Goldphish: Using images for content-based phishing analysis M Dunlop, S Groat, D Shelly 2010 Fifth international conference on internet monitoring and protection …, 2010 | 234 | 2010 |
Mt6d: A moving target ipv6 defense M Dunlop, S Groat, W Urbanski, R Marchany, J Tront 2011-MILCOM 2011 Military Communications Conference, 1321-1326, 2011 | 227 | 2011 |
Visual biometric authentication supplemented with a time-based secondary authentication factor R Moore, S Groat US Patent App. 15/065,060, 2017 | 63 | 2017 |
Method and system for dynamically obscuring addresses in IPv6 SL Groat, MW Dunlop, WM Urbanski, RC Marchany, J Tront US Patent 9,461,875, 2016 | 50 | 2016 |
Using an IPv6 moving target defense to protect the Smart Grid S Groat, M Dunlop, W Urbanksi, R Marchany, J Tront 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-7, 2012 | 49 | 2012 |
The blind man's bluff approach to security using IPv6 M Dunlop, S Groat, W Urbanski, R Marchany, J Tront IEEE Security & Privacy 10 (4), 35-43, 2012 | 42 | 2012 |
The privacy implications of stateless IPv6 addressing S Groat, M Dunlop, R Marchany, J Tront Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 30 | 2010 |
Advancing the defense in depth model S Groat, J Tront, R Marchany 2012 7th International Conference on System of Systems Engineering (SoSE …, 2012 | 28 | 2012 |
Implementing an IPv6 moving target defense on a live network M Dunlop, S Groat, RC Marchany, JG Tront Cyber-Physical Systems Virtual Organization, 2012 | 22 | 2012 |
What DHCPv6 says about you S Groat, M Dunlop, R Marchany, J Tront 2011 World Congress on Internet Security (WorldCIS-2011), 146-151, 2011 | 17 | 2011 |
IPv6: nowhere to run, nowhere to hide S Groat, M Dunlop, R Marchany, J Tront 2011 44th Hawaii International Conference on System Sciences, 1-10, 2011 | 17 | 2011 |
Using dynamic addressing for a moving target defense S Groat, M Dunlop, R Marchany, J Tront Proceedings of the 6th International Conference on Information Warfare and …, 2011 | 15 | 2011 |
Security and privacy produced by DHCP unique identifiers J Tront, S Groat, M Dunlop, R Marchany The 16th North-East Asia Symposium on Nano, Information Technology and …, 2011 | 14 | 2011 |
The good, the bad, the IPv6 M Dunlop, S Groat, R Marchany, J Tront 2011 Ninth Annual Communication Networks and Services Research Conference, 77-84, 2011 | 13 | 2011 |
Optimizing a network layer moving target defense for specific system architectures O Hardman, S Groat, R Marchany, J Tront Architectures for Networking and Communications Systems, 117-118, 2013 | 11 | 2013 |
IPv6: Now you see me, now you don’t M Dunlop, S Groat, R Marchany, J Tront International Conference on Networks (ICN), 18-23, 2011 | 8 | 2011 |
Trust model-based secure cooperative sensing techniques for cognitive radio networks D Pang, G Hu, M Xu, S Chaves, C Westphall, C Westphall, G Geronimo, ... Proceedings of the Tenth International Conference on Networks, 1-6, 2011 | 4 | 2011 |
Securing static nodes in mobile-enabled systems using a network-layer moving target defense S Groat, R Moore, R Marchany, J Tront 2013 1st International Workshop on the Engineering of Mobile-Enabled Systems …, 2013 | 3 | 2013 |
Using transport layer multihoming to enhance network layer moving target defenses R Moore, S Groat, R Marchany, J Tront Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013 | 2 | 2013 |
Privacy and Security in IPv6 Addressing SL Groat Virginia Tech, 2011 | 1 | 2011 |