Douglas Reeves
Douglas Reeves
Professor of Computer Science, N.C. State University
Verified email at ncsu.edu
Title
Cited by
Cited by
Year
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
7612002
Evaluation of multicast routing algorithms for real-time communication on high-speed networks
HF Salama, DS Reeves, Y Viniotis
IEEE Journal on Selected Areas in Communications 15 (3), 332-345, 1997
5521997
Real-time communication in packet-switched networks
CM Aras, JF Kurose, DS Reeves, H Schulzrinne
Proceedings of the IEEE 82 (1), 122-139, 1994
4191994
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
3742004
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
X Wang, DS Reeves
Proceedings of the 10th ACM conference on Computer and communications …, 2003
3212003
Analyzing intensive intrusion alerts via correlation
P Ning, Y Cui, DS Reeves
International Workshop on Recent Advances in Intrusion Detection, 74-94, 2002
2442002
A distributed algorithm for delay-constrained unicast routing
HF Salama, DS Reeves, Y Viniotis
Proceedings of INFOCOM'97 1, 84-91, 1997
2371997
A distributed algorithm for delay-constrained unicast routing
DS Reeves, HF Salama
IEEE/ACM Transactions on networking 8 (2), 239-250, 2000
2022000
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
X Wang, DS Reeves, SF Wu
European Symposium on Research in Computer Security, 244-263, 2002
2012002
Sleepy watermark tracing: An active network-based intrusion response framework
X Wang, DS Reeves, SF Wu, J Yuill
IFIP International Information Security Conference, 369-384, 2001
1962001
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
1742010
Defending against sybil attacks in sensor networks
Q Zhang, P Wang, DS Reeves, P Ning
25th ieee international conference on distributed computing systems …, 2005
1722005
On the secrecy of timing-based active watermarking trace-back techniques
P Peng, P Ning, DS Reeves
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-349, 2006
1702006
Metaaware: Identifying metamorphic malware
Q Zhang, DS Reeves
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
1622007
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1382007
A survey of statistical source models for variable-bit-rate compressed video
MR Izquierdo, DS Reeves
Multimedia systems 7 (3), 199-213, 1999
1021999
Deriving common malware behavior through graph clustering
Y Park, DS Reeves, M Stamp
Computers & Security 39, 419-430, 2013
982013
Self-stabilizing structured ring topology p2p systems
A Shaker, DS Reeves
Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05), 39-46, 2005
932005
Analyzing network traffic to detect self-decrypting exploit code
Q Zhang, DS Reeves, P Ning, SP Iyer
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
912007
The delay-constrained minimum spanning tree problem
HF Salama, DS Reeves, Y Viniotis
Proceedings Second IEEE Symposium on Computer and Communications, 699-703, 1997
821997
The system can't perform the operation now. Try again later.
Articles 1–20