Follow
Craig A. Shue
Craig A. Shue
Professor and Department Head of Computer Science, Worcester Polytechnic Institute
Verified email at cs.wpi.edu - Homepage
Title
Cited by
Cited by
Year
The SDN shuffle: Creating a moving-target defense using host-based software-defined networking
DC MacFarland, CA Shue
Proceedings of the second ACM workshop on moving target defense, 37-41, 2015
1392015
Abnormally malicious autonomous systems and their internet connectivity
CA Shue, AJ Kalafut, M Gupta
IEEE/ACM Transactions on Networking 20 (1), 220-230, 2011
672011
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
652019
Characterizing network-based moving target defenses
M Green, DC MacFarland, DR Smestad, CA Shue
Proceedings of the Second ACM Workshop on Moving Target Defense, 31-35, 2015
522015
Analysis of IPSec overheads for VPN servers
C Shue, Y Shin, M Gupta, JY Choi
1st IEEE ICNP Workshop on Secure Network Protocols, 2005.(NPSec)., 25-30, 2005
512005
Characterizing optimal DNS amplification attacks and effective mitigation
DC MacFarland, CA Shue, AJ Kalafut
Passive and Active Measurement: 16th International Conference, PAM 2015, New …, 2015
502015
" Empty space" computes: the evolution of an unconventional supercomputer
JW Mills, M Parker, B Himebaugh, C Shue, B Kopecky, C Weilemann
Proceedings of the 3rd Conference on Computing Frontiers, 115-126, 2006
422006
The best bang for the byte: Characterizing the potential of DNS amplification attacks
DC MacFarland, CA Shue, AJ Kalafut
Computer Networks 116, 12-21, 2017
412017
Ipsec: Performance analysis and enhancements
CA Shue, M Gupta, SA Myers
2007 IEEE International Conference on Communications, 1527-1532, 2007
412007
Message authentication codes for secure remote non-native client connections to ros enabled robots
R Toris, C Shue, S Chernova
2014 IEEE International Conference on Technologies for Practical Robot …, 2014
402014
Malicious hubs: detecting abnormally malicious autonomous systems
AJ Kalafut, CA Shue, M Gupta
2010 Proceedings IEEE INFOCOM, 1-5, 2010
382010
Contextual, flow-based access control with scalable host-based SDN techniques
CR Taylor, DC MacFarland, DR Smestad, CA Shue
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
342016
Architecture for removable media USB-ARM
CA Shue, LM Lamb, NR Paul
US Patent 9,081,960, 2015
332015
On building inexpensive network capabilities
CA Shue, AJ Kalafut, M Allman, CR Taylor
ACM SIGCOMM Computer Communication Review 42 (2), 72-79, 2012
322012
Understanding implications of DNS zone provisioning
AJ Kalafut, CA Shue, M Gupta
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, 211-216, 2008
312008
The web is smaller than it seems
CA Shue, AJ Kalafut, M Gupta
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 123-128, 2007
302007
Resolvers revealed: Characterizing DNS resolvers and their clients
CA Shue, AJ Kalafut
ACM Transactions on Internet Technology (TOIT) 12 (4), 1-17, 2013
272013
Understanding the security of interoperable medical devices using attack graphs
CR Taylor, K Venkatasubramanian, CA Shue
Proceedings of the 3rd international conference on High confidence networked …, 2014
262014
Automatic construction of anomaly detectors from graphical models
EM Ferragut, DM Darmon, CA Shue, S Kelley
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 9-16, 2011
222011
Spamology: A study of spam origins
CA Shue, M Gupta, JJ Lubia, CH Kong, A Yuksel
the 6th Conference on Email and Anti-Spam (CEAS), 2009
212009
The system can't perform the operation now. Try again later.
Articles 1–20