A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks
Chen, R., Park, J.-M., Marchany, R.
Published in IEEE transactions on parallel and distributed systems (01.05.2007)
Published in IEEE transactions on parallel and distributed systems (01.05.2007)
Get full text
Journal Article
MT6D: A Moving Target IPv6 Defense
Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Published in 2011 - MILCOM 2011 Military Communications Conference (01.11.2011)
Get full text
Conference Proceeding
Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols
Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.
Published in IEEE transactions on vehicular technology (01.01.2009)
Published in IEEE transactions on vehicular technology (01.01.2009)
Get full text
Journal Article
Battery-based intrusion detection a first line of defense
Jacoby, G.A., Marchany, R., Davis, N.J.
Published in Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004 (2004)
Published in Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004 (2004)
Get full text
Conference Proceeding
Validating a custom IPv6 security application using OPNET modeler
Clore, B., Dunlop, M., Marchany, R., Tront, J.
Published in MILCOM 2012 - 2012 IEEE Military Communications Conference (01.10.2012)
Published in MILCOM 2012 - 2012 IEEE Military Communications Conference (01.10.2012)
Get full text
Conference Proceeding
IPv6: Nowhere to Run, Nowhere to Hide
Groat, S, Dunlop, M, Marchany, R, Tront, J
Published in 2011 44th Hawaii International Conference on System Sciences (01.01.2011)
Published in 2011 44th Hawaii International Conference on System Sciences (01.01.2011)
Get full text
Conference Proceeding
E-commerce security issues
Marchany, R.C., Tront, J.G.
Published in Proceedings of the 35th Annual Hawaii International Conference on System Sciences (2002)
Published in Proceedings of the 35th Annual Hawaii International Conference on System Sciences (2002)
Get full text
Conference Proceeding
Using an IPv6 moving target defense to protect the Smart Grid
Groat, S., Dunlop, M., Urbanksi, W., Marchany, R., Tront, J.
Published in 2012 IEEE PES Innovative Smart Grid Technologies (ISGT) (01.01.2012)
Published in 2012 IEEE PES Innovative Smart Grid Technologies (ISGT) (01.01.2012)
Get full text
Conference Proceeding
Advancing the defense in depth model
Groat, S., Tront, J., Marchany, R.
Published in 2012 7th International Conference on System of Systems Engineering (SoSE) (01.07.2012)
Published in 2012 7th International Conference on System of Systems Engineering (SoSE) (01.07.2012)
Get full text
Conference Proceeding
Reflections on operating in hostile environments
Bazaz, A., Arthur, J.D., Marchany, R.
Published in 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the (2004)
Published in 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the (2004)
Get full text
Conference Proceeding
Introduction to the internet security minitrack
Marchany, R.C., Tront, J.G.
Published in Proceedings of the 35th Annual Hawaii International Conference on System Sciences (2002)
Published in Proceedings of the 35th Annual Hawaii International Conference on System Sciences (2002)
Get full text
Conference Proceeding
Security and privacy produced by DHCP unique identifiers
Tront, J., Groat, S., Dunlop, M., Marchany, R.
Published in The 16th North-East Asia Symposium on Nano, Information Technology and Reliability (01.10.2011)
Published in The 16th North-East Asia Symposium on Nano, Information Technology and Reliability (01.10.2011)
Get full text
Conference Proceeding
Cover-VT: Converged Security Visualization Tool
Urbanski, W., Dunlop, M., Marchany, R., Tront, J.
Published in 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops (01.05.2011)
Published in 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops (01.05.2011)
Get full text
Conference Proceeding
Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols
Raymond, D., Marchany, R., Brownfield, M., Midkiff, S.
Published in 2006 IEEE Information Assurance Workshop (2006)
Published in 2006 IEEE Information Assurance Workshop (2006)
Get full text
Conference Proceeding
The Multi-Vector Portable Intrusion Detection System (MVP-IDS): A hybrid approach to intrusion detection for portable information devices
Moyers, B R, Dunning, J P, Marchany, R C, Tront, J G
Published in 2010 IEEE International Conference on Wireless Information Technology and Systems (01.08.2010)
Published in 2010 IEEE International Conference on Wireless Information Technology and Systems (01.08.2010)
Get full text
Conference Proceeding
Introduction to internet security
Tront, J.G., Marchany, R.C.
Published in 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the (2003)
Published in 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the (2003)
Get full text
Conference Proceeding