关注
Stephen Groat
Stephen Groat
DataDog
在 datadoghq.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Goldphish: Using images for content-based phishing analysis
M Dunlop, S Groat, D Shelly
2010 Fifth international conference on internet monitoring and protection …, 2010
2342010
Mt6d: A moving target ipv6 defense
M Dunlop, S Groat, W Urbanski, R Marchany, J Tront
2011-MILCOM 2011 Military Communications Conference, 1321-1326, 2011
2272011
Visual biometric authentication supplemented with a time-based secondary authentication factor
R Moore, S Groat
US Patent App. 15/065,060, 2017
632017
Method and system for dynamically obscuring addresses in IPv6
SL Groat, MW Dunlop, WM Urbanski, RC Marchany, J Tront
US Patent 9,461,875, 2016
502016
Using an IPv6 moving target defense to protect the Smart Grid
S Groat, M Dunlop, W Urbanksi, R Marchany, J Tront
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-7, 2012
492012
The blind man's bluff approach to security using IPv6
M Dunlop, S Groat, W Urbanski, R Marchany, J Tront
IEEE Security & Privacy 10 (4), 35-43, 2012
422012
The privacy implications of stateless IPv6 addressing
S Groat, M Dunlop, R Marchany, J Tront
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
302010
Advancing the defense in depth model
S Groat, J Tront, R Marchany
2012 7th International Conference on System of Systems Engineering (SoSE …, 2012
282012
Implementing an IPv6 moving target defense on a live network
M Dunlop, S Groat, RC Marchany, JG Tront
Cyber-Physical Systems Virtual Organization, 2012
222012
What DHCPv6 says about you
S Groat, M Dunlop, R Marchany, J Tront
2011 World Congress on Internet Security (WorldCIS-2011), 146-151, 2011
172011
IPv6: nowhere to run, nowhere to hide
S Groat, M Dunlop, R Marchany, J Tront
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
172011
Using dynamic addressing for a moving target defense
S Groat, M Dunlop, R Marchany, J Tront
Proceedings of the 6th International Conference on Information Warfare and …, 2011
152011
Security and privacy produced by DHCP unique identifiers
J Tront, S Groat, M Dunlop, R Marchany
The 16th North-East Asia Symposium on Nano, Information Technology and …, 2011
142011
The good, the bad, the IPv6
M Dunlop, S Groat, R Marchany, J Tront
2011 Ninth Annual Communication Networks and Services Research Conference, 77-84, 2011
132011
Optimizing a network layer moving target defense for specific system architectures
O Hardman, S Groat, R Marchany, J Tront
Architectures for Networking and Communications Systems, 117-118, 2013
112013
IPv6: Now you see me, now you don’t
M Dunlop, S Groat, R Marchany, J Tront
International Conference on Networks (ICN), 18-23, 2011
82011
Trust model-based secure cooperative sensing techniques for cognitive radio networks
D Pang, G Hu, M Xu, S Chaves, C Westphall, C Westphall, G Geronimo, ...
Proceedings of the Tenth International Conference on Networks, 1-6, 2011
42011
Securing static nodes in mobile-enabled systems using a network-layer moving target defense
S Groat, R Moore, R Marchany, J Tront
2013 1st International Workshop on the Engineering of Mobile-Enabled Systems …, 2013
32013
Using transport layer multihoming to enhance network layer moving target defenses
R Moore, S Groat, R Marchany, J Tront
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
22013
Privacy and Security in IPv6 Addressing
SL Groat
Virginia Tech, 2011
12011
系统目前无法执行此操作,请稍后再试。
文章 1–20