Micah Bushouse, Sanghyun Ahn, Douglas S. Reeves:
Arav: monitoring a cloud's virtual routers. CISRC 2017: 3:1-3:8 - [p1]Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - 2015
- [b1]Xinyuan Wang, Douglas S. Reeves:
Traceback and Anonymity. Springer Briefs in Computer Science, Springer 2015, ISBN 978-1-4939-3439-3, pp. 1-76 - [c58]Kyuyong Shin, Carlee Joe-Wong, Sangtae Ha, Yung Yi, Injong Rhee, Douglas S. Reeves:
T-Chain: A General Incentive Scheme for Cooperative Computing. ICDCS 2015: 163-174 - [c57]Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. USENIX Security Symposium 2015: 351-366 - 2013
- [j19]Young Hee Park, Douglas S. Reeves, Mark Stamp:
Deriving common malware behavior through graph clustering. Comput. Secur. 39: 419-430 (2013) - 2012
- [j18]Young June Pyun, Young Hee Park, Douglas S. Reeves, Xinyuan Wang, Peng Ning:
Interval-based flow watermarking for tracing interactive traffic. Comput. Networks 56(5): 1646-1665 (2012) - [j17]Kyuyong Shin, Douglas S. Reeves:
Winnowing: Protecting P2P systems against pollution through cooperative index filtering. J. Netw. Comput. Appl. 35(1): 72-84 (2012) - [c56]Jung Ki So, Douglas S. Reeves:
AntiLiar: Defending against cheating attacks in mesh based streaming. P2P 2012: 115-125 - 2011
- [j16]Xinyuan Wang, Douglas S. Reeves:
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. IEEE Trans. Dependable Secur. Comput. 8(3): 434-449 (2011) - [c55]Young Hee Park, Douglas S. Reeves:
Deriving common malware behavior through graph clustering. AsiaCCS 2011: 497-502 - [c54]Jung Ki So, Douglas S. Reeves:
Adaptive neighbor management for cooperative P2P video-on-demand streaming. IPCCC 2011: 1-10 - [c53]Jung Ki So, Douglas S. Reeves:
Defending against Sybil Nodes in BitTorrent. Networking (2) 2011: 25-39 - 2010
- [c52]Young Hee Park, Qinghua Zhang, Douglas S. Reeves, Vikram Mulukutla:
AntiBot: Clustering Common Semantic Patterns for Bot Detection. COMPSAC 2010: 262-272 - [c51]Young Hee Park, Douglas S. Reeves, Vikram Mulukutla, Balaji Sundaravel:
Fast malware classification by automated behavioral graph matching. CSIIRW 2010: 45 - [c50]Juan Du, Xiaohui Gu, Douglas S. Reeves:
Highly available component sharing in large-scale multi-tenant cloud systems. HPDC 2010: 85-94 - [c49]Brent Rowe, Dallas Wood, Douglas S. Reeves:
How the Public Views Strategies Designed to Reduce the Threat of Botnets. TRUST 2010: 337-351
2000 – 2009
- 2009
- [c48]Young Hee Park, Douglas S. Reeves:
Identification of Bot Commands by Run-Time Execution Monitoring. ACSAC 2009: 321-330 - [c47]Steve McKinney, Douglas S. Reeves:
User identification via process profiling: extended abstract. CSIIRW 2009: 51 - [c46]Kyuyong Shin, Douglas S. Reeves, Injong Rhee:
Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks. IPDPS 2009: 1-12 - 2008
- [c45]Terrence O'Connor, Douglas S. Reeves:
Bluetooth Network-Based Misuse Detection. ACSAC 2008: 377-391 - [c44]Gigi Karmous-Edwards, Douglas S. Reeves, George N. Rouskas, Lina Battestilli, Priyanka Vegesna, Arun Vishwanath:
Edge Reconfigurable Optical Network (ERON): Enabling dynamic sharing of static lightpaths. BROADNETS 2008: 332-334 - 2007
- [c43]Qinghua Zhang, Douglas S. Reeves:
MetaAware: Identifying Metamorphic Malware. ACSAC 2007: 411-420 - [c42]Young June Pyun, Douglas S. Reeves:
Strategic deployment of network monitors for attack attribution. BROADNETS 2007: 525-534 - [c41]Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer:
Analyzing network traffic to detect self-decrypting exploit code. AsiaCCS 2007: 4-12 - [c40]Pan Wang, Peng Ning, Douglas S. Reeves:
A k-anonymous communication protocol for overlay networks. AsiaCCS 2007: 45-56 - [c39]Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning:
Tracing Traffic through Intermediate Hosts that Repacketize Flows. INFOCOM 2007: 634-642 - 2006
- [c38]Pai Peng, Peng Ning, Douglas S. Reeves:
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. S&P 2006: 334-349 - 2005
- [c37]Pai Peng, Peng Ning, Douglas S. Reeves, Xinyuan Wang:
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets. ICDCS Workshops 2005: 107-113 - [c36]Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng Ning:
Defending against Sybil Attacks in Sensor Networks. ICDCS Workshops 2005: 185-191 - [c35]Pan Wang, Peng Ning, Douglas S. Reeves:
Network Access Control for Mobile Ad-Hoc Networks. ICICS 2005: 350-362 - [c34]Pan Wang, Douglas S. Reeves, Peng Ning:
Secure Address Auto-con.guration for Mobile Ad Hoc Networks. MobiQuitous 2005: 519-522 - [c33]Ayman Shaker, Douglas S. Reeves:
Self-Stabilizing Structured Ring Topology P2P Systems. Peer-to-Peer Computing 2005: 39-46 - 2004
- [j15]Errin W. Fulp, Douglas S. Reeves:
Bandwidth provisioning and pricing for networks with multiple classes of service. Comput. Networks 46(1): 41-52 (2004) - [j14]Kehang Wu, Douglas S. Reeves:
Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic. Telecommun. Syst. 25(3-4): 193-207 (2004) - [j13]Peng Ning, Yun Cui, Douglas S. Reeves, Dingbang Xu:
Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7(2): 274-318 (2004) - [c32]Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves:
Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48 - [c31]Qinglin Jiang, Douglas S. Reeves, Peng Ning:
Improving Robustness of PGP Keyrings by Conflict Detection. CT-RSA 2004: 194-207 - [c30]Pan Wang, Peng Ning, Douglas S. Reeves:
Storage-Efficient Stateless Group Key Revocation. ISC 2004: 25-38 - [c29]Qinglin Jiang, Douglas S. Reeves, Peng Ning:
Certificate Recommendations to Improve the Robustness of Web of Trust. ISC 2004: 292-303 - [c28]Young June Pyun, Douglas S. Reeves:
Constructing a Balanced, (log(N)/loglog(N))-Diameter Super-Peer Topology for Scalable P2P Systems. Peer-to-Peer Computing 2004: 210-218 - [c27]Fang Feng, Douglas S. Reeves:
Explicit proactive handoff with motion prediction for mobile IP. WCNC 2004: 855-860 - 2003
- [c26]Xinyuan Wang, Douglas S. Reeves:
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. CCS 2003: 20-29 - [c25]Xiaoyong Wu, Vinay A. Mahadik, Douglas S. Reeves:
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks. DISCEX (2) 2003: 277- - [c24]Kehang Wu, Douglas S. Reeves:
Capacity planning of DiffServ networks with best-effort and expedited forwarding traffic. ICC 2003: 1902-1906 - 2002
- [c23]Peng Ning, Yun Cui, Douglas S. Reeves:
Constructing attack scenarios through correlation of intrusion alerts. CCS 2002: 245-254 - [c22]Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu:
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. ESORICS 2002: 244-263 - [c21]Errin W. Fulp, Douglas S. Reeves:
The Economic Impact of Network Pricing Intervals. QofIS 2002: 315-324 - [c20]Peng Ning, Yun Cui, Douglas S. Reeves:
Analyzing Intensive Intrusion Alerts via Correlation. RAID 2002: 74-94 - 2001
- [j12]T. P. Kelly, Douglas S. Reeves:
Optimal Web cache sizing: scalable methods for exact solutions. Comput. Commun. 24(2): 163-173 (2001) - [c19]Errin W. Fulp, Douglas S. Reeves:
Optimal Provisioning and Pricing of Differentiated Services Using QoS Class Promotion. GI Jahrestagung (1) 2001: 144-150 - [c18]Errin W. Fulp, Douglas S. Reeves:
Optimal Provisioning and Pricing of Internet Differentiated Services in Hierarchical Markets. ICN (1) 2001: 409-418 - [c17]Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu, Jim Yuill:
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework. SEC 2001: 369-384 - 2000
- [j11]Winser E. Alexander, Douglas S. Reeves, Clay S. Gloster Jr.:
Parallel image processin gwith the block data paralel architecture. IBM J. Res. Dev. 44(5): 681-702 (2000) - [j10]Douglas S. Reeves, Hussein F. Salama:
A distributed algorithm for delay-constrained unicast routing. IEEE/ACM Trans. Netw. 8(2): 239-250 (2000) - [c16]Haining Wang, Kang G. Shin, Hongjie Xin, Douglas S. Reeves:
A Simple Refinement of Slow-Start of TCP Congestion Control. ISCC 2000: 98-105 - [c15]Errin W. Fulp, Douglas S. Reeves:
QoS Rewards and Risks: A Multi-market Approach to Resource Allocation. NETWORKING 2000: 945-956
1990 – 1999
- 1999
- [j9]Michael R. Izquierdo, Douglas S. Reeves:
A Survey of Statistical Source Models for Variable-bit-rate Compressed Video. Multim. Syst. 7(3): 199-213 (1999) - 1998
- [c14]Errin W. Fulp, Douglas S. Reeves:
Distributed Network Flow Control based on Dynamic Competitive Markets. ICNP 1998: 119-128 - 1997
- [j8]Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis:
Evaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks. IEEE J. Sel. Areas Commun. 15(3): 332-345 (1997) - [c13]Errin W. Fulp, Douglas S. Reeves:
On-line Dynamic Bandwidth Allocation. ICNP 1997: 134-141 - [c12]Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis:
A Distributed Algorithm for Delay-Constrained Unicast Routing. INFOCOM 1997: 84-91 - [c11]Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis:
The delay-constrained minimum spanning tree problem. ISCC 1997: 699-703 - [c10]Douglas S. Reeves:
A course on multimedia technology for computer science and computer engineering students. SIGCSE 1997: 174-178 - 1996
- [j7]Winser E. Alexander, Douglas S. Reeves, Clay S. Gloster Jr.:
Parallel image processing with the block data parallel architecture. Proc. IEEE 84(7): 947-968 (1996) - [c9]Gavin R. Cato, Douglas S. Reeves:
Calypso: an implementation of the order graph method. ICASSP 1996: 3342-3345 - 1995
- [j6]Sanjeev Rampal, Douglas S. Reeves:
Routing and admission control algorithms for multimedia traffic. Comput. Commun. 18(10): 755-768 (1995) - [c8]Hussein F. Salama, Douglas S. Reeves, Yannis Viniotis, Tsang-Ling Sheu:
Evaluation of multicast routing algorithms for real-time communication on high-speed networks. HPN 1995: 27-42 - 1994
- [j5]Douglas S. Reeves, Kang G. Shin:
Guest Editors' Introduction: Parallel and Distributed Real-Time Computing. IEEE Parallel Distributed Technol. Syst. Appl. 2(4): 8 (1994) - [j4]Douglas S. Reeves, Edward F. Gehringer:
Adaptive Routing for Hypercube Multiprocessors: a Performance Study. Int. J. High Speed Comput. 6(1): 1-29 (1994) - [j3]Caglan M. Aras, James F. Kurose, Douglas S. Reeves, Henning Schulzrinne:
Real-time communication in packet-switched networks. Proc. IEEE 82(1): 122-139 (1994) - [c7]Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal:
End-to-end guaranteed QoS with statistical multiplexing for ATM networks. Modelling and Evaluation of ATM Networks 1994: 485-497 - [c6]Sanjeev Rampal, Douglas S. Reeves, Dharma P. Agrawal:
An Evalutaion of Routing and Admission Control Algorithms for Real-Time Traffic in Packet-Switched Networks. HPN 1994: 79-93 - [c5]Sean Alexandre, Winser E. Alexander, Douglas S. Reeves:
A Programmable Simulator for Analyzing the Block Data Flow Architecture. MASCOTS 1994: 399-400 - 1992
- [j2]Matthew S. Melton, Tan Phan, Douglas S. Reeves, David E. van den Bout:
The TInMANN VLSI chip. IEEE Trans. Neural Networks 3(3): 375-384 (1992) - [c4]Caglan M. Aras, Ren C. Luo, Douglas S. Reeves:
The Segmented Bus: A Dynamically Segmentable Interprocessor Communication Network For Intelligent Mobile Robot Systems. IROS 1992: 309-316 - [e1]Mladen A. Vouk, Douglas S. Reeves, Cherri M. Pancake:
Proceedings of the 30th Annual Southeast Regional Conference, 1992, Raleigh, North Carolina, USA, April 8-10, 1992. ACM 1992, ISBN 0-89791-506-2 [contents] - 1991
- [c3]Markus Siegle, Douglas S. Reeves, Krzysztof Kozminski:
The Interlocking Bus Network for Fault-Tolerant Processor Arrays. Fault-Tolerant Computing Systems 1991: 348-359 - 1990
- [c2]A. A. Fennisi, Douglas S. Reeves:
Using the stuck-at fault model: how well does it work? ACM Southeast Regional Conference 1990: 40-46 - [c1]Matthew S. Melton, Tan Phan, Douglas S. Reeves, David E. van den Bout:
VLSI Implementation of TInMANN. NIPS 1990: 1046-1052
1980 – 1989
- 1987
- [j1]Douglas S. Reeves, Mary Jane Irwin:
Fast Methods for Switch-Level Verification of MOS Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 6(5): 766-779 (1987)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint