Douglas Reeves


Papers and Talks


· Home · Resume · Teaching · Grad FAQ · Research
Students
· Research
Projects
· Papers +
Talks
·

 

A fair list of my papers in reverse chronological order can be found at DBLP

Or, you can look at my Google Scholar page.

Most of my research papers for the last 10 years are listed under the corresponding research project web pages. Below are listed papers not fitting into one of those projects. Some older papers may also be found here.

  • Kyuyong Shin, Douglas S. Reeves, "Winnowing: Protecting P2P systems against pollution through cooperative index filtering", J. Network and Computer Applications, 35(1): 72-84 (2012).
  • Jung Ki So, Douglas S. Reeves" Adaptive neighbor management for cooperative P2P video-on-demand streaming",IPCCC 2011: 1-10 .
  • Jung Ki So, Douglas S. Reeves" Defending against Sybil Nodes in BitTorrent", Networking (2) 2011: 25-39 .
  • Brent Rowe, Dallas Wood, Douglas S. Reeves" How the Public Views Strategies Designed to Reduce the Threat of Botnets", TRUST 2010: 337-351 .
  • J. Du, X. Gu, D. Reeves, "Highly Available Component Sharing in Large-Scale Multi-Tenant Cloud Systems", Proc. of High Performance Distributed Computing (HPDC 2010), pp. 85-94 .
  • K. Shin, D. Reeves, I. Rhee, "Treat-Before-Trick : Free-riding Prevention for BitTorrent-like Peer-to-Peer Networks", Proc. Of Intl. Parallel and Distributed Processing Symposium (IPDPS 2009), May 2009.
  • S. McKinney and D. Reeves, "User Identification Via Process Profiling", Proc. Of Cyber Security and Information Intelligence Research Workshop, April 2009 .
  • G. Karmous-Edwards, A. Vishwanath, D. Reeves, L. Battestilli, P. Vegesna, G. Rouskas, "Edge-Reconfigurable Optical Networks (ERONs): Rationale, Network Design, and Evaluation", IEEE/OSA Journal of Lightwave Technology, Vol. 27, Issue 12, pp. 1837-1845 (2009).
  • G. Karmous-Edwards, A. Vishwanath, D. Reeves, L. Battestilli, P. Vegesna, G. Rouskas, "ERONs: Dynamic Lightpath Networking via Overlay Control of Static Optical Connections", Proc. Of 13th Conf. on Optical Network Design and Modeling (ONDM 2009), February 2009 .
  • TJ O’Connor and D. S. Reeves, "Bluetooth Intrusion Detection", Proc. Of Annual Computer Security and Applications Conference (ACSAC 2008), December 2008.
  • Y. J. Pyun and D. S. Reeves, "Monitor Placement for Internet Traffic Analysis", Proc. Of IEEE Broadnets, August 2007.
  • R. Dutta, G. Rouskas, I. Baldine, D. S. Reeves, "On the Suitability of Composable Services for a Next Generation Assurable Network", Milcom 2007.
  • P. Wang, P. Ning, and D. S. Reeves, "A K-Anonymous Communication Protocol for Overlay Networks", in Proceedings of the 2nd ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2007), ACM Press, pp. 45-56, March 2007.
  • P. Wang, P. Ning, D. Reeves, "Network Access Control for Mobile Ad-hoc Networks", in Proc. Of the 7th Intl. Conf. on Information and Communications Security (ICICS 2005), Beijing, China, December 2005. Also LNCS 3783, Springer.
  • P. Wang, D. Reeves, and P. Ning, "Secure Address Autoconfiguration for MANETs", in Proc. Of 2nd Intl. Conf. on Mobile and Ubiquitous Systems (Mobiquitous 2005), San Diego, CA, July 2005 .
  • A. Shaker and D. Reeves, "Self-Stabilizing Structured Ring Topology P2P Systems", in Proc. Of the 5th Intl. Conf. on Peer-to-Peer Computing (P2P2005), Konstanz, Germany, August 2005.
  • Q. Zhang, P. Ning, and D. Reeves, "Defending Against Sybil Attacks in Sensor Networks", in Proc. Of 2nd International Workshop on Security in Distributed Computing Systems (SDCS 2005).
  • Q. Jiang, D. Reeves, and P. Ning, "Certificate Recommendations to Improve the Robustness of Webs of Trust", in Proc of the 7th International Security Conference (ISC2004). Also: Lecture Notes in Computer Science Volume 3225, Springer-Verlag, 2004.
  • P. Wang, P. Ning, D. Reeves, "Storage Efficient Stateless Group Key Revocation", in Proc of the 7th International Security Conference (ISC2004). Also: Lecture Notes in Computer Science Volume 3225, Springer-Verlag, 2004.
  • Y. Zhai, P. Ning, P. Iyer, and D. Reeves, "Reasoning About Complementary Intrusion Evidence", Proc. of ACSAC 2004. [PDF]
  • Q. Jiang, D. Reeves, and P. Ning, "Certificate Recommendations to Improve the Robustness of Webs of Trust", Proc. of ISC 2004. [PS]
  • P. Wang, P. Ning, and D. Reeves, "Storage-Efficient Stateless Group Key Revocation", Proc. of ISC 2004. [PDF]
  • E. Fulp and D. S. Reeves, “Pricing of Network Resources in Hierarchical Markets Under Time-Varying Demands”, Computer Networks, Volume 46, Issue 1, September 2004: Internet Economics: Pricing and Policies, pp. 41-52. . [PDF]
  • Y. J. Pyun and D. Reeves, "Constructing a Balanced, log(N)-Diameter Super-Peer Topology for Scalable P2P Systems", Proceedings of the 4th Intl. Conf. on Peer-to-Peer Computing (P2P2004), IEEE, August 2004, pp. 210-218. [PDF] [Presentation slides, PDF]
  • P. Ning, Y. Cui, and D. S. Reeves, “Techniques and Tools for Analyzing Intrusion Alerts”, ACM Transactions on Information and Systems Security, vol. 7, no. 2, pp. 274-318, May 2004. [PDF]
  • K. Wu and D. Reeves, "Capacity Planning of Survivable MPLS Networks Supporting DiffServ", Technical Report TR-2004-27, Department of Computer Science, NC State University, April 2004. [PDF]
  • K. Wu and D. S. Reeves, “Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic ”, Telecommunication Systems, volume 25, no. 3-4, pp. 193-207, March-April 2004. [PDF]
  • F. Feng and D. Reeves, "Explicit Proactive Handoff with Motion Prediction for Mobile IP", Proc. of the Wireless Communications and Networking Conference (WCNC 2004), vol. 2, IEEE, pp. 855-860, March 2004. [PDF] [Presentation slides, PDF]
  • Q. Jiang and D. Reeves, "Improving Robustness of PGP Keyrings through Conflict Detection",Tatsuaki Okamoto (ed.), Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Lecture Notes in Computer Science 2964 Springer 2004, pp. 194-207. [PDF]
  • J. Su and D. Reeves, "Replica Placement Algorithms with Latency Constraints in Content Distribution Networks", Technical Report TR-2004-6, Department of Computer Science, NC State University, February 2004 . [PDF]
  • Q. Jiang, D. Reeves, and P. Ning, "Certificate Recommendations to Improve the Robustness of Webs of Trust", Technical Report TR-2004-04, Department of Computer Science, NC State University, January 2004. [Compressed PS]
  • "Comments on an Address by David Levy concerning 'Building Usable Digital Libraries'", presented at the TRLN Digital Library Symposium, Research Triangle, NC, December 12, 2003. [TXT]
  • D. Reeves, "Wireless LAN (802.11) Security", presented at the Southeast Wireless Symposium, Winston-Salem, NC, December 2, 2003. [PPT]
  • X. Wang and D. S. Reeves, “Watermark Based Robust Correlation of Randomly Perturbed Encrypted Connections”, in Proc of the ACM Symposium on Computer and Communications Security (CCS), October 2003. [PDF]
  • K. Wu and D. S. Reeves, “Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ”, Proc. Of ITC-18 (International Teletraffic Conference), August 2003. [PDF] [presentation]
  • K. Wu and D. S. Reeves, “ Capacity Planning of DiffServ Networks with Best-effort and Expedited Forwarding Traffic ”, Proc. Of the International Conference on Communications (ICC), May 2003. [PDF]
  • P. Ning, Y. Cui, and D. Reeves, “Constructing Attack Scenarios through Correlation of Intrusion Alerts ”, Proc. Of the ACM Symposium on Computer and Communications Security (CCS 2002), pp. 245-254. [PDF]
  • E. Fulp and D. Reeves, “The Economic Impact of Network Pricing Intervals”, Proc. Of the Workshop on Advanced Internet Charging and QoS Technology (ICQT 2002 ), October 2002, published as From QoS Provisioning to QoS Charging, LNCS 2511, Springer-Verlag. [PDF]
  • P. Ning, Y. Cui, and D. Reeves, “Analyzing Intensive Intrusion Alerts Via Correlation”, Proc. Of the 5th Intl. Symposium on Recent Advances in Intrusion Detection (RAID 2002), October 2002, Springer-Verlag LNCS 2516. [PDF] [presentation]
  • X. Wang, D. Reeves, and S. F. Wu, “Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones”, Proc. Of the 7th European Symposium on Research in Computer Security (ESORICS 2002), October 2002, Springer-Verlag LNCS 2502. [PDF]

 


Last modified on Wednesday, 17-Sep-2014 07:00:19 EDT
Send comments to Douglas Reeves

designed with