


Остановите войну!
for scientists:
Michael K. Reiter
Person information

- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j54]Xiaokuan Zhang
, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. Int. J. Inf. Sec. 21(3): 689-706 (2022) - 2021
- [j53]Joseph Severini, Radhika Niranjan Mysore, Vyas Sekar, Sujata Banerjee, Michael K. Reiter:
The Netivus Manifesto: making collaborative network management easier for the rest of us. Comput. Commun. Rev. 51(2): 10-17 (2021) - [j52]Ziqiao Zhou, Michael K. Reiter:
Interpretable noninterference measurement and its application to processor designs. Proc. ACM Program. Lang. 5(OOPSLA): 1-30 (2021) - [c201]Keane Lucas, Mahmood Sharif, Lujo Bauer
, Michael K. Reiter
, Saurabh Shintre:
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes. AsiaCCS 2021: 744-758 - [c200]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter
, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CODASPY 2021: 65-76 - [c199]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing Latency of Symbolic Execution with Transactional Memory. NDSS 2021 - [c198]Cheng Guo, Brianne Campbell, Apu Kapadia, Michael K. Reiter, Kelly Caine:
Effect of Mood, Location, Trust, and Presence of Others on Video-Based Social Authentication. USENIX Security Symposium 2021: 1-18 - [c197]Ke Coby Wang, Michael K. Reiter:
Using Amnesia to Detect Credential Database Breaches. USENIX Security Symposium 2021: 839-855 - [c196]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Brief Announcement: Communication-Efficient BFT Using Small Trusted Hardware to Tolerate Minority Corruption. DISC 2021: 62:1-62:4 - [i26]Kai Wang, Lily Xu, Andrew Perrault, Michael K. Reiter, Milind Tambe:
Coordinating Followers to Reach Better Equilibria: End-to-End Gradient Descent for Stackelberg Games. CoRR abs/2106.03278 (2021) - [i25]Andrew C. Reed, Michael K. Reiter:
Optimally Hiding Object Sizes with Constrained Padding. CoRR abs/2108.01753 (2021) - [i24]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. CoRR abs/2112.14232 (2021) - [i23]Anrin Chakraborti, Giulia Fanti, Michael K. Reiter:
Distance-Aware Private Set Intersection. CoRR abs/2112.14737 (2021) - [i22]Sravya Yandamuri, Ittai Abraham, Kartik Nayak, Michael K. Reiter:
Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption. IACR Cryptol. ePrint Arch. 2021: 184 (2021) - 2020
- [j51]Zeyu Mi
, Haibo Chen
, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter
:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c195]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CODASPY 2020: 235-246 - [c194]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier Oliva:
Defense Through Diverse Directions. ICML 2020: 756-766 - [c193]Qiuyu Xiao, Brittany Subialdea, Lujo Bauer
, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. SACMAT 2020: 1-12 - [c192]Ke Coby Wang, Michael K. Reiter:
Detecting Stuffing of a User's Credentials at Her Own Accounts. USENIX Security Symposium 2020: 2201-2218 - [i21]Christopher M. Bender, Yang Li, Yifeng Shi, Michael K. Reiter, Junier B. Oliva:
Defense Through Diverse Directions. CoRR abs/2003.10602 (2020) - [i20]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CoRR abs/2008.02979 (2020)
2010 – 2019
- 2019
- [j50]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter:
A General Framework for Adversarial Examples with Objectives. ACM Trans. Priv. Secur. 22(3): 16:1-16:30 (2019) - [c191]Soumya Basu, Alin Tomescu, Ittai Abraham, Dahlia Malkhi, Michael K. Reiter, Emin Gün Sirer:
Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols. CCS 2019: 2387-2402 - [c190]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: A Scalable and Decentralized Trust Infrastructure. DSN 2019: 568-580 - [c189]Sheng Liu, Theophilus A. Benson, Michael K. Reiter:
Efficient and Safe Network Updates with Suffix Causal Consistency. EuroSys 2019: 23:1-23:15 - [c188]Ke Coby Wang, Michael K. Reiter:
How to End Password Reuse on the Web. NDSS 2019 - [c187]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. NDSS 2019 - [c186]Maofan Yin, Dahlia Malkhi, Michael K. Reiter
, Guy Golan-Gueta, Ittai Abraham:
HotStuff: BFT Consensus with Linearity and Responsiveness. PODC 2019: 347-356 - [i19]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CoRR abs/1910.08648 (2019) - [i18]Mahmood Sharif, Lujo Bauer
, Michael K. Reiter:
n-ML: Mitigating Adversarial Examples via Ensembles of Topologically Manipulated Classifiers. CoRR abs/1912.09059 (2019) - [i17]Mahmood Sharif, Keane Lucas, Lujo Bauer
, Michael K. Reiter, Saurabh Shintre:
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection. CoRR abs/1912.09064 (2019) - [i16]Ke Coby Wang, Michael K. Reiter:
Detecting stuffing of a user's credentials at her own accounts. CoRR abs/1912.11118 (2019) - [i15]Adam Humphries, Kartik Cating-Subramanian, Michael K. Reiter:
TASE: Reducing latency of symbolic execution with transactional memory. CoRR abs/1912.12363 (2019) - 2018
- [c185]Sisi Duan, Michael K. Reiter, Haibin Zhang:
BEAT: Asynchronous BFT Made Practical. CCS 2018: 2028-2041 - [c184]Victor Heorhiadi, Sanjay Chandrasekaran, Michael K. Reiter, Vyas Sekar:
Intent-driven composition of resource-management SDN applications. CoNEXT 2018: 86-97 - [c183]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-Norms for Creating and Preventing Adversarial Examples. CVPR Workshops 2018: 1605-1613 - [c182]Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:
Differentially Private Access Patterns for Searchable Symmetric Encryption. INFOCOM 2018: 810-818 - [c181]Ziqiao Zhou, Zhiyun Qian
, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. IEEE Symposium on Security and Privacy 2018: 514-528 - [i14]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, Michael K. Reiter:
Adversarial Generative Nets: Neural Network Attacks on State-of-the-Art Face Recognition. CoRR abs/1801.00349 (2018) - [i13]Mahmood Sharif, Lujo Bauer, Michael K. Reiter:
On the Suitability of Lp-norms for Creating and Preventing Adversarial Examples. CoRR abs/1802.09653 (2018) - [i12]Guy Golan-Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael K. Reiter, Dragos-Adrian Seredinschi, Orr Tamir, Alin Tomescu:
SBFT: a Scalable Decentralized Trust Infrastructure for Blockchains. CoRR abs/1804.01626 (2018) - [i11]Ke Coby Wang, Michael K. Reiter:
How to end password reuse on the web. CoRR abs/1805.00566 (2018) - [i10]Chenglu Jin, Marten van Dijk, Michael K. Reiter, Haibin Zhang:
PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion. IACR Cryptol. ePrint Arch. 2018: 1171 (2018) - 2017
- [j49]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [j48]Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia, Michael K. Reiter:
To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps' Privacy Permission Settings. Proc. Priv. Enhancing Technol. 2017(4): 119-137 (2017) - [j47]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Personalized Pseudonyms for Servers in the Cloud. Proc. Priv. Enhancing Technol. 2017(4): 271-289 (2017) - [c180]Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. AsiaCCS 2017: 7-18 - [c179]Sisi Duan, Michael K. Reiter, Haibin Zhang:
Secure Causal Atomic Broadcast, Revisited. DSN 2017: 61-72 - [c178]Weijie Liu, Debin Gao
, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. ESORICS (2) 2017: 210-228 - [c177]Sheng Liu, Michael K. Reiter, Vyas Sekar:
Flow Reconnaissance via Timing Attacks on SDN Switches. ICDCS 2017: 196-206 - [c176]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
A System to Verify Network Behavior of Known Cryptographic Clients. NSDI 2017: 177-195 - 2016
- [c175]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A Software Approach to Defeating Side Channels in Last-Level Caches. CCS 2016: 871-882 - [c174]Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer
, Michael K. Reiter
:
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition. CCS 2016: 1528-1540 - [c173]Elli Androulaki, Michael K. Reiter:
CCSW'16: 8th ACM Cloud Computing Security Workshop. CCS 2016: 1882-1883 - [c172]Jassim Aljuraidan, Lujo Bauer, Michael K. Reiter, Matthias Beckerle:
Introducing Reputation Systems to the Economics of Outsourcing Computations to Rational Workers. Financial Cryptography 2016: 60-77 - [c171]Victor Heorhiadi, Shriram Rajagopalan, Hani Jamjoom, Michael K. Reiter, Vyas Sekar:
Gremlin: Systematic Resilience Testing of Microservices. ICDCS 2016: 57-66 - [c170]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Simplifying Software-Defined Network Optimization Using SOL. NSDI 2016: 223-237 - [c169]Jay Aikat, Michael K. Reiter, Kevin Jeffay:
Education Modules for Networking, Cloud Computing, and Security in Systems Courses. SIGCSE 2016: 400 - [c168]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [e4]Edgar R. Weippl, Stefan Katzenbeisser, Mathias Payer, Stefan Mangard, Elli Androulaki, Michael K. Reiter:
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016. ACM 2016, ISBN 978-1-4503-4572-9 [contents] - [i9]Andrew Chi, Robert A. Cochran, Marie Nesfield, Michael K. Reiter, Cynthia Sturton:
Server-side verification of client behavior in cryptographic protocols. CoRR abs/1603.04085 (2016) - [i8]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A software approach to defeating side channels in last-level caches. CoRR abs/1603.05615 (2016) - [i7]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - 2015
- [j46]Lei Wei, Michael K. Reiter:
Toward practical encrypted email that supports private, regular-expression searches. Int. J. Inf. Sec. 14(5): 397-416 (2015) - [c167]Mehrdad Moradi, Feng Qian, Qiang Xu, Zhuoqing Morley Mao, Darrell Bethea, Michael K. Reiter:
Caesar: High-Speed and Memory-Efficient Forwarding Engine for Future Internet Architecture. ANCS 2015: 171-182 - [c166]Michael K. Reiter:
Side Channels in Multi-Tenant Environments. CCSW 2015: 1 - [c165]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. CCS 2015: 1582-1594 - [c164]Soo-Jin Moon, Vyas Sekar, Michael K. Reiter:
Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration. CCS 2015: 1595-1606 - [c163]Qatrunnada Ismail, Tousif Ahmed
, Apu Kapadia, Michael K. Reiter:
Crowdsourced Exploration of Security Configurations. CHI 2015: 467-476 - [c162]Darrell Bethea, Michael K. Reiter, Feng Qian, Qiang Xu, Zhuoqing Morley Mao:
WACCO and LOKO: Strong Consistency at Global Scale. CIC 2015: 130-141 - [c161]Peng Li, Debin Gao
, Michael K. Reiter:
Replica Placement for Availability in the Worst Case. ICDCS 2015: 599-608 - [c160]Sarah J. Andrabi, Michael K. Reiter, Cynthia Sturton:
Usability of Augmented Reality for Revealing Secret Messages to Users but Not Their Devices. SOUPS 2015: 89-102 - [i6]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
Accelerating the Development of Software-Defined Network Optimization Applications Using SOL. CoRR abs/1504.07704 (2015) - 2014
- [j45]Hye-Chung Kum, Ashok K. Krishnamurthy, Ashwin Machanavajjhala, Michael K. Reiter, Stanley C. Ahalt:
Privacy preserving interactive record linkage (PPIRL). J. Am. Medical Informatics Assoc. 21(2): 212-220 (2014) - [j44]Peng Li, Debin Gao
, Michael K. Reiter:
StopWatch: A Cloud Architecture for Timing Channel Mitigation. ACM Trans. Inf. Syst. Secur. 17(2): 8:1-8:28 (2014) - [c159]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c158]Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. CCS 2014: 1117-1130 - [c157]Alana Libonati, Kelly Caine, Apu Kapadia, Michael K. Reiter:
Defending against device theft with human notarization. CollaborateCom 2014: 8-17 - [c156]Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, Michael K. Reiter:
Toward strong, usable access control for shared distributed data. FAST 2014: 89-103 - [c155]Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar:
SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading. ICISS 2014: 9-29 - 2013
- [c154]Hye-Chung Kum, Ashok K. Krishnamurthy, Darshana Pathak, Michael K. Reiter, Stanley C. Ahalt:
Secure Decoupled Linkage (SDLink) system for building a social genome. IEEE BigData 2013: 7-11 - [c153]Yinqian Zhang, Michael K. Reiter:
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. CCS 2013: 827-838 - [c152]Seyed Kaveh Fayazbakhsh, Michael K. Reiter, Vyas Sekar:
Verifiable network function outsourcing: requirements, challenges, and roadmap. HotMiddlebox@CoNEXT 2013: 25-30 - [c151]Peng Li, Debin Gao
, Michael K. Reiter:
Mitigating access-driven timing channels in clouds using StopWatch. DSN 2013: 1-12 - [c150]Lei Wei, Michael K. Reiter:
Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2013: 147-163 - [c149]Robert A. Cochran, Michael K. Reiter:
Toward Online Verification of Client Behavior in Distributed Applications. NDSS 2013 - [c148]Lujo Bauer
, Lorrie Faith Cranor
, Saranga Komanduri, Michelle L. Mazurek, Michael K. Reiter, Manya Sleeper, Blase Ur:
The post anachronism: the temporal dimension of facebook privacy. WPES 2013: 1-12 - 2012
- [j43]Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding domain registration abuses. Comput. Secur. 31(7): 806-815 (2012) - [j42]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Trans. Inf. Syst. Secur. 15(2): 9:1-9:28 (2012) - [j41]Michael Abd-El-Malek, Matthew Wachs, James Cipar, Karan Sanghi, Gregory R. Ganger, Garth A. Gibson
, Michael K. Reiter:
File system virtual appliances: Portable file system implementations. ACM Trans. Storage 8(3): 9:1-9:26 (2012) - [c147]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - [c146]Peter F. Klemperer, Yuan Liang, Michelle L. Mazurek, Manya Sleeper, Blase Ur, Lujo Bauer
, Lorrie Faith Cranor
, Nitin Gupta, Michael K. Reiter:
Tag, you can see it!: using tags for access control in photo sharing. CHI 2012: 377-386 - [c145]Lujo Bauer
, Yuan Liang, Michael K. Reiter, Chad Spensky:
Discovering access-control misconfigurations: new approaches and evaluation methodologies. CODASPY 2012: 95-104 - [c144]Victor Heorhiadi, Michael K. Reiter, Vyas Sekar:
New opportunities for load balancing in network-wide intrusion detection systems. CoNEXT 2012: 361-372 - [c143]Lei Wei, Michael K. Reiter:
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. ESORICS 2012: 523-540 - [c142]Attila Altay Yavuz, Peng Ning, Michael K. Reiter:
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging. Financial Cryptography 2012: 148-163 - [c141]Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K. Reiter, Guangyu Shi:
Design and Implementation of a Consolidated Middlebox Architecture. NSDI 2012: 323-336 - [c140]Ting-Fang Yen, Michael K. Reiter:
Revisiting Botnet Models and Their Implications for Takedown Strategies. POST 2012: 249-268 - [c139]Kami Vaniea, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter:
Out of sight, out of mind: Effects of displaying access-control information near the item it controls. PST 2012: 128-136 - 2011
- [j40]Lujo Bauer
, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. ACM Trans. Inf. Syst. Secur. 14(1): 2:1-2:28 (2011) - [j39]Yao Liu, Peng Ning, Michael K. Reiter:
False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 14(1): 13:1-13:33 (2011) - [j38]Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side verification of client behavior in online games. ACM Trans. Inf. Syst. Secur. 14(4): 32:1-32:27 (2011) - [c138]Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded vector signatures and their applications. AsiaCCS 2011: 277-285 - [c137]Robert W. Reeder, Lujo Bauer
, Lorrie Faith Cranor
, Michael K. Reiter, Kami Vaniea:
More than skin deep: measuring effects of the underlying model on access-control system usability. CHI 2011: 2065-2074 - [c136]Xin Huang, Fabian Monrose, Michael K. Reiter:
Amplifying limited expert input to sanitize large network traces. DSN 2011: 494-505 - [c135]Vyas Sekar, Sylvia Ratnasamy, Michael K. Reiter, Norbert Egi, Guangyu Shi:
The middlebox manifesto: enabling innovation in middlebox deployment. HotNets 2011: 21 - [c134]Alana Libonati, Jonathan M. McCune, Michael K. Reiter:
Usability Testing a Malware-Resistant Input Mechanism. NDSS 2011 - [c133]Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter:
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy 2011: 313-328 - [i5]Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded Vector Signatures and their Applications. IACR Cryptol. ePrint Arch. 2011: 117 (2011) - 2010
- [j37]XiaoFeng Wang, Michael K. Reiter:
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats. IEEE Trans. Dependable Secur. Comput. 7(2): 203-216 (2010) - [c132]Yinqian Zhang, Fabian Monrose, Michael K. Reiter:
The security of modern password expiration: an algorithmic framework and empirical analysis. CCS 2010: 176-186 - [c131]Michelle L. Mazurek, J. P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion, Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, Richard Shay, Kami Vaniea, Lujo Bauer
, Lorrie Faith Cranor
, Gregory R. Ganger, Michael K. Reiter:
Access control for home data sharing: evaluating social acceptability. CHI 2010: 645-654 - [c130]Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta, Michael K. Reiter:
Network-wide deployment of intrusion detection and prevention systems. CoNEXT 2010: 18 - [c129]James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter:
Zzyzx: Scalable fault tolerance through Byzantine locking. DSN 2010: 363-372 - [c128]Ting-Fang Yen, Michael K. Reiter:
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart. ICDCS 2010: 241-252 - [c127]Vyas Sekar, Michael K. Reiter, Hui Zhang:
Revisiting the case for a minimalist approach for network flow monitoring. Internet Measurement Conference 2010: 328-341 - [c126]Lei Wei, Michael K. Reiter, Ketan Mayer-Patel:
Summary-Invisible Networking: Techniques and Defenses. ISC 2010: 210-225 - [c125]Darrell Bethea, Robert A. Cochran, Michael K. Reiter:
Server-side Verification of Client Behavior in Online Games. NDSS 2010 - [c124]Peng Li, Limin Liu, Debin Gao
, Michael K. Reiter:
On Challenges in Evaluating Malware Clustering. RAID 2010: 238-255 - [c123]Michael G. Merideth, Michael K. Reiter:
Selected Results from the Latest Decade of Quorum Systems Research. Replication 2010: 185-206 - [c122]