Stephen Neville
Stephen Neville
Verified email at uvic.ca
Title
Cited by
Cited by
Year
Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis
YO Yazir, C Matthews, R Farahbod, S Neville, A Guitouni, S Ganti, ...
2010 IEEE 3rd International Conference on Cloud Computing, 91-98, 2010
3242010
System for regulating wireless device operations in wireless networks
B Chow, H Macdonald, D Yarish, T Darcie, S Neville, AS Kroeker
US Patent 9,451,451, 2016
882016
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software†…, 2008
822008
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
European Symposium on Research in Computer Security, 461-480, 2008
632008
Secret key generation and agreement in UWB communication channels
MG Madiseh, ML McGuire, SS Neville, L Cai, M Horie
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
602008
Verification of secret key generation from UWB channel observations
MG Madiseh, S He, ML McGuire, SW Neville, X Dong
2009 IEEE International Conference on Communications, 1-5, 2009
522009
Maitland: Lighter-weight vm introspection to support cyber-security in the cloud
C Benninger, SW Neville, YO Yazir, C Matthews, Y Coady
2012 IEEE Fifth International Conference on Cloud Computing, 471-478, 2012
472012
Secret key extraction in ultra wideband channels for unsynchronized radios
MG Madiseh, ML McGuire, SW Neville, AAB Shirazi
6th Annual Communication Networks and Services Research Conference (cnsr†…, 2008
422008
Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation
MG Madiseh, SW Neville, ML McGuire
IEEE Transactions on Information Forensics and Security 7 (4), 1278-1287, 2012
382012
Wavelet denoising of coarsely quantized signals
S Neville, N Dimopoulos
IEEE Transactions on Instrumentation and Measurement 55 (3), 892-901, 2006
362006
Consumers' sentiment analysis of popular phone brands and operating system preference using Twitter data: A feasibility study
D Arora, KF Li, SW Neville
2015 IEEE 29th International Conference on Advanced Information Networking†…, 2015
332015
Optimising sybil attacks against P2P-based botnets
CR Davis, JM Fernandez, S Neville
2009 4th International Conference on Malicious and Unwanted Software†…, 2009
302009
Secure protocol for transactions
SW Neville, M Horie
US Patent 8,768,854, 2014
292014
STARS: A framework for statistically rigorous simulation-based network research
E Millman, D Arora, SW Neville
2011 IEEE Workshops of International Conference on Advanced Information†…, 2011
252011
DockerSim: Full-stack simulation of container-based Software-as-a-Service (SaaS) cloud deployments and environments
Z Nikdel, B Gao, SW Neville
2017 IEEE Pacific Rim Conference on Communications, Computers and Signal†…, 2017
122017
Method and system of controlling spam
SW Neville, M Horie
US Patent 9,137,138, 2015
122015
The rational for developing larger-scale 1000+ machine emulation-based research test beds
SW Neville, KF Li
2009 International Conference on Advanced Information Networking and†…, 2009
122009
Assessing the expected performance of the olsr routing protocol for denser urban core ad hoc network deployments
D Arora, E Millman, SW Neville
2012 IEEE 26th International Conference on Advanced Information Networking†…, 2012
112012
Time correlation analysis of secret key generation via uwb channels
MG Madiseh, SW Neville, ML McGuire
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
112010
Assessing the performance of AODV, DYMO, and OLSR routing protocols in the context of larger-scale denser MANETs
D Arora, E Millman, SW Neville
Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers†…, 2011
102011
The system can't perform the operation now. Try again later.
Articles 1–20