[1]
|
Mitchell A. Thornton, Theodore W. Manikas Manikas, and Phillip A. Laplante.
Embedded and real-time systems classes in traditional and distance
format.
In Frontiers in Education Conference (FIE), October 2013.
[ bib |
paper ]
|
[2]
|
Marie Vasek and Tyler Moore.
Empirical analysis of factors affecting malware url detection.
In 8th APWG eCrime Researchers Summit (eCrime), September 2013.
[ bib ]
|
[3]
|
Jason Moore, Mitchell A. Thornton, and David W. Matula.
Low power floating-point multiplication and squaring units with
shared circuitry.
In IEEE Midwest Symposium on Circuits and Systems (MWSCAS),
August 2013.
[ bib |
paper ]
|
[4]
|
Mitchell A Thornton and Jennifer Dworak.
Ternary logic network justification using transfer matrices.
In IEEE International Symposium on Multiple-Valued Logic, May
2013.
[ bib |
paper ]
|
[5]
|
Mitchell A. Thornton and Theodore W. Manikas.
Spectral response of ternary logic netlists.
In IEEE International Symposium on Multiple-Valued Logic, May
2013.
[ bib |
paper ]
|
[6]
|
Theodore W. Manikas, Mitchell A. Thornton, and Frederick R. Chang.
Mission planning analysis using decision diagrams.
In Workshop on Applications of the Reed-Muller Expansion in
Circuit Design, May 2013.
[ bib ]
|
[7]
|
Mitchell A. Thornton.
A transfer function model for ternary switching logic circuits.
In IEEE International Symposium on Multiple-Valued Logic, May
2013.
[ bib |
paper ]
|
[8]
|
Tyler Moore and Nicolas Christin.
Beware the middleman: Empirical analysis of bitcoin-exchange risk.
In Financial Cryptography and Data Security, April 2013.
[ bib |
paper |
presentation ]
|
[9]
|
Steve Papa, William Casper, and Tyler Moore.
Securing wastewater collection systems from accidental and
intentional harm: a cost-benefit analysis.
In 7th IFIP Working Group 11.10 International Conference on
Critical Infrastructure Protection, March 2013.
[ bib |
paper ]
|
[10]
|
Yiwen Shi and Jennifer Dworak.
A simulated annealing inspired test optimization method for enhanced
detection of highly critical faults and defects.
J. Electronic Testing, 29(3):275-288, 2013.
[ bib |
publisher ]
|
[11]
|
Yiwen Shi and Jennifer Dworak.
A simulated annealing inspired test optimization method for enhanced
detection of highly critical faults and defects.
Journal of Electronic Testing, pages 1-14, 2013.
[ bib |
publisher ]
|
[12]
|
Tyler Moore.
The promise and perils of digital currencies.
International Journal of Critical Infrastructure Protection,
2013.
[ bib |
paper ]
|
[13]
|
Nektarios Leontiadis, Tyler Moore, and Nicolas Christin.
Pick your poison: Pricing and inventories at unlicensed online
pharmacies.
In ACM Conference on Electronic Commerce, pages 621-638, 2013.
[ bib |
publisher ]
|
[14]
|
Ebru C. Cankaya, Suku Nair, and Hakki C. Cankaya.
Applying error correction codes to achieve security and
dependability.
Computer Standards & Interfaces, 35(1):78-86, 2013.
[ bib |
publisher ]
|
[15]
|
Tyler Moore and Richard Clayton.
Discovering phishing dropboxes using email metadata.
In 7th APWG eCrime Researchers Summit (eCrime), Las Croabas,
PR, October 2012.
[ bib |
paper |
presentation ]
|
[16]
|
Rainer Böhme and Tyler Moore.
How do consumers react to cybercrime?
In APWG eCrime Researchers Summit (eCrime), Las Croabas, PR,
October 2012.
[ bib |
paper |
presentation ]
|
[17]
|
William Casper and Stephen Papa.
A multi-disciplined security engineering education approach.
In Conference on Security and Management (SAM), July
2012.
[ bib |
publisher ]
|
[18]
|
John Impagliazzo, Susan Conry, Eric Durant, Andrew D. McGettrick, Mitchell A.
Thornton, and Timothy Wilson.
Computer engineering review task force report.
In Laurie A. Smith King, David R. Musicant, Tracy Camp, and Paul T.
Tymann, editors, SIGCSE, pages 401-402. ACM, February 2012.
[ bib |
paper |
publisher ]
|
[19]
|
Jennifer Dworak, Kundan Nepal, Nuno Alves, Yiwen Shi, Nicholas Imbriglia, and
R. Iris Bahar.
Using implications to choose tests through suspect fault
identification.
ACM Transactions on Design Automation of Electronic Systems,
18(1):14, 2012.
[ bib |
publisher ]
|
[20]
|
Elif Alpaslan, Bram Kruseman, Ananta K. Majhi, Wilmar M. Heuvelman, and
Jennifer Dworak.
NIM-X: A Noise Index Model-based X-filling technique
to overcome the power supply switching noise effects on path delay test.
IEEE Trans. on CAD of Integrated Circuits and Systems,
31(5):809-813, 2012.
[ bib |
publisher ]
|
[21]
|
Theodore W. Manikas.
Integrated circuit channel routing using a pareto-optimal genetic
algorithm.
Journal of Circuits, Systems, and Computers, 21(5), 2012.
[ bib |
publisher ]
|
[22]
|
Theodore W. Manikas, David Y. Feinstein, and Mitchell A. Thornton.
Modeling medical system threats with conditional probabilities using
multiple-valued logic decision diagrams.
In D. Michael Miller and Vincent C. Gaudet, editors, ISMVL,
pages 244-249. IEEE, 2012.
[ bib |
paper |
publisher ]
|
[23]
|
Susan Landau and Tyler Moore.
Economic tussles in federated identity management.
First Monday, 17(10), 2012.
[ bib |
publisher |
presentation ]
|
[24]
|
Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, and Stephanie
Forrest.
Beyond the blacklist: Modeling malware spread and the effect of
interventions.
In Proceedings of the New Security Paradigms Workshop,
Bertinoro, Italy, September 19-21, 2012. ACM, 2012.
[ bib |
paper ]
|
[25]
|
Marie Vasek and Tyler Moore.
Do malware reports expedite cleanup? An experimental study.
In Proceedings of the 5th USENIX conference on Cyber Security
Experimentation and Test, CSET'12, Berkeley, CA, USA, 2012. USENIX
Association.
[ bib |
paper |
publisher |
presentation ]
|
[26]
|
Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michael van
Eeten, Michael Levi, Tyler Moore, and Stefan Savage.
Measuring the cost of cybercrime.
In WEIS, 2012.
[ bib |
paper |
presentation ]
|
[27]
|
Tyler Moore and Ross Anderson.
Internet security.
In Martin Peitz and Joel Waldfogel, editors, The Oxford Handbook
of the Digital Economy, pages 572-599. Oxford University Press, 2012.
[ bib |
paper |
publisher ]
|
[28]
|
Tyler Moore, Jie Han, and Richard Clayton.
The postmodern Ponzi scheme: Empirical analysis of high-yield
investment programs.
In Angelos D. Keromytis, editor, Financial Cryptography, volume
7397 of Lecture Notes in Computer Science, pages 41-56. Springer,
2012.
[ bib |
paper |
publisher |
presentation ]
|
[29]
|
Mitchell A. Thornton.
Professional licensure for software engineers: An update.
Computing in Science and Engineering, 14(5):85-87, 2012.
[ bib |
paper |
publisher ]
|
[30]
|
David Y. Feinstein and Mitchell A. Thornton.
Reversible logic synthesis based on decision diagram variable
ordering.
Multiple-Valued Logic and Soft Computing, 19(4):325-339, 2012.
[ bib |
paper |
publisher ]
|
[31]
|
Robert B. Reese, Scott C. Smith, and Mitchell A. Thornton.
Uncle - an RTL approach to asynchronous design.
In Jens Sparsø, Montek Singh, and Pascal Vivet, editors,
ASYNC, pages 65-72. IEEE Computer Society, May 2012.
[ bib |
paper |
publisher ]
|
[32]
|
Rohit P. Menon and Mitchell A. Thornton.
Global multiple-valued clock approach for high-performance
multi-phase clock integrated circuits.
In D. Michael Miller and Vincent C. Gaudet, editors, ISMVL,
pages 19-24. IEEE, 2012.
[ bib |
paper |
publisher ]
|
[33]
|
David Y. Feinstein and Mitchell A. Thornton.
Using the asynchronous paradigm for reversible sequential circuit
implementation.
In D. Michael Miller and Vincent C. Gaudet, editors, ISMVL,
pages 305-310. IEEE, 2012.
[ bib |
paper |
publisher ]
|
[34]
|
Nuno Alves, Y. Shi, N. Imbriglia, Jennifer Dworak, Kundan Nepal, and R. Iris
Bahar.
Dynamic test set selection using implication-based on-chip diagnosis.
In European Test Symposium, page 211. IEEE Computer Society,
2011.
[ bib |
publisher ]
|
[35]
|
Yiwen Shi, Kantapon Kaewtip, Wan-Chan Hu, and Jennifer Dworak.
Partial state monitoring for fault detection estimation.
In Bill Eklow and R. D. (Shawn) Blanton, editors, ITC, pages
1-10. IEEE, 2011.
[ bib |
publisher ]
|
[36]
|
Nuno Alves, Yiwen Shi, Jennifer Dworak, R. Iris Bahar, and Kundan Nepal.
Enhancing online error detection through area-efficient multi-site
implications.
In VTS, pages 241-246. IEEE Computer Society, 2011.
[ bib |
publisher ]
|
[37]
|
Theodore W. Manikas, Mitchell A. Thornton, and David Y. Feinstein.
Using multiple-valued logic decision diagrams to model system threat
probabilities.
In Jaakko Astola and Radomir S. Stankovic, editors, ISMVL,
pages 263-267. IEEE, 2011.
[ bib |
paper |
publisher ]
|
[38]
|
Tyler Moore, Nektarios Leontiadis, and Nicolas Christin.
Fashion crimes: trending-term exploitation on the web.
In Yan Chen, George Danezis, and Vitaly Shmatikov, editors, ACM
Conference on Computer and Communications Security, pages 455-466. ACM,
2011.
[ bib |
paper |
publisher |
presentation ]
|
[39]
|
Nektarios Leontiadis, Tyler Moore, and Nicolas Christin.
Measuring and analyzing search-redirection attacks in the illicit
online prescription drug trade.
In USENIX Security Symposium. USENIX Association, 2011.
[ bib |
paper |
publisher ]
|
[40]
|
Steven A. Hofmeyr, Tyler Moore, Stephanie Forrest, Benjamin Edwards, and George
Stelle.
Modeling internet-scale policies for cleaning up malware.
In WEIS, 2011.
[ bib |
paper |
publisher ]
|
[41]
|
Susan Landau and Tyler Moore.
Economic tussles in federated identity management.
In WEIS, 2011.
[ bib |
publisher |
presentation ]
|
[42]
|
Tyler Moore and Richard Clayton.
Ethical dilemmas in take-down research.
In George Danezis, Sven Dietrich, and Kazue Sako, editors,
Financial Cryptography Workshops, volume 7126 of Lecture Notes in
Computer Science, pages 154-168. Springer, 2011.
[ bib |
paper |
publisher |
presentation ]
|
[43]
|
Tyler Moore and Richard Clayton.
The impact of public information on phishing attack and defense.
Communications & Strategies, 1(81):45-68, 1st quart 2011.
[ bib |
paper |
publisher ]
|
[44]
|
Stephen M. Papa, William D. Casper, and Suku Nair.
Placement of trust anchors in embedded computer systems.
In HOST, pages 111-116. IEEE Computer Society, 2011.
[ bib |
publisher ]
|
[45]
|
Suku Nair, Subil Abraham, and Omar Al-Ibrahim.
Security architecture for resource-limited environments.
In IWCMC, pages 412-417. IEEE, 2011.
[ bib |
publisher ]
|
[46]
|
Omar Al-Ibrahim and Suku Nair.
Cyber-physical security using system-level pufs.
In IWCMC, pages 1672-1676. IEEE, 2011.
[ bib |
publisher ]
|
[47]
|
Paul Krier, Sai Seshabhattar, Daniel Engels, and Suku Nair.
Cloaking RFID tags.
In Consumer Communications and Networking Conference, pages
1036-1040. IEEE, January 2011.
[ bib |
publisher ]
|
[48]
|
David Y. Feinstein and Mitchell A. Thornton.
On the skipped variables of quantum multiple-valued decision
diagrams.
In Jaakko Astola and Radomir S. Stankovic, editors, ISMVL,
pages 164-169. IEEE, 2011.
[ bib |
paper |
publisher ]
|
[49]
|
Mitchell A. Thornton.
Keystroke dynamics.
In Encyclopedia of Cryptography and Security, 2nd Ed., pages
688-691. Springer, 2011.
[ bib |
paper |
publisher ]
|
[50]
|
Nuno Alves, Alison Buben, Kundan Nepal, Jennifer Dworak, and R. Iris Bahar.
A cost effective approach for online error detection using invariant
relationships.
IEEE Trans. on CAD of Integrated Circuits and Systems,
29(5):788-801, 2010.
[ bib |
publisher ]
|
[51]
|
Elif Alpaslan, Yu Huang, Xijiang Lin, Wu-Tung Cheng, and Jennifer Dworak.
On reducing scan shift activity at rtl.
IEEE Trans. on CAD of Integrated Circuits and Systems,
29(7):1110-1120, 2010.
[ bib |
publisher ]
|
[52]
|
Elif Alpaslan, Jennifer Dworak, Bram Kruseman, Ananta K. Majhi, Wilmar M.
Heuvelman, and Paul van de Wiel.
Nim- a noise index model to estimate delay discrepancies between
silicon and simulation.
In DATE, pages 1373-1376. IEEE, 2010.
[ bib |
publisher ]
|
[53]
|
Nuno Alves, Kundan Nepal, Jennifer Dworak, and R. Iris Bahar.
Improving the testability and reliability of sequential circuits with
invariant logic.
In R. Iris Bahar, Fabrizio Lombardi, David Atienza, and Erik
Brunvand, editors, ACM Great Lakes Symposium on VLSI, pages 131-134.
ACM, 2010.
[ bib |
publisher ]
|
[54]
|
Yiwen Shi, Wan-Chan Hu, and Jennifer Dworak.
Too many faults, too little time on creating test sets for enhanced
detection of highly critical faults and defects.
In VTS, pages 319-324. IEEE Computer Society, 2010.
[ bib |
publisher ]
|
[55]
|
Peter LoPresti, Theodore W. Manikas, and Jeff Kohlbeck.
An electrical engineering summer academy for middle school and high
school students.
IEEE Trans. Education, 53(1):18-25, 2010.
[ bib |
paper |
publisher ]
|
[56]
|
Tyler Moore.
The economics of cybersecurity: Principles and policy options.
International Journal of Critical Infrastructure Protection,
3(3-4):103 - 117, 2010.
[ bib |
DOI |
paper |
publisher ]
|
[57]
|
Tyler Moore.
The economics of cybersecurity: Principles and policy options.
In Proceedings of a Workshop on Deterring Cyberattacks:
Informing Strategies and Developing Options for U.S. Policy. The National
Academies Press, 2010.
[ bib |
publisher ]
|
[58]
|
Tyler Moore, Allan Friedman, and Ariel D. Procaccia.
Would a 'cyber warrior' protect us: exploring trade-offs between
attack and defense of information systems.
In Angelos D. Keromytis, Sean Peisert, Richard Ford, and Carrie
Gates, editors, NSPW, pages 85-94. ACM, 2010.
[ bib |
paper |
publisher ]
|
[59]
|
Rainer Böhme and Tyler Moore.
The iterated weakest link.
IEEE Security & Privacy, 8(1):53-55, 2010.
[ bib |
paper |
publisher ]
|
[60]
|
Tal Moran and Tyler Moore.
The phish-market protocol: Secure sharing between competitors.
IEEE Security & Privacy, 8(4):40-45, 2010.
[ bib |
paper |
publisher ]
|
[61]
|
Tal Moran and Tyler Moore.
The phish-market protocol: Securely sharing attack data between
competitors.
In Radu Sion, editor, Financial Cryptography, volume 6052 of
Lecture Notes in Computer Science, pages 222-237. Springer, 2010.
[ bib |
paper |
publisher |
presentation ]
|
[62]
|
Tyler Moore and Benjamin Edelman.
Measuring the perpetrators and funders of typosquatting.
In Radu Sion, editor, Financial Cryptography, volume 6052 of
Lecture Notes in Computer Science, pages 175-191. Springer, 2010.
[ bib |
paper |
publisher |
presentation ]
|
[63]
|
Thomas H. Morris and V. S. S. Nair.
Private computing on public platforms: portable application security.
Wireless Communications and Mobile Computing, 10(7):942-958,
2010.
[ bib |
publisher ]
|
[64]
|
Saeed Abu-Nimeh and Suku Nair.
Circumventing security toolbars and phishing filters via rogue
wireless access points.
Wireless Communications and Mobile Computing, 10(8):1128-1139,
2010.
[ bib |
publisher ]
|
[65]
|
Paul Krier, Sai Seshabhattar, Jason Pereira, Daniel W. Engels, and Suku Nair.
Lightweight key agreement with key chaining.
In MASS, pages 594-599. IEEE, 2010.
[ bib |
publisher ]
|
[66]
|
Lun Li and Mitchell A. Thornton.
Digital System Verification: A Combined Formal Methods and
Simulation Framework.
Synthesis Lectures on Digital Circuits and Systems. Morgan &
Claypool Publishers, 2010.
[ bib |
publisher ]
|
[67]
|
Steven F. Barrett and Mitchell A. Thornton.
To PE or not to PE: the sequel.
Computing in Science and Engineering, 12(4):62-65, 2010.
[ bib |
paper |
publisher ]
|
[68]
|
Satyendra R. Datla and Mitchell A. Thornton.
Quaternary voltage-mode logic cells and fixed-point multiplication
circuits.
In ISMVL, pages 128-133. IEEE Computer Society, May 2010.
[ bib |
paper |
publisher ]
|
[69]
|
Nuno Alves, Kundan Nepal, Jennifer Dworak, and R. Iris Bahar.
Detecting errors using multi-cycle invariance information.
In DATE, pages 791-796. IEEE, 2009.
[ bib |
publisher ]
|
[70]
|
Nuno Alves, Jennifer Dworak, R. Iris Bahar, and Kundan Nepal.
Compacting test vector sets via strategic use of implications.
In ICCAD, pages 83-88. IEEE, 2009.
[ bib |
publisher ]
|
[71]
|
Tyler Moore, Richard Clayton, and Ross Anderson.
The economics of online crime.
Journal of Economic Perspectives, 23(3):3-20, Summer 2009.
[ bib |
paper |
publisher ]
|
[72]
|
Rainer Böhme and Tyler Moore.
The iterated weakest link - a model of adaptive security investment.
In WEIS, 2009.
[ bib |
paper |
publisher |
presentation ]
|
[73]
|
Tyler Moore, Richard Clayton, and Henry Stern.
Temporal correlations between spam and phishing websites.
In Proceedings of the 2nd USENIX conference on Large-scale
exploits and emergent threats: botnets, spyware, worms, and more, LEET'09,
Berkeley, CA, USA, 2009. USENIX Association.
[ bib |
paper |
publisher |
presentation ]
|
[74]
|
Tyler Moore and Richard Clayton.
Evil searching: Compromise and recompromise of internet hosts for
phishing.
In Roger Dingledine and Philippe Golle, editors, Financial
Cryptography, volume 5628 of Lecture Notes in Computer Science, pages
256-272. Springer, 2009.
[ bib |
paper |
publisher |
presentation ]
|
[75]
|
Tyler Moore and Richard Clayton.
The impact of incentives on notice and take-down.
In M.E. Johnson, editor, Managing Information Risk and the
Economics of Security, pages 199-223. Springer, 2009.
[ bib |
paper |
publisher |
presentation ]
|
[76]
|
Ross Anderson, Rainer Böhme, Richard Clayton, and Tyler Moore.
Security economics and European policy.
In M.E. Johnson, editor, Managing Information Risk and the
Economics of Security, pages 55-80. Springer, 2009.
[ bib |
DOI |
paper |
publisher ]
|
[77]
|
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, and Suku Nair.
Distributed phishing detection by applying variable selection using
bayesian additive regression trees.
In ICC, pages 1-5. IEEE, 2009.
[ bib |
publisher ]
|
[78]
|
Thomas H. Morris and V. S. S. Nair.
Encryption key protection for private computing on public platforms.
In PerCom Workshops, pages 1-6. IEEE Computer Society, 2009.
[ bib |
publisher ]
|
[79]
|
David Y. Feinstein, Mitchell A. Thornton, and D. Michael Miller.
Minimization of quantum multiple-valued decision diagrams using data
structure metrics.
Multiple-Valued Logic and Soft Computing, 15(4):361-377, 2009.
[ bib |
paper |
publisher ]
|
[80]
|
Alex Fit-Florea, Lun Li, Mitchell A. Thornton, and David W. Matula.
A discrete logarithm number system for integer arithmetic modulo
2k: Algorithms and lookup structures.
IEEE Trans. Computers, 58(2):163-174, 2009.
[ bib |
paper |
publisher ]
|
[81]
|
Satyendra R. Datla, Mitchell A. Thornton, and David W. Matula.
A low power high performance radix-4 approximate squaring circuit.
In ASAP, pages 91-97. IEEE, 2009.
[ bib |
paper |
publisher ]
|
[82]
|
David Y. Feinstein and Mitchell A. Thornton.
On the guidance of reversible logic synthesis by dynamic variable
reordering.
In ISMVL, pages 132-138. IEEE Computer Society, 2009.
[ bib |
paper |
publisher ]
|
[83]
|
Satyendra R. Datla, Mitchell A. Thornton, Luther Hendrix, and Dave Henderson.
Quaternary addition circuits based on SUSLOC voltage-mode
cells and modeling with systemverilog.
In ISMVL, pages 256-261. IEEE Computer Society, 2009.
[ bib |
paper |
publisher ]
|
[84]
|
Yiwen Shi, Kellie DiPalma, and Jennifer Dworak.
Efficient determination of fault criticality for manufacturing test
set optimization.
In Cristiana Bolchini, Yong-Bin Kim, Dimitris Gizopoulos, and
Mohammad Tehranipoor, editors, DFT, pages 403-411. IEEE Computer
Society, 2008.
[ bib |
publisher ]
|
[85]
|
Kundan Nepal, Nuno Alves, Jennifer Dworak, and R. Iris Bahar.
Using implications for online error detection.
In Douglas Young and Nur A. Touba, editors, ITC, pages 1-10.
IEEE, 2008.
[ bib |
publisher ]
|
[86]
|
Elif Alpaslan, Yu Huang, Xijiang Lin, Wu-Tung Cheng, and Jennifer Dworak.
Reducing scan shift power at rtl.
In VTS, pages 139-146. IEEE Computer Society, 2008.
[ bib |
publisher ]
|
[87]
|
Theodore W. Manikas and Dale Teeters.
Multiple-valued logic memory system design using nanoscale
electrochemical cells.
In ISMVL, pages 197-201. IEEE Computer Society, 2008.
[ bib |
paper |
publisher ]
|
[88]
|
Tyler Moore and Richard Clayton.
The consequence of non-cooperation in the fight against phishing.
In APWG eCrime Researchers Summit, pages 1-14. IEEE, 2008.
[ bib |
paper |
publisher |
presentation ]
|
[89]
|
Ross Anderson, Rainer Böhme, Richard Clayton, and Tyler Moore.
Security economics and European policy.
In Norbert Pohlmann, Helmut Reimer, and Wolfgang Schneider, editors,
ISSE, pages 57-76. Vieweg+Teubner, 2008.
[ bib |
publisher ]
|
[90]
|
Tyler Moore and Richard Clayton.
Evaluating the wisdom of crowds in assessing phishing websites.
In Gene Tsudik, editor, Financial Cryptography, volume 5143 of
Lecture Notes in Computer Science, pages 16-30. Springer, 2008.
[ bib |
paper |
publisher |
presentation ]
|
[91]
|
Tyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross
Anderson, and Jean-Pierre Hubaux.
Fast exclusion of errant devices from vehicular networks.
In SECON, pages 135-143. IEEE, 2008.
[ bib |
paper |
publisher ]
|
[92]
|
Padmaraj M. V. Nair, Suku Nair, Marco F. Marchetti, Girish Chiruvolu, and Maher
Ali.
Bandwidth sensitive fast failure recovery scheme for metro ethernet.
Computer Networks, 52(8):1603-1616, 2008.
[ bib |
publisher ]
|
[93]
|
Thomas H. Morris and V. S. S. Nair.
Privacy protected elf for private computing on public platforms.
In ARES, pages 452-457. IEEE Computer Society, 2008.
[ bib |
publisher ]
|
[94]
|
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, and Suku Nair.
Bayesian additive regression trees-based spam detection for enhanced
email privacy.
In ARES, pages 1044-1051. IEEE Computer Society, 2008.
[ bib |
publisher ]
|
[95]
|
Saeed Abu-Nimeh and Suku Nair.
Bypassing security toolbars and phishing filters via dns poisoning.
In GLOBECOM, pages 2001-2006. IEEE, 2008.
[ bib |
publisher ]
|
[96]
|
Thomas H. Morris and V. S. S. Nair.
Secure context switch for private computing on public platforms.
In GLOBECOM, pages 2159-2163. IEEE, 2008.
[ bib |
publisher ]
|
[97]
|
Chad M. Lawler, Michael A. Harper, Stephen A. Szygenda, and Mitchell A.
Thornton.
Components of disaster-tolerant computing: Analysis of disaster
recovery, IT application downtime and executive visibility.
IJBIS, 3(3):317-331, 2008.
[ bib |
paper |
publisher ]
|
[98]
|
David Y. Feinstein, Mitchell A. Thornton, and D. Michael Miller.
Partially redundant logic detection using symbolic equivalence
checking in reversible and irreversible logic circuits.
In DATE, pages 1378-1381. IEEE, 2008.
[ bib |
paper |
publisher ]
|
[99]
|
David Y. Feinstein, Mitchell A. Thornton, and D. Michael Miller.
On the data structure metrics of quantum multiple-valued decision
diagrams.
In ISMVL, pages 138-143. IEEE Computer Society, 2008.
[ bib |
paper |
publisher ]
|
[100]
|
Mitchell A. Thornton, David W. Matula, Laura Spenner, and D. Michael Miller.
Quantum logic implementation of unary arithmetic operations.
In ISMVL, pages 202-207. IEEE Computer Society, 2008.
[ bib |
paper |
publisher ]
|
[101]
|
Jennifer Dworak.
Which defects are most critical? optimizing test sets to minimize
failures due to test escapes.
In Jill Sibert and Janusz Rajski, editors, ITC, pages 1-10.
IEEE, 2007.
[ bib |
publisher ]
|
[102]
|
Jennifer Dworak.
An analysis of defect detection for weighted random patterns
generated with observation/excitation-aware partial fault targeting.
In VTS, pages 205-210. IEEE Computer Society, 2007.
[ bib |
publisher ]
|
[103]
|
Ross Anderson and Tyler Moore.
Information security economics - and beyond.
In Alfred Menezes, editor, CRYPTO, volume 4622 of Lecture
Notes in Computer Science, pages 68-91. Springer, 2007.
[ bib |
paper |
publisher ]
|
[104]
|
Ross Anderson, Tyler Moore, Shishir Nagaraja, and Andy Ozment.
Incentives and information security.
In Noam Nisan, Tim Roughgarden, Eva Tardos, and Vijay V. Vazirani,
editors, Algorithmic Game Theory, pages 633-649. Cambridge University
Press, New York, NY, USA, 2007.
[ bib ]
|
[105]
|
Tyler Moore and Richard Clayton.
Examining the impact of website take-down on phishing.
In Lorrie Faith Cranor, editor, APWG eCrime Researchers Summit,
volume 269 of ACM International Conference Proceeding Series, pages
1-13. ACM, 2007.
[ bib |
paper |
publisher |
presentation ]
|
[106]
|
Tyler Moore, Jolyon Clulow, Shishir Nagaraja, and Ross Anderson.
New strategies for revocation in ad-hoc networks.
In Frank Stajano, Catherine Meadows, Srdjan Capkun, and Tyler Moore,
editors, ESAS, volume 4572 of Lecture Notes in Computer Science,
pages 232-246. Springer, 2007.
[ bib |
paper |
publisher |
presentation ]
|
[107]
|
Tyler Moore and Jolyon Clulow.
Secure path-key revocation for symmetric key pre-distribution schemes
in sensor networks.
In Hein S. Venter, Mariki M. Eloff, Les Labuschagne, Jan H. P. Eloff,
and Rossouw von Solms, editors, SEC, volume 232 of IFIP, pages
157-168. Springer, 2007.
[ bib |
paper |
publisher |
presentation ]
|
[108]
|
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, and Suku Nair.
A comparison of machine learning techniques for phishing detection.
In Lorrie Faith Cranor, editor, eCrime Researchers Summit,
volume 269 of ACM International Conference Proceeding Series, pages
60-69. ACM, 2007.
[ bib |
publisher ]
|
[109]
|
Thomas H. Morris and V. S. S. Nair.
Pcpp: On remote host assessment via naive bayesian classification.
In IPDPS, pages 1-8. IEEE, 2007.
[ bib |
publisher ]
|
[110]
|
D. Michael Miller and Mitchell A. Thornton.
Multiple Valued Logic: Concepts and Representations.
Synthesis Lectures on Digital Circuits and Systems. Morgan &
Claypool Publishers, 2007.
[ bib |
paper |
publisher |
presentation ]
|
[111]
|
D. Michael Miller, David Y. Feinstein, and Mitchell A. Thornton.
Qmdd minimization using sifting for variable reordering.
Multiple-Valued Logic and Soft Computing, 13(4-6):537-552,
2007.
[ bib |
paper |
publisher ]
|
[112]
|
Lun Li, Frank P. Coyle, and Mitchell A. Thornton.
UML to SystemVerilog synthesisfor embedded system models
with support for assertion generation.
In FDL, pages 261-267. ECSI, September 2007.
[ bib |
paper |
publisher ]
|
[113]
|
David Y. Feinstein, V. S. S. Nair, and Mitchell A. Thornton.
Advances in quantum computing fault tolerance and testing.
In HASE, pages 369-370. IEEE Computer Society, November 2007.
[ bib |
paper |
publisher ]
|
[114]
|
Chad M. Lawler, Michael A. Harper, and Mitchell A. Thornton.
Components and analysis of disaster tolerant computing.
In IPCCC, pages 380-386. IEEE Computer Society, April 2007.
[ bib |
paper |
publisher ]
|
[115]
|
D. Michael Miller, David Y. Feinstein, and Mitchell A. Thornton.
Variable reordering and sifting for QMDD.
In ISMVL, page 10. IEEE Computer Society, May 2007.
[ bib |
paper |
publisher ]
|
[116]
|
Mahsan Amoui, Daniel Große, Mitchell A. Thornton, and Rolf Drechsler.
Evaluation of toggle coverage for MVL circuits specified in the
SystemVerilog HDL.
In ISMVL, page 50. IEEE Computer Society, May 2007.
[ bib |
paper |
publisher ]
|
[117]
|
Vladimir Stojanovic, R. Iris Bahar, Jennifer Dworak, and Richard Weiss.
A cost-effective implementation of an ecc-protected instruction queue
for out-of-order microprocessors.
In Ellen Sentovich, editor, DAC, pages 705-708. ACM, 2006.
[ bib |
publisher ]
|
[118]
|
Ross Anderson and Tyler Moore.
The economics of information security.
Science, 314(5799):610-613, 2006.
[ bib |
DOI |
paper |
publisher ]
|
[119]
|
Jolyon Clulow and Tyler Moore.
Suicide for the common good: a new strategy for credential revocation
in self-organizing systems.
Operating Systems Review, 40(3):18-21, 2006.
[ bib |
publisher ]
|
[120]
|
Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, and Tyler Moore.
So near and yet so far: Distance-bounding attacks in wireless
networks.
In Levente Buttyán, Virgil D. Gligor, and Dirk Westhoff, editors,
ESAS, volume 4357 of Lecture Notes in Computer Science, pages
83-97. Springer, 2006.
[ bib |
paper |
publisher |
presentation ]
|
[121]
|
Tyler Moore.
A collusion attack on pairwise key predistribution schemes for
distributed sensor networks.
In PerCom Workshops, pages 251-255. IEEE Computer Society,
2006.
[ bib |
paper |
publisher |
presentation ]
|
[122]
|
Saeed Abu-Nimeh, Suku Nair, and Marco F. Marchetti.
An experimental and industrial experience: Avoiding denial of service
via memory profiling.
In AICCSA, pages 151-158. IEEE, 2006.
[ bib |
publisher ]
|
[123]
|
Saeed Abu-Nimeh, Suku Nair, and Marco F. Marchetti.
Avoiding denial of service via stress testing.
In AICCSA, pages 300-307. IEEE, 2006.
[ bib |
publisher ]
|
[124]
|
George Deprez, M. Padmaraj, and Suku Nair.
Distributed fault management protocol for heterogeneous networks.
In AICCSA, pages 744-747. IEEE, 2006.
[ bib |
publisher ]
|
[125]
|
Maher Ali, Girish Chiruvolu, An Ge, M. Padmaraj, Suku Nair, and Marco F.
Marchetti.
Differentiated survivability in ethernet-based man/wan.
In AICCSA, pages 906-910. IEEE, 2006.
[ bib |
publisher ]
|
[126]
|
Padmaraj M. V. Nair, Suku Nair, Marco F. Marchetti, Girish Chiruvolu, and Maher
Ali.
Distributed restoration method for metro ethernet.
In ICN/ICONS/MCL, page 94. IEEE Computer Society, 2006.
[ bib |
publisher ]
|
[127]
|
Robert B. Reese and Mitchell A. Thornton.
Introduction to Logic Synthesis using Verilog HDL.
Synthesis Lectures on Digital Circuits and Systems. Morgan &
Claypool Publishers, 2006.
[ bib |
publisher ]
|
[128]
|
Lun Li, Alex Fit-Florea, Mitchell A. Thornton, and David W. Matula.
Performance evaluation of a novel direct table lookup method and
architecture with application to 16-bit integer functions.
In ASAP, pages 99-104. IEEE Computer Society, September 2006.
[ bib |
paper |
publisher ]
|
[129]
|
Lun Li, Mitchell A. Thornton, and David W. Matula.
A digit serial algorithm for the integer power operation.
In Gang Qu, Yehea I. Ismail, Narayanan Vijaykrishnan, and Hai Zhou,
editors, ACM Great Lakes Symposium on VLSI, pages 302-307. ACM, 2006.
[ bib |
paper |
publisher ]
|
[130]
|
D. Michael Miller and Mitchell A. Thornton.
QMDD: A decision diagram structure for reversible and quantum
circuits.
In ISMVL, page 30. IEEE Computer Society, 2006.
[ bib |
paper |
publisher ]
|
[131]
|
Lun Li, Mitchell A. Thornton, and Marek A. Perkowski.
A quantum CAD accelerator based on Grover's algorithm for
finding the minimum fixed polarity Reed-Muller form.
In ISMVL, page 33. IEEE Computer Society, 2006.
[ bib |
paper |
publisher ]
|
[132]
|
Jennifer Dworak.
An investigation of excitation balance and additional mandatory
conditions for the diagnosis of fortuitously detected defects.
In Magdy S. Abadir and Li-C. Wang, editors, MTV, pages 48-54.
IEEE Computer Society, 2005.
[ bib |
publisher ]
|
[133]
|
M. Padmaraj, Suku Nair, Marco F. Marchetti, Girish Chiruvolu, and Maher Ali.
Traffic engineering in enterprise ethernet with multiple spanning
tree regions.
In ICW/ICHSN/ICMCS/SENET, pages 261-266. IEEE Computer
Society, 2005.
[ bib |
publisher ]
|
[134]
|
Robert B. Reese, Mitchell A. Thornton, and Cherrice Traver.
A coarse-grain phased logic CPU.
IEEE Trans. Computers, 54(7):788-799, 2005.
[ bib |
paper |
publisher ]
|
[135]
|
Robert B. Reese, Mitchell A. Thornton, Cherrice Traver, and David Hemmendinger.
Early evaluation for performance enhancement in phased logic.
IEEE Trans. on CAD of Integrated Circuits and Systems,
24(4):532-550, 2005.
[ bib |
paper |
publisher ]
|
[136]
|
David W. Matula, Alex Fit-Florea, and Mitchell Aaron Thornton.
Table lookup structures for multiplicative inverses modulo
2k.
In IEEE Symposium on Computer Arithmetic, pages 156-163. IEEE
Computer Society, 2005.
[ bib |
paper |
publisher ]
|
[137]
|
Mitchell A. Thornton.
The Karhunen-Loève transform of discrete MVL functions.
In ISMVL, pages 194-199. IEEE Computer Society, May 2005.
[ bib |
paper |
publisher ]
|
[138]
|
Lun Li, Alex Fit-Florea, Mitchell A. Thornton, and David W. Matula.
Hardware implementation of an additive bit-serial algorithm for the
discrete logarithm modulo 2k.
In ISVLSI, pages 130-135. IEEE Computer Society, 2005.
[ bib |
paper |
publisher ]
|
[139]
|
Frank P. Coyle and Mitchell A. Thornton.
A framework and process for curricular integration and innovation
using project based interdisciplinary teams.
In ITCC, pages 432-435. IEEE Computer Society, April 2005.
[ bib |
paper |
publisher ]
|
[140]
|
Jennifer Dworak, Brad Cobb, James Wingfield, and M. Ray Mercer.
Balanced excitation and its effect on the fortuitous detection of
dynamic defects.
In DATE, pages 1066-1071. IEEE Computer Society, 2004.
[ bib |
publisher ]
|
[141]
|
Jennifer Dworak, James Wingfield, and M. Ray Mercer.
A preliminary investigation of observation diversity for enhancing
fortuitous detection of defects.
In DFT, pages 460-468. IEEE Computer Society, 2004.
[ bib |
publisher ]
|
[142]
|
Jennifer Dworak, David Dorsey, Amy Wang, and M. Ray Mercer.
Excitation, observation, and elf-md: Optimization criteria for high
quality test sets.
In VTS, pages 9-15. IEEE Computer Society, 2004.
[ bib |
publisher ]
|
[143]
|
Kenneth Fazel, Lun Li, Mitchell A. Thornton, Robert B. Reese, and Cherrice
Traver.
Performance enhancement in phased logic circuits using automatic
slack-matching buffer insertion.
In David Garrett, John Lach, and Charles A. Zukowski, editors,
ACM Great Lakes Symposium on VLSI, pages 413-416. ACM, 2004.
[ bib |
paper |
publisher ]
|
[144]
|
Ralph Marczynski, Mitchell A. Thornton, and Stephen A. Szygenda.
Test vector generation and classification using fsm traversals.
In ISCAS, pages 309-312, 2004.
[ bib |
paper ]
|
[145]
|
Lun Li, Mitchell A. Thornton, and Stephen A. Szygenda.
A genetic approach for conjunction scheduling in symbolic equivalence
checking.
In ISVLSI, pages 32-38. IEEE Computer Society, 2004.
[ bib |
paper |
publisher ]
|