A survey of attack and defense techniques for reputation systems K Hoffman, D Zage, C Nita-Rotaru ACM Computing Surveys (CSUR) 42 (1), 1-31, 2009 | 898 | 2009 |
Autonomous vehicle system H Moustafa, DD Salvi, S Jaber, D Iyer, MK Hazrati, P Agrawal, ... US Patent App. 17/434,710, 2022 | 113 | 2022 |
Steward: Scaling byzantine fault-tolerant replication to wide area networks Y Amir, C Danilov, D Dolev, J Kirsch, J Lane, C Nita-Rotaru, J Olsen, ... IEEE Transactions on Dependable and Secure Computing 7 (1), 80-93, 2008 | 105 | 2008 |
Scaling byzantine fault-tolerant replication towide area networks Y Amir, C Danilov, J Kirsch, J Lane, D Dolev, C Nita-Rotaru, J Olsen, ... International Conference on Dependable Systems and Networks (DSN'06), 105-114, 2006 | 100 | 2006 |
An architectural vision for a data-centric iot: Rethinking things, trust and clouds EM Schooler, D Zage, J Sedayao, H Moustafa, A Brown, M Ambrosin 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 56 | 2017 |
Improving supply chain security using big data D Zage, K Glass, R Colbaugh 2013 IEEE International Conference on Intelligence and Security Informatics …, 2013 | 54 | 2013 |
Experimental comparison of peer-to-peer streaming overlays: An application perspective J Seibert, D Zage, S Fahmy, C Nita-Rotaru 2008 33rd IEEE Conference on Local Computer Networks (LCN), 20-27, 2008 | 53 | 2008 |
Data management in an information-centric network VS Somayazulu, EM Schooler, H Moustafa, AS Brown, R Vannithamby, ... US Patent 10,356,197, 2019 | 44 | 2019 |
On the accuracy of decentralized virtual coordinate systems in adversarial networks DJ Zage, C Nita-Rotaru Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 41 | 2007 |
Addressing insider threat using “where you are” as fourth factor authentication S Choi, D Zage 2012 IEEE International Carnahan Conference on Security Technology (ICCST …, 2012 | 40 | 2012 |
Autonomous vehicle system H Moustafa, S Jaber, D Iyer, MK Hazrati, P Agrawal, N Aerrabotu, ... US Patent App. 17/434,713, 2022 | 39 | 2022 |
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks AA Walters, D Zage, CN Rotaru IEEE/ACM Transactions on Networking 16 (6), 1434-1446, 2008 | 24 | 2008 |
Data management in an edge network H Moustafa, EM Schooler, DJ Zage, JC Sedayao, DE Cohen, S Lee US Patent 10,244,071, 2019 | 22 | 2019 |
Autonomous vehicle system PJ Van Beek, DD Salvi, MK Hazrati, P Agrawal, D Iyer, S Jaber, ... US Patent App. 17/434,721, 2022 | 21 | 2022 |
Anti-persistence on persistent storage: History-independent sparse tables and dictionaries MA Bender, JW Berry, R Johnson, TM Kroeger, S McCauley, CA Phillips, ... Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2016 | 21 | 2016 |
Applying game theory to analyze attacks and defenses in virtual coordinate systems S Beckery, J Seibert, D Zage, C Nita-Rotaru, R Statey 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 20 | 2011 |
Mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks AA Walters, D Zage, C Nita-Rotaru Proceedings of the 2006 IEEE International Conference on Network Protocols …, 2006 | 20 | 2006 |
A Survey of attacks on Reputation Systems K Hoffman, D Zage, C Nita-Rotaru | 17 | 2007 |
On the accuracy of decentralized network coordinate systems in adversarial networks D Zage, C Nita-Rotaru Proc. CCS 7, 2007 | 14 | 2007 |
Utilizing linear subspaces to improve cloud security D Zage, J Obert IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012 | 11 | 2012 |