Search For:

Displaying 1-17 out of 17 total
The Challenges of Effectively Anonymizing Network Data
Found in: Conference For Homeland Security, Cybersecurity Applications & Technology
By Scott E. Coull, Fabian Monrose, Michael K. Reiter, Michael Bailey
Issue Date:March 2009
pp. 230-236
No summary available.
 
Rear-Projecting Virtual Data onto Physical Terrain: An Exercise in Two Senses Being Better Than One
Found in: Visualization Conference, IEEE
By Dru Clark, Rosemarie McKeon, Richard Marciano, Michael Bailey
Issue Date:October 1998
pp. 451
This paper describes a project that combined physical model fabrication and virtual computer-based data display to create a unique visualization presentation. USGS terrain information on Prince of Wales Island, Alaska was used to create a physical prototyp...
 
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Jing Zhang,Robin Berthier,Will Rhee,Michael Bailey,Partha Pal,Farnam Jahanian,William H. Sanders
Issue Date:June 2012
pp. 1-8
Whether it happens through malware or through phishing, loss of one's online identity is a real and present danger. While many attackers seek credentials to realize financial gain, an analysis of the compromised accounts at our own institutions reveals tha...
   
The Menlo Report
Found in: IEEE Security and Privacy
By Michael Bailey,David Dittrich,Erin Kenneally,Doug Maughan
Issue Date:March 2012
pp. 71-75
On 28 December 2011, the US Department of Homeland Security, Science and Technology, Cyber Security Division released
 
Building an Active Computer Security Ethics Community
Found in: IEEE Security and Privacy
By David Dittrich,Michael Bailey,Sven Dietrich
Issue Date:July 2011
pp. 32-40
The Declaration of Helsinki and Belmont Report motivated the growth of bioethics alongside traditional biomedical research. Unfortunately, no equivalently active ethics discipline has paralleled the growth of computer security research, where serious ethic...
 
A Survey of Botnet Technology and Defenses
Found in: Conference For Homeland Security, Cybersecurity Applications & Technology
By Michael Bailey, Evan Cooke, Farnam Jahanian, Yunjing Xu, Manish Karir
Issue Date:March 2009
pp. 299-304
Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or ...
 
The Blaster Worm: Then and Now
Found in: IEEE Security and Privacy
By Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, Jose Nazario
Issue Date:July 2005
pp. 26-31
In August of 2003 the Blaster worm struck the Internet, infecting at least 100,000 Microsoft Windows systems and causing millions of dollars in damages. In spite of considerable cleanup efforts, an antiworm aimed at patching systems, and a widely downloade...
 
The Vectorization of a Ray-Tracing Algorithm for Improved Execution Speed
Found in: IEEE Computer Graphics and Applications
By David Plunkett, Michael Bailey
Issue Date:August 1985
pp. 52-60
Ray tracing has always been a computational problem. Can it be improved?
 
Timcogs: An Educational, Computer Graphics Timber-Marking Simulator
Found in: IEEE Computer Graphics and Applications
By Jeffrey Welty, John Moser, Michael Bailey
Issue Date:January 1985
pp. 61-67
Visualizing complex timber-marking and tree-growth concepts gives forestry students new insights into the problems, confidence in practical techniques, and invaluable experience.
 
Workload-Aware Provisioning in Public Clouds
Found in: IEEE Internet Computing
By Yunjing Xu,Zachary Musgrave,Brian Noble,Michael Bailey
Issue Date:July 2014
pp. 15-21
Public cloud services rely on virtualization to support multitenancy--that is, allowing customers from different organizations to share the datacenter infrastructure. Unfortunately, today's public clouds fail to provide sufficient isolation. Hardware resou...
 
Building An Active Computer Security Ethics Community
Found in: IEEE Security and Privacy
By David Dittrich, Michael Bailey, Sven Dietrich
Publication Date: December 2010
pp. N/A
The profound statements of the Declaration of Helsinki and Belmont Report motivated a rich and active discipline of bioethics growing alongside traditional biomedical research. Unfortunately, no equivalently active ethics discipline has parallelled the gro...
 
Which visualizations work, for what purpose, for whom?: evaluating visualizations of terrestrial and aquatic systems
Found in: Proceedings of the 2012 BELIV Workshop: Beyond Time and Errors - Novel Evaluation Methods for Visualization (BELIV '12)
By Christoph Thomas, Denise Lach, Evan Hayduk, Jerilyn Walley, Judith Bayard Cushing, Kirsten Winters, Michael Bailey, Susan G. Stafford
Issue Date:October 2012
pp. 1-5
A need for better ecology visualization tools is well documented, and development of these is underway, including our own NSF funded Visualization of Terrestrial and Aquatic Systems (VISTAS) project, now beginning its second of four years. VISTAS' goal is ...
     
IT 2008: the history of a new computing discipline
Found in: Communications of the ACM
By Barry Lunt, Han Reichgelt, J. Ekstrom, Michael Bailey, Richard Leblanc
Issue Date:December 2010
pp. 133-141
The IT model curriculum represents an excellent starting point toward understanding more about IT as an academic discipline. The early 1990s saw the emergence of the Internet from the environs of the technical cognoscenti into the dot-com world with an int...
     
Internet background radiation revisited
Found in: Proceedings of the 10th annual conference on Internet measurement (IMC '10)
By Eric Wustrow, Farnam Jahanian, Geoff Huston, Manish Karir, Michael Bailey
Issue Date:November 2010
pp. 62-74
The monitoring of packets destined for routeable, yet unused, Internet addresses has proved to be a useful technique for measuring a variety of specific Internet phenomenon (e.g., worms, DDoS). In 2004, Pang et al. stepped beyond these targeted uses and pr...
     
Toward understanding distributed blackhole placement
Found in: Proceedings of the 2004 ACM workshop on Rapid malcode (WORM '04)
By Danny McPherson, David Watson, Evan Cooke, Farnam Jahanian, Michael Bailey, Z. Morley Mao
Issue Date:October 2004
pp. 54-64
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because there are no legitimate hosts in an unused address block, traffic must be the re...
     
Building the web server for a web systems class
Found in: Proceedings of the 5th conference on Information technology education (CITC5 '04)
By Michael Bailey, Nathan Blackham, Todd Berrett
Issue Date:October 2004
pp. 273-273
One major element in IT education is teaching many students how to develop and maintain Web applications, which presents a sizable challenge for universities that standard business environments do not encounter. Each student must have a separate place for ...
     
Wireless security patch management system
Found in: Proceedings of the 5th conference on Information technology education (CITC5 '04)
By Charles Higby, Michael Bailey
Issue Date:October 2004
pp. 165-168
Wireless access on college campuses facilitates the spread of computer viruses and worms due to laptops that do not have current software patches and/or antivirus protection connecting to the network. Wireless local area networks provide a luxury of mobili...
     
 1