EMBERS: EpheMeral biometrically enhanced real-time location System
Sung Choi, Bierma, Michael, Yung Ryn Choe, Zage, David
Published in 2014 International Carnahan Conference on Security Technology (ICCST) (01.10.2014)
Published in 2014 International Carnahan Conference on Security Technology (ICCST) (01.10.2014)
Get full text
Conference Proceeding
Using linkography to understand cyberattacks
Fisher, Andrew, Kent, Carson, Zage, David, Jarocki, John
Published in 2015 IEEE Conference on Communications and Network Security (CNS) (01.09.2015)
Published in 2015 IEEE Conference on Communications and Network Security (CNS) (01.09.2015)
Get full text
Conference Proceeding
An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds
Schooler, Eve M., Zage, David, Sedayao, Jeff, Moustafa, Hassnaa, Brown, Andrew, Ambrosin, Moreno
Published in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (01.06.2017)
Published in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (01.06.2017)
Get full text
Conference Proceeding
Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing
Zage, David J., Xu, Helen, Kroeger, Thomas M., Hahn, Bridger, Donoghue, Nolan P., Benson, Thomas R.
Published in 2016 International Conference on Computing, Networking and Communications (ICNC) (01.02.2016)
Published in 2016 International Conference on Computing, Networking and Communications (ICNC) (01.02.2016)
Get full text
Conference Proceeding
Ephemeral Biometrics: What are they and what do they solve?
Sung Choi, Zage, David
Published in 2013 47th International Carnahan Conference on Security Technology (ICCST) (01.10.2013)
Published in 2013 47th International Carnahan Conference on Security Technology (ICCST) (01.10.2013)
Get full text
Conference Proceeding
Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks
Amir, Y., Danilov, C., Dolev, D., Kirsch, J., Lane, J., Nita-Rotaru, C., Olsen, J., Zage, D.
Published in IEEE transactions on dependable and secure computing (01.01.2010)
Published in IEEE transactions on dependable and secure computing (01.01.2010)
Get full text
Journal Article
Addressing insider threat using "where you are" as fourth factor authentication
Sung Choi, Zage, D.
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Published in 2012 IEEE International Carnahan Conference on Security Technology (ICCST) (01.10.2012)
Get full text
Conference Proceeding
Improving supply chain security using big data
Zage, David, Glass, Kristin, Colbaugh, Richard
Published in 2013 IEEE International Conference on Intelligence and Security Informatics (01.06.2013)
Published in 2013 IEEE International Conference on Intelligence and Security Informatics (01.06.2013)
Get full text
Conference Proceeding
Applying game theory to analyze attacks and defenses in virtual coordinate systems
Becker, S., Seibert, J., Zage, D., Nita-Rotaru, C., State, R.
Published in 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)
Published in 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)
Get full text
Conference Proceeding
A Marauder's Map for the IoT Edge
Schooler, Eve M., Zage, David, Moustafa, Hassnaa, Sedayao, Jeff
Published in 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC) (01.12.2019)
Published in 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC) (01.12.2019)
Get full text
Conference Proceeding
Data management in an edge network
Cohen, David E, Schooler, Eve M, Lee, Sung, Zage, David John, Sedayao, Jeffrey Christopher, Moustafa, Hassnaa
Year of Publication 07.03.2023
Get full text
Year of Publication 07.03.2023
Patent