default search action
Ira S. Moskowitz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c62]Simon Kapiamba, Hesham Fouad, Ira S. Moskowitz:
Responsible Integration of Large Language Models (LLMs) in Navy Operational Plan Generation. AAAI Spring Symposia 2024: 50-53 - 2023
- [j13]William F. Lawless, Ira S. Moskowitz, Katarina Z. Doctor:
A Quantum-like Model of Interdependence for Embodied Human-Machine Teams: Reviewing the Path to Autonomy Facing Complexity and Uncertainty. Entropy 25(9): 1323 (2023) - 2022
- [j12]Ira S. Moskowitz, Pi Rogers, Stephen Russell:
Mutual Information and Multi-Agent Systems. Entropy 24(12): 1719 (2022) - 2021
- [p4]Ira S. Moskowitz:
Agent Team Action, Brownian Motion and Gambler's Ruin. Engineering Artificially Intelligent Systems 2021: 90-108
2010 – 2019
- 2018
- [j11]Paul Hyden, Richard G. McGrath, Ira S. Moskowitz, Stephen Russell:
Managing risk in high assurance systems by optimizing topological resources. J. Softw. Evol. Process. 30(3) (2018) - [c61]Ira S. Moskowitz, Stephen Russell, Brian Jalaian:
Steganographic Internet of Things: Graph Topology Timing Channels. AAAI Workshops 2018: 252-259 - [c60]Hesham Fouad, Ira S. Moskowitz:
Meta-Agents: Managing Dynamism in the Internet of Things (IoT) with Multi-agent Networks. AAAI Spring Symposia 2018 - [c59]Ira S. Moskowitz, Stephen Russell:
Valuable Information and the Internet of Things. AAAI Spring Symposia 2018 - 2017
- [p3]Stephen Russell, Ira S. Moskowitz, Adrienne Raglin:
Human Information Interaction, Artificial Intelligence, and Errors. Autonomy and Artificial Intelligence 2017: 71-101 - 2016
- [j10]Ira S. Moskowitz, Paul Hyden, Stephen Russell:
Network topology and mean infection times. Soc. Netw. Anal. Min. 6(1): 34:1-34:14 (2016) - [c58]Stephen Russell, Ira S. Moskowitz:
Human Information Interaction, Artificial Intelligence, and Errors. AAAI Spring Symposia 2016 - [c57]Paul Hyden, Ira S. Moskowitz, Stephen Russell:
Fortification Through Topological Dominance: Using Hop Distance and Randomized Topology Strategies to Enhance Network Security. AAAI Spring Symposia 2016 - [c56]Ira S. Moskowitz, William F. Lawless:
Human Caused Bifurcations in a Hybrid Team - A Position Paper. AAAI Spring Symposia 2016 - [c55]Evan Kaufman, Taeyoung Lee, Zhuming Ai, Ira S. Moskowitz:
Bayesian occupancy grid mapping via an exact inverse sensor model. ACC 2016: 5709-5715 - [c54]Paul Hyden, Ira S. Moskowitz, Stephen Russell:
Using Network Topology to Supplement High Assurance Systems. HASE 2016: 213-219 - [p2]Benjamin Newsom, Ranjeev Mittu, Mark A. Livingston, Stephen Russell, Jonathan W. Decker, Eric Leadbetter, Ira S. Moskowitz, Antonio Gilliam, Ciara Sibley, Joseph T. Coyne, Myriam Abramson:
Modeling User Behaviors to Enable Context-Aware Proactive Decision Support. Context-Enhanced Information Fusion 2016: 231-267 - 2015
- [c53]William Frere Lawless, Ira S. Moskowitz, Ranjeev Mittu, Donald A. Sofge:
A Thermodynamics of Teams: Towards a Robust Computational Model of Autonomous Teams. AAAI Spring Symposia 2015 - [c52]Ira S. Moskowitz, William Frere Lawless, Paul Hyden, Ranjeev Mittu:
A Network Science Approach to Entropy and Training. AAAI Spring Symposia 2015 - [c51]Napoleon Paxton, Dae-il Jang, Stephen Russell, Gail-Joon Ahn, Ira S. Moskowitz, Paul Hyden:
Utilizing Network Science and Honeynets for Software Induced Cyber Incident Analysis. HICSS 2015: 5244-5252 - [c50]Clement Kam, Sastry Kompella, Anthony Ephremides, Ira S. Moskowitz:
SINR-based scheduling for minimum latency broadcast. ICC 2015: 6252-6257 - [p1]Napoleon C. Paxton, Stephen Russell, Ira S. Moskowitz, Paul Hyden:
A Survey of Community Detection Algorithms Based On Analysis-Intent. Cyber Warfare 2015: 237-263 - 2014
- [c49]Hadis Dashtestani, Paul Cotae, Ira S. Moskowitz:
Joint optimal placement and energy allocation of underwater sensors in a tree topology. CISS 2014: 1-6 - [c48]Napoleon Paxton, Dae-il Jang, Ira S. Moskowitz, Gail-Joon Ahn, Stephen Russell:
Discovering and analyzing deviant communities: Methods and experiments. CollaborateCom 2014: 163-170 - [c47]Pedro N. Safier, Ira S. Moskowitz:
Network Traffic Anomalies, Natural Language Processing, and Random Matrix Theory. Complex Adaptive Systems 2014: 401-408 - [c46]Paul Cotae, Suresh Regmi, Ira S. Moskowitz:
Non-data aided doppler shift estimation for underwater acoustic communication. COMM 2014: 1-6 - 2013
- [c45]Hadis Dashtestani, Paul Cotae, Ira S. Moskowitz:
On the optimal placement of underwater sensors in a tree shaped multi-hop hierarchical network. CISS 2013: 1-6 - [c44]Pedro N. Safier, Ira S. Moskowitz, Gerard Allwein:
Capacity of an intensity interferometry channel. CISS 2013: 1-6 - 2012
- [j9]Siva K. Gorantla, Sachin Kadloor, Negar Kiyavash, Todd P. Coleman, Ira S. Moskowitz, Myong H. Kang:
Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels. IEEE Trans. Inf. Forensics Secur. 7(1): 64-75 (2012) - [c43]Ira S. Moskowitz, Paul Cotae, Pedro N. Safier:
Algebraic information theory and stochastic resonance for binary-input binary-output channels. CISS 2012: 1-6 - 2011
- [c42]Pedro N. Safier, Ira S. Moskowitz, Paul Cotae:
On the baseband communication performance of physical layer steganography. CISS 2011: 1-6 - [c41]Paul Cotae, Ira S. Moskowitz:
On the Partial Ordering of the Discrete Memoryless Channels Arising in Cooperative Sensor Networks. NTMS 2011: 1-5 - 2010
- [j8]Keye Martin, Ira S. Moskowitz, Gerard Allwein:
Algebraic information theory for binary channels. Theor. Comput. Sci. 411(19): 1918-1927 (2010) - [c40]Paul Cotae, Ira S. Moskowitz, Myong H. Kang:
Eigenvalue characterization of the capacity of discrete memoryless channels with invertible channel matrices. CISS 2010: 1-6 - [c39]Ira S. Moskowitz:
Approximations for the capacity of binary input discrete memoryless channels. CISS 2010: 1-5 - [c38]Siva K. Gorantla, Sachin Kadloor, Todd P. Coleman, Negar Kiyavash, Ira S. Moskowitz, Myong H. Kang:
Directed information and the NRL Network Pump. ISITA 2010: 343-348
2000 – 2009
- 2009
- [c37]Ira S. Moskowitz:
An approximation of the capacity of a simple channel. CISS 2009: 164-169 - 2008
- [c36]Richard E. Newman, Ira S. Moskowitz:
Practical Covert Channel Implementation through a Timed Mix-Firewall. IPCCC 2008: 433-438 - 2006
- [j7]Allen R. Miller, Ira S. Moskowitz:
Difference of Sums Containing Products of Binomial Coefficients and Their Logarithms. SIAM Rev. 48(2): 318-325 (2006) - [c35]Ira S. Moskowitz, Richard E. Newman:
Timing channels, anonymity, mixes, and spikes. ACST 2006: 252-256 - [c34]Keye Martin, Ira S. Moskowitz:
Noisy Timing Channels with Binary Inputs and Outputs. Information Hiding 2006: 124-144 - [c33]Keye Martin, Ira S. Moskowitz, Gerard Allwein:
Algebraic Information Theory For Binary Channels. MFPS 2006: 289-306 - 2005
- [c32]Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck:
The Pump: A Decade of Covert Fun. ACSAC 2005: 352-360 - [c31]Farid Ahmed, Ira S. Moskowitz:
Composite signature based watermarking for fingerprint authentication. MM&Sec 2005: 137-142 - 2004
- [c30]Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz:
Anonymity and Covert Channels in Simple Timed Mix-Firewalls. Privacy Enhancing Technologies 2004: 1-16 - 2003
- [j6]James Tracy, Liwu Chang, Ira S. Moskowitz:
An Agent-Based Approach to Inference Prevention in Distributed Database Systems. Int. J. Artif. Intell. Tools 12(3): 297-313 (2003) - [c29]Richard E. Newman, Ira S. Moskowitz, Paul F. Syverson, Andrei Serjantov:
Metrics for Trafic Analysis Prevention. Privacy Enhancing Technologies 2003: 48-65 - [c28]Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller:
Covert channels and anonymizing networks. WPES 2003: 79-88 - 2002
- [c27]Liwu Chang, Ira S. Moskowitz:
A Study of Inference Problems in Distributed Databases. DBSec 2002: 191-204 - [c26]James Tracy, Liwu Chang, Ira S. Moskowitz:
An Agent-Based Approach to Inference Prevention in Distributed Database Systems. ICTAI 2002: 413- - [c25]Richard E. Newman, Ira S. Moskowitz, Liwu Chang, Murali M. Brahmadesam:
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. Information Hiding 2002: 258-277 - [c24]Ira S. Moskowitz, Liwu Chang, Richard E. Newman:
Capacity is the wrong paradigm. NSPW 2002: 114-126 - 2001
- [c23]Ira S. Moskowitz, Myong H. Kang, Liwu Chang, Garth E. Longdon:
Randomly roving agents for intrusion detection. DBSec 2001: 135-149 - [e1]Ira S. Moskowitz:
Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings. Lecture Notes in Computer Science 2137, Springer 2001, ISBN 3-540-42733-3 [contents] - 2000
- [c22]Liwu Chang, Ira S. Moskowitz:
An Integrated Framework for Database Privacy Protection. DBSec 2000: 161-172 - [c21]Ira S. Moskowitz, Garth E. Longdon, Liwu Chang:
A new paradigm hidden in steganography. NSPW 2000: 41-50
1990 – 1999
- 1999
- [c20]Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz:
A Strategy for an MLS Workflow Management System. DBSec 1999: 161-174 - [c19]Ira S. Moskowitz, Liwu Chang:
An Entropy-Based Framework for Database Inference. Information Hiding 1999: 405-418 - 1998
- [j5]Myong H. Kang, Andrew P. Moore, Ira S. Moskowitz:
Design and Assurance Strategy for the NRL Pump. Computer 31(4): 56-64 (1998) - [j4]Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang:
An Analysis of the Timed Z-Channel. IEEE Trans. Inf. Theory 44(7): 3162-3168 (1998) - [c18]Liwu Chang, Ira S. Moskowitz:
Bayesian Methods to the Database Inference Problem. DBSec 1998: 237-251 - [c17]Liwu Chang, Ira S. Moskowitz:
Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. Workshop on New Security Paradigms 1998: 82-89 - 1997
- [c16]Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz:
An Architecture for Multilevel Secure Interoperability. ACSAC 1997: 194-204 - [c15]Liwu Chang, Ira S. Moskowitz:
Critical analysis of security in voice hiding techniques. ICICS 1997: 203-216 - [c14]Ira S. Moskowitz, Myong H. Kang:
An insecurity flow model. NSPW 1997: 61-74 - 1996
- [j3]Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee:
A Network Pump. IEEE Trans. Software Eng. 22(5): 329-338 (1996) - [c13]Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese:
A Case Study Of Two Nrl Pump Prototypes. ACSAC 1996: 32-43 - [c12]Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz:
A framework for MLS interoperability. HASE 1996: 198-205 - [c11]Catherine Meadows, Ira S. Moskowitz:
Covert Channels - A Context-Based View. Information Hiding 1996: 73-93 - [c10]Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang:
An Analysis of the Timed Z-channel. S&P 1996: 2-11 - 1995
- [c9]Ira S. Moskowitz, Myong H. Kang:
The Modulated-Input Modulated-Output Model. DBSec 1995: 61-75 - [c8]Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee:
A network version of the Pump. S&P 1995: 144-154 - 1994
- [c7]Ira S. Moskowitz, Allen R. Miller:
Simple timing channels. S&P 1994: 56-64 - 1993
- [j2]Ira S. Moskowitz:
Information Theory (Robert B. Ash). SIAM Rev. 35(4): 674-675 (1993) - [c6]Myong H. Kang, Ira S. Moskowitz:
A Pump for Rapid, Reliable, Secure Communication. CCS 1993: 119-129 - 1992
- [j1]Ira S. Moskowitz, Allen R. Miller:
The channel capacity of a certain noisy timing channel. IEEE Trans. Inf. Theory 38(4): 1339-1344 (1992) - [c5]Ira S. Moskowitz, Oliver Costich:
A classical Automata Approach to Noninterference Type Problems. CSFW 1992: 2-8 - [c4]Ira S. Moskowitz, Allen R. Miller:
The influence of delay upon an idealized channel's bandwidth. S&P 1992: 62-67 - 1991
- [c3]Oliver Costich, Ira S. Moskowitz:
Analysis of a Storage Channel in the Two-Phase Commit Protocol. CSFW 1991: 201-208 - [c2]Ira S. Moskowitz:
Variable Noise Effects Upon a Simple Timing Channel. S&P 1991: 362-372 - 1990
- [c1]Ira S. Moskowitz:
Quotient States and Probabilistic Channels. CSFW 1990: 74-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-04 20:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint