The SDN shuffle: Creating a moving-target defense using host-based software-defined networking DC MacFarland, CA Shue Proceedings of the second ACM workshop on moving target defense, 37-41, 2015 | 139 | 2015 |
Abnormally malicious autonomous systems and their internet connectivity CA Shue, AJ Kalafut, M Gupta IEEE/ACM Transactions on Networking 20 (1), 220-230, 2011 | 67 | 2011 |
Control-flow integrity for real-time embedded systems RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward 31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019 | 65 | 2019 |
Characterizing network-based moving target defenses M Green, DC MacFarland, DR Smestad, CA Shue Proceedings of the Second ACM Workshop on Moving Target Defense, 31-35, 2015 | 52 | 2015 |
Analysis of IPSec overheads for VPN servers C Shue, Y Shin, M Gupta, JY Choi 1st IEEE ICNP Workshop on Secure Network Protocols, 2005.(NPSec)., 25-30, 2005 | 51 | 2005 |
Characterizing optimal DNS amplification attacks and effective mitigation DC MacFarland, CA Shue, AJ Kalafut Passive and Active Measurement: 16th International Conference, PAM 2015, New …, 2015 | 50 | 2015 |
" Empty space" computes: the evolution of an unconventional supercomputer JW Mills, M Parker, B Himebaugh, C Shue, B Kopecky, C Weilemann Proceedings of the 3rd Conference on Computing Frontiers, 115-126, 2006 | 42 | 2006 |
The best bang for the byte: Characterizing the potential of DNS amplification attacks DC MacFarland, CA Shue, AJ Kalafut Computer Networks 116, 12-21, 2017 | 41 | 2017 |
Ipsec: Performance analysis and enhancements CA Shue, M Gupta, SA Myers 2007 IEEE International Conference on Communications, 1527-1532, 2007 | 41 | 2007 |
Message authentication codes for secure remote non-native client connections to ros enabled robots R Toris, C Shue, S Chernova 2014 IEEE International Conference on Technologies for Practical Robot …, 2014 | 40 | 2014 |
Malicious hubs: detecting abnormally malicious autonomous systems AJ Kalafut, CA Shue, M Gupta 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 38 | 2010 |
Contextual, flow-based access control with scalable host-based SDN techniques CR Taylor, DC MacFarland, DR Smestad, CA Shue IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 34 | 2016 |
Architecture for removable media USB-ARM CA Shue, LM Lamb, NR Paul US Patent 9,081,960, 2015 | 33 | 2015 |
On building inexpensive network capabilities CA Shue, AJ Kalafut, M Allman, CR Taylor ACM SIGCOMM Computer Communication Review 42 (2), 72-79, 2012 | 32 | 2012 |
Understanding implications of DNS zone provisioning AJ Kalafut, CA Shue, M Gupta Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, 211-216, 2008 | 31 | 2008 |
The web is smaller than it seems CA Shue, AJ Kalafut, M Gupta Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 123-128, 2007 | 30 | 2007 |
Resolvers revealed: Characterizing DNS resolvers and their clients CA Shue, AJ Kalafut ACM Transactions on Internet Technology (TOIT) 12 (4), 1-17, 2013 | 27 | 2013 |
Understanding the security of interoperable medical devices using attack graphs CR Taylor, K Venkatasubramanian, CA Shue Proceedings of the 3rd international conference on High confidence networked …, 2014 | 26 | 2014 |
Automatic construction of anomaly detectors from graphical models EM Ferragut, DM Darmon, CA Shue, S Kelley 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 9-16, 2011 | 22 | 2011 |
Spamology: A study of spam origins CA Shue, M Gupta, JJ Lubia, CH Kong, A Yuksel the 6th Conference on Email and Anti-Spam (CEAS), 2009 | 21 | 2009 |