Share to FacebookShare to TwitterShare by Email
URI: http://hdl.handle.net/2144/978

Recently Added

  • A general security approach for soft-information decoding against smart bursty jammers 

    Ercan, Furkan; Galligan, Kevin; Duffy, Ken R.; Medard, Muriel; Starobinski, David; Yazicigil, Rabia Tugce (IEEE, 2022-12-04)
    Malicious attacks such as jamming can cause significant disruption or complete denial of service (DoS) to wireless communication protocols. Moreover, jamming devices are getting smarter, making them difficult to detect. ...
  • Uncovering product vulnerabilities with threat knowledge graphs 

    Shi, Zhenpeng; Matyunin, Nikolay; Graffi, Kalman; Starobinski, David (IEEE, 2022-10)
    Threat modeling and security assessment rely on public information on products, vulnerabilities and weaknesses. So far, databases in these categories have rarely been analyzed in combination. Yet, doing so could help predict ...
  • Multi-protocol IoT network reconnaissance 

    Gvozdenovic, Stefan; Becker, Johannes Karl; Mikulskis, John; Starobinski, David (IEEE, 2022-10-03)
    Network reconnaissance is a core security functionality, which can be used to detect hidden unauthorized devices or to identify missing devices. Currently, there is a lack of network reconnaissance tools capable of discovering ...
  • Optimizing freshness in IoT scans 

    Becker, Johannes Karl; Starobinski, David
    Motivated by IoT security monitoring applications, we consider the problem of a wireless monitor that must implement a multi-channel scanning policy to minimize the Age of Information (AoI) of received information. We model ...
  • Empirical comparison of block relay protocols 

    Imtiaz, Muhammad Anas; Starobinski, David; Trachtenberg, Ari (Institute of Electrical and Electronics Engineers (IEEE), 2022-12)
    Block relay protocols play a key role in the performance and security of public blockchains. As a result, several such protocols have been deployed in the context of Bitcoin and its variants (e.g., legacy, compact block ...
  • Towards general-purpose neural network computing 

    Eldridge, S.; Waterland, A.; Seltzer, M.; Appavoo, Jonathan; Joshi, Ajay (IEEE COMPUTER SOC, 2015-10)
  • EbbRT: a framework for building per-application library operating systems 

    Krieger, O. (USENIX Association, 2016-12)
    General purpose operating systems sacrifice per-application performance in order to preserve generality. On the other hand, substantial effort is required to customize or construct an operating system to meet the needs ...
  • Buildout and integration of an automated high-throughput CLIA laboratory for SARS-CoV-2 testing on a large urban campus 

    Landaverde, Lena; McIntyre, David; Robson, James; Fu, Dany; Ortiz, Luis; Chen, Rita; Oliveira, Samuel MD; Fan, Andy; Barrett, Amy; Burgay, Stephen P.; Choate, S.; Corbett, David; Doucette-Stamm, Lynn; Gonzales, Kevin; Hamer, Davidson H.; Huang, Lilly; Huval, Shari; Knight, Christopher; Landa, Carrie; Lindquist, Diane; Lockard, Kelly; Macdowell, Trevor L.; Mauro, Elizabeth; McGinty, Colleen; Miller, Candice; Monahan, Maura; Moore, Randall; Platt, Judy; Rolles, Lloyd; Roy, Jeffrey; Schroeder, Tracey; Tolan, Dean R.; Zaia, Ann; Brown, Robert A.; Waters, Gloria; Densmore, Douglas; Klapperich, Catherine M. (Elsevier BV, 2022-10)
    In 2019, the first cases of SARS-CoV-2 were detected in Wuhan, China, and by early 2020 the first cases were identified in the United States. SARS-CoV-2 infections increased in the US causing many states to implement ...
  • Feels bad man: dissecting automated hateful meme detection through the lens of Facebook’s challenge 

    Jennifer, Catherine; Tahmasbi, Fatemeh; Blackburn, Jeremy; Stringhini, Gianluca; Zannettou, Savvas; De Cristofaro, Emiliano (2022-06-06)
  • The gospel according to Q: understanding the QAnon conspiracy from the perspective of canonical information 

    Aliapoulios, Maxwell; Papasavva, Antonis; Ballard, Cameron; De Cristofaro, Emiliano; Stringhini, Gianluca; Zannettou, Savvas; Blackburn, Jeremy (2022-06-06)

View more