Papers and Talks
Papers and Talks
A fair list of my papers in reverse chronological order
can be found at
DBLP
Or, you can look at my
Google Scholar page.
Most of my research papers for the last 10 years are listed under the
corresponding research project web pages.
Below are listed papers not fitting into one of those projects. Some older
papers may also be found
here.
-
Kyuyong Shin, Douglas S. Reeves,
"Winnowing: Protecting P2P systems against pollution through
cooperative index filtering",
J. Network and Computer Applications, 35(1): 72-84 (2012).
-
Jung Ki So, Douglas S. Reeves" Adaptive neighbor management for
cooperative P2P video-on-demand streaming",IPCCC 2011: 1-10 .
-
Jung Ki So, Douglas S. Reeves" Defending against Sybil Nodes in
BitTorrent", Networking (2) 2011: 25-39 .
-
Brent Rowe, Dallas Wood, Douglas S. Reeves" How the Public
Views Strategies Designed to Reduce the Threat of Botnets",
TRUST 2010: 337-351 .
-
J. Du, X. Gu, D. Reeves, "Highly Available Component Sharing in
Large-Scale Multi-Tenant Cloud Systems", Proc. of High Performance
Distributed Computing (HPDC 2010), pp. 85-94 .
-
K. Shin, D. Reeves, I. Rhee, "Treat-Before-Trick : Free-riding
Prevention for BitTorrent-like Peer-to-Peer Networks", Proc. Of
Intl. Parallel and Distributed Processing Symposium (IPDPS 2009),
May 2009.
-
S. McKinney and D. Reeves, "User Identification Via Process
Profiling", Proc. Of Cyber Security and Information Intelligence
Research Workshop, April 2009 .
-
G. Karmous-Edwards, A. Vishwanath, D. Reeves, L. Battestilli, P.
Vegesna, G. Rouskas, "Edge-Reconfigurable Optical Networks
(ERONs): Rationale, Network Design, and Evaluation",
IEEE/OSA Journal of Lightwave Technology, Vol. 27,
Issue 12, pp. 1837-1845 (2009).
-
G. Karmous-Edwards, A. Vishwanath, D. Reeves, L. Battestilli, P.
Vegesna, G. Rouskas, "ERONs: Dynamic Lightpath Networking via
Overlay Control of Static Optical Connections", Proc. Of 13th Conf.
on Optical Network Design and Modeling (ONDM 2009), February 2009 .
-
TJ O’Connor and D. S. Reeves, "Bluetooth Intrusion
Detection", Proc. Of Annual Computer Security and Applications
Conference (ACSAC 2008), December 2008.
-
Y. J. Pyun and D. S. Reeves, "Monitor Placement for Internet Traffic
Analysis", Proc. Of IEEE Broadnets, August 2007.
-
R. Dutta, G. Rouskas, I. Baldine, D. S. Reeves, "On the
Suitability of Composable Services for a Next Generation Assurable
Network", Milcom 2007.
-
P. Wang, P. Ning, and D. S. Reeves, "A K-Anonymous
Communication Protocol for Overlay Networks", in Proceedings of the
2nd ACM Symposium on Information, Computer, and Communications
Security (ASIACCS 2007), ACM Press, pp. 45-56, March 2007.
-
P. Wang, P. Ning, D. Reeves, "Network Access Control for Mobile
Ad-hoc Networks", in Proc. Of the 7th Intl. Conf. on Information and Communications Security (ICICS 2005), Beijing, China, December 2005. Also LNCS 3783, Springer.
-
P. Wang, D. Reeves, and P. Ning, "Secure Address Autoconfiguration
for MANETs", in Proc. Of 2nd Intl. Conf. on Mobile and Ubiquitous
Systems (Mobiquitous 2005), San Diego, CA, July 2005 .
-
A. Shaker and D. Reeves, "Self-Stabilizing Structured Ring
Topology P2P Systems", in Proc. Of the 5th Intl. Conf. on Peer-to-Peer Computing (P2P2005), Konstanz, Germany, August 2005.
-
Q. Zhang, P. Ning, and D. Reeves, "Defending Against Sybil
Attacks in Sensor Networks", in Proc. Of 2nd International Workshop on Security in Distributed Computing Systems (SDCS 2005).
-
Q. Jiang, D. Reeves, and P. Ning, "Certificate Recommendations
to Improve the Robustness of Webs of Trust", in Proc of the 7th International Security Conference (ISC2004). Also: Lecture Notes in Computer Science Volume 3225, Springer-Verlag, 2004.
-
P. Wang, P. Ning, D. Reeves, "Storage Efficient Stateless Group
Key Revocation", in Proc of the 7th International Security Conference (ISC2004). Also: Lecture Notes in Computer Science Volume 3225, Springer-Verlag, 2004.
- Y. Zhai, P. Ning, P. Iyer, and D. Reeves, "Reasoning About
Complementary Intrusion Evidence", Proc. of ACSAC 2004. [PDF]
- Q. Jiang, D. Reeves, and P. Ning, "Certificate
Recommendations to Improve the Robustness of Webs of Trust",
Proc. of ISC 2004. [PS]
- P. Wang, P. Ning, and D. Reeves, "Storage-Efficient
Stateless Group Key Revocation", Proc. of ISC 2004. [PDF]
- E. Fulp and D. S. Reeves, “Pricing of Network Resources in Hierarchical Markets Under Time-Varying Demands”, Computer Networks, Volume 46, Issue 1, September 2004: Internet Economics: Pricing and Policies, pp. 41-52. . [PDF]
- Y. J. Pyun and D. Reeves, "Constructing a Balanced, log(N)-Diameter Super-Peer Topology for Scalable P2P Systems", Proceedings of the 4th Intl. Conf. on Peer-to-Peer Computing (P2P2004), IEEE, August 2004, pp. 210-218. [PDF] [Presentation slides, PDF]
- P. Ning, Y. Cui, and D. S. Reeves, “Techniques and Tools for Analyzing Intrusion Alerts”, ACM Transactions on Information and Systems Security, vol. 7, no. 2, pp. 274-318, May 2004. [PDF]
- K. Wu and D. Reeves, "Capacity Planning of Survivable MPLS Networks Supporting DiffServ", Technical Report TR-2004-27, Department of Computer Science, NC State University, April 2004. [PDF]
- K. Wu and D. S. Reeves, “Capacity Planning of DiffServ Networks with Best-Effort and Expedited Forwarding Traffic ”, Telecommunication Systems, volume 25, no. 3-4, pp. 193-207, March-April 2004. [PDF]
- F. Feng and D. Reeves, "Explicit Proactive Handoff with Motion Prediction for Mobile IP", Proc. of the Wireless Communications and Networking Conference (WCNC 2004), vol. 2, IEEE, pp. 855-860, March 2004. [PDF] [Presentation slides, PDF]
- Q. Jiang and D. Reeves, "Improving Robustness of PGP Keyrings through Conflict Detection",Tatsuaki Okamoto (ed.), Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings. Lecture Notes in Computer Science 2964 Springer 2004, pp. 194-207. [PDF]
- J. Su and D. Reeves, "Replica Placement Algorithms with Latency Constraints in Content Distribution Networks", Technical Report TR-2004-6, Department of Computer Science, NC State University, February 2004 . [PDF]
- Q. Jiang, D. Reeves, and P. Ning, "Certificate Recommendations to Improve the Robustness of Webs of Trust", Technical Report TR-2004-04, Department of Computer Science, NC State University, January 2004. [Compressed PS]
- "Comments on an Address by David Levy concerning 'Building Usable Digital Libraries'", presented at the TRLN Digital Library Symposium, Research Triangle, NC, December 12, 2003. [TXT]
- D. Reeves, "Wireless LAN (802.11) Security", presented at the Southeast Wireless Symposium, Winston-Salem, NC, December 2, 2003. [PPT]
- X. Wang and D. S. Reeves, “Watermark Based Robust Correlation of Randomly Perturbed Encrypted Connections”, in Proc of the ACM Symposium on Computer and Communications Security (CCS), October 2003. [PDF]
- K. Wu and D. S. Reeves, “Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ”, Proc. Of ITC-18 (International Teletraffic Conference), August 2003. [PDF] [presentation]
- K. Wu and D. S. Reeves, “ Capacity Planning of DiffServ Networks with Best-effort and Expedited Forwarding Traffic ”, Proc. Of the International Conference on Communications (ICC), May 2003. [PDF]
- P. Ning, Y. Cui, and D. Reeves, “Constructing Attack Scenarios through Correlation of Intrusion Alerts ”, Proc. Of the ACM Symposium on Computer and Communications Security (CCS 2002), pp. 245-254. [PDF]
- E. Fulp and D. Reeves, “The Economic Impact of Network Pricing Intervals”, Proc. Of the Workshop on Advanced Internet Charging and QoS Technology (ICQT 2002 ), October 2002, published as From QoS Provisioning to QoS Charging, LNCS 2511, Springer-Verlag. [PDF]
- P. Ning, Y. Cui, and D. Reeves, “Analyzing Intensive Intrusion Alerts Via Correlation”, Proc. Of the 5th Intl. Symposium on Recent Advances in Intrusion Detection (RAID 2002), October 2002, Springer-Verlag LNCS 2516. [PDF] [presentation]
- X. Wang, D. Reeves, and S. F. Wu, “Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones”, Proc. Of the 7th European Symposium on Research in Computer Security (ESORICS 2002), October 2002, Springer-Verlag LNCS 2502. [PDF]