Stephen Neville
Stephen Neville
Verifierad e-postadress på uvic.ca
TitelCiteras avÅr
Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis
YO Yazir, C Matthews, R Farahbod, S Neville, A Guitouni, S Ganti, ...
2010 IEEE 3rd International Conference on Cloud Computing, 91-98, 2010
2812010
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
732008
System for regulating wireless device operations in wireless networks
B Chow, H MacDonald, D Yarish, T Darcie, S Neville, AS Kroeker
US Patent 9,451,451, 2016
672016
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J Mchugh
European Symposium on Research in Computer Security, 461-480, 2008
592008
Secret key generation and agreement in UWB communication channels
MG Madiseh, ML McGuire, SS Neville, L Cai, M Horie
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
582008
Verification of secret key generation from UWB channel observations
MG Madiseh, S He, ML McGuire, SW Neville, X Dong
2009 IEEE International Conference on Communications, 1-5, 2009
492009
Maitland: Lighter-weight vm introspection to support cyber-security in the cloud
C Benninger, SW Neville, YO Yazir, C Matthews, Y Coady
2012 IEEE Fifth International Conference on Cloud Computing, 471-478, 2012
422012
Secret key extraction in ultra wideband channels for unsynchronized radios
MG Madiseh, ML McGuire, SW Neville, AAB Shirazi
6th Annual Communication Networks and Services Research Conference (cnsr …, 2008
422008
Wavelet denoising of coarsely quantized signals
S Neville, N Dimopoulos
IEEE Transactions on Instrumentation and Measurement 55 (3), 892-901, 2006
352006
Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation
MG Madiseh, SW Neville, ML McGuire
IEEE Transactions on Information Forensics and Security 7 (4), 1278-1287, 2012
342012
Optimising sybil attacks against P2P-based botnets
CR Davis, JM Fernandez, S Neville
2009 4th International Conference on Malicious and Unwanted Software …, 2009
272009
Consumers' sentiment analysis of popular phone brands and operating system preference using Twitter data: A feasibility study
D Arora, KF Li, SW Neville
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
232015
STARS: A framework for statistically rigorous simulation-based network research
E Millman, D Arora, SW Neville
2011 IEEE Workshops of International Conference on Advanced Information …, 2011
222011
Secure protocol for transactions
SW Neville, M Horie
US Patent 8,768,854, 2014
212014
Assessing the performance of AODV, DYMO, and OLSR routing protocols in the context of larger-scale denser MANETs
D Arora, E Millman, SW Neville
Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers …, 2011
122011
Assessing the expected performance of the olsr routing protocol for denser urban core ad hoc network deployments
D Arora, E Millman, SW Neville
2012 IEEE 26th International Conference on Advanced Information Networking …, 2012
102012
Time correlation analysis of secret key generation via UWB channels
MG Madiseh, SW Neville, ML McGuire
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
102010
The rational for developing larger-scale 1000+ machine emulation-based research test beds
SW Neville, KF Li
2009 International Conference on Advanced Information Networking and …, 2009
102009
Autonomous resource consolidation management in clouds using IMPROMPTU extensions
YO Yazir, Y Akbulut, R Farahbod, A Guitouni, SW Neville, S Ganti, ...
2012 IEEE Fifth International Conference on Cloud Computing, 614-621, 2012
82012
A model based approach to fault detection for the reverse path of cable television networks
NP Kourounakis, SW Neville, NJ Dimopoulos
IEEE transactions on broadcasting 44 (4), 478-487, 1998
81998
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20