default search action
Lisa M. Marvel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j7]Yue Cao, Ahmed Osama Fathy Atya, Shailendra Singh, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta, Prashant Krishnamurthy, Lisa M. Marvel:
Packet Header Obfuscation Using MIMO. IEEE/ACM Trans. Netw. 28(4): 1712-1725 (2020)
2010 – 2019
- 2019
- [j6]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. IEEE/ACM Trans. Netw. 27(2): 560-576 (2019) - 2018
- [j5]Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel:
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit. IEEE/ACM Trans. Netw. 26(2): 765-778 (2018) - [c33]Yue Cao, Ahmed Osama Fathy Atya, Shailendra Singh, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Prashant Krishnamurthy, Lisa M. Marvel:
A Framework for MIMO-based Packet Header Obfuscation. INFOCOM 2018: 1763-1771 - 2017
- [c32]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Malicious co-residency on the cloud: Attacks and defense. INFOCOM 2017: 1-9 - 2016
- [j4]Sidney C. Smith, Robert J. Hammell II, Travis W. Parker, Lisa M. Marvel:
A Theoretical Exploration of the Impact of Packet Loss on Network Intrusion Detection. Int. J. Networked Distributed Comput. 4(1): 1-10 (2016) - [c31]Charles Huber, Patrick D. McDaniel, Scott E. Brown, Lisa M. Marvel:
Cyber Fighter Associate: A Decision Support System for cyber agility. CISS 2016: 198-203 - [c30]Giuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger:
Agility maneuvers to mitigate inference attacks on sensed location data. MILCOM 2016: 259-264 - [c29]Tom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel:
Enabling reproducible cyber research - four labeled datasets. MILCOM 2016: 539-544 - [c28]Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Shridatt James Sugrim, Ritu Chadha, Constantin Serban, Alexander Poylisher, Lisa M. Marvel, Jonathan Santos:
ACyDS: An adaptive cyber deception system. MILCOM 2016: 800-805 - [c27]Ritu Chadha, Thomas Bowen, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Alexander Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, Gary Walther, Lisa M. Marvel, E. Allison Newcomb, Jonathan Santos:
CyberVAN: A Cyber Security Virtual Assured Network testbed. MILCOM 2016: 1125-1130 - [c26]Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel:
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous. USENIX Security Symposium 2016: 209-225 - 2015
- [c25]Zhuo Lu, Lisa M. Marvel, Cliff Wang:
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs. MTD@CCS 2015: 85-93 - [c24]Lisa M. Marvel, Scott E. Brown, Iulian Neamtiu, Richard E. Harang, David Harman, Brian Henz:
A framework to evaluate cyber agility. MILCOM 2015: 31-36 - 2014
- [c23]Patrick D. McDaniel, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa M. Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy, Iulian Neamtiu:
Security and Science of Agility. MTD@CCS 2014: 13-19 - [c22]Tanzirul Azim, Iulian Neamtiu, Lisa M. Marvel:
Towards self-healing smartphone software via automated patching. ASE 2014: 623-628 - [c21]Lisa M. Marvel, Stephen Raio, Lori L. Pollock, David Arty, Gerard Chaney, Giorgio Bertoli, Christopher Paprcka, Wendy Choi, Erica Bertoli, Sandra K. Young:
A comparison of two hands-on laboratory experiences in computers, networks and cyber security for 10th-12th graders (abstract only). SIGCSE 2014: 720 - [c20]Sidney C. Smith, Robert J. Hammell, Travis W. Parker, Lisa M. Marvel:
A theoretical exploration of the impact of packet loss on network intrusion detection. SNPD 2014: 1-6 - 2012
- [c19]Michael E. Picollelli, Charles G. Boncelet Jr., Lisa M. Marvel:
Detecting clustering in streams. CISS 2012: 1-5 - 2011
- [c18]Michael E. Picollelli, Charles G. Boncelet Jr., Lisa M. Marvel:
Detecting clustering in binary sequences. CISS 2011: 1-4 - [c17]Brian J. Henz, Travis W. Parker, David A. Richie, Lisa M. Marvel:
Large scale MANET emulations using U.S. Army waveforms with application: VoIP. MILCOM 2011: 2164-2169
2000 – 2009
- 2009
- [c16]George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel:
Using XACML for Embedded and Fine-Grained Access Control Policy. ARES 2009: 462-468 - [c15]Karyn Benson, Lisa M. Marvel:
Using adaptive lossless compression to characterize network traffic. CISS 2009: 276-277 - 2008
- [c14]Lisa M. Marvel, Brian Henz, Charles G. Boncelet Jr.:
Fusing rate-specific SVM Classifiers for +/-1 embedding steganalysis. CISS 2008: 361-364 - [c13]George Hsieh, Gregory Patrick, Keith Foster, Gerald Emamali, Lisa M. Marvel:
Integrated mandatory access control for digital data. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 697302 - [c12]Charles G. Boncelet Jr., Lisa M. Marvel, Brian Henz:
Rate insensitive steganalysis of +/-1 embedding in images. ICIP 2008: 1272-1275 - 2007
- [c11]Charles G. Boncelet Jr., Lisa M. Marvel:
Lossless Compression-Based Steganalysis of LSB Embedded Images. CISS 2007: 923 - [c10]Charles G. Boncelet Jr., Lisa M. Marvel:
Steganalysis of ±1 Embedding using Lossless Image Compression. ICIP (2) 2007: 149-152 - 2006
- [c9]Lisa M. Marvel:
Q-ary Piecewise Linear Noise Modulation. CISS 2006: 771 - [c8]Charles G. Boncelet Jr., Lisa M. Marvel, Adrienne Jeanisha Raglin:
Compression-based steganalysis of LSB embedded images. Security, Steganography, and Watermarking of Multimedia Contents 2006: 607207 - 2005
- [j3]Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel:
Enabling control over adaptive program transformation for dynamically evolving mobile software validation. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-7 (2005) - [c7]Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel:
Enabling control over adaptive program transformation for dynamically evolving mobile software validation. SESS@ICSE 2005: 1-7 - 2003
- [c6]Mike Jochen, Lisa M. Marvel, Lori L. Pollock:
A Framework for Tamper Detection Marking of Mobile Applications. ISSRE 2003: 143-153 - 2002
- [c5]Mike Jochen, Lisa M. Marvel, Lori L. Pollock:
Bandwidth Efficient Tamper Detection for Distributed Java Systems. HPCS 2002: 257-266 - 2000
- [c4]Lisa M. Marvel, George W. Hartwig Jr., Charles G. Boncelet Jr.:
Compression-compatible fragile and semifragile tamper detection. Security and Watermarking of Multimedia Contents 2000: 131-139
1990 – 1999
- 1999
- [j2]Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter:
Spread spectrum image steganography. IEEE Trans. Image Process. 8(8): 1075-1083 (1999) - [j1]Lisa M. Marvel, Ali S. Khayrallah, Charles G. Boncelet Jr.:
Robust source coding of images for very noisy channels. IEEE Trans. Signal Process. 47(4): 1198-1202 (1999) - 1998
- [c3]Lisa M. Marvel, Charles T. Retter, Charles G. Boncelet Jr.:
Hiding Information in Images. ICIP (2) 1998: 396-398 - [c2]Lisa M. Marvel, Charles G. Boncelet Jr., Charles T. Retter:
Reliable Blind Information Hiding for Images. Information Hiding 1998: 48-61 - 1996
- [c1]Lisa M. Marvel, Ali S. Khayrallah, Charles G. Boncelet Jr.:
Robust source coding for images over very noisy channels. ICIP (3) 1996: 759-762
Coauthor Index
aka: Charles G. Boncelet Jr.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint