publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2014
- Protecting You [Guest editors’ introduction]IEEE Security & Privacy, 2014
- Preface: cybersecurity for a smarter planetIBM Journal of Research and Development, 2014
- Preface: cybersecurity for a smarter planetIBM Journal of Research and Development, 2014
- Helping you protect youIEEE Security & Privacy, 2014
2011
- Using an object model to improve handling of personally identifiable informationJun 2011US Patent 7,962,962
- Using an object model to improve handling of personally identifiable informationJun 2011US Patent 7,962,962
2010
- Call in the cyber national guard!IEEE Security & Privacy, Jun 2010
- In Memoriam: Paul KargerIEEE Security & Privacy, Jun 2010
- In Memoriam: Paul KargerIEEE Security & Privacy, Jun 2010
2009
- Using a privacy agreement framework to improve handling of personally identifiable informationOct 2009US Patent 7,603,317
2007
- Guest Editors’ Introduction: Managing Organizational SecurityIEEE Security & Privacy, Oct 2007
2006
- Technical challenges of network anonymityComputer Communications, Oct 2006
- Using a rules model to improve handling of personally identifiable informationJun 2006US Patent 7,069,427
- Using a rules model to improve handling of personally identifiable informationJun 2006US Patent 7,069,427
2005
- When Hashes CollideIEEE Security & Privacy, Jun 2005
- When Hashes CollideIEEE Security & Privacy, Jun 2005
2004
- Can we win the security game?IEEE Security & Privacy, Jun 2004
2003
- The past present and future of network anonymityNetwork Security, Special Issue of Computer Communications Journal, Elsevier, Jun 2003
- Security in an autonomic computing environmentIBM Systems journal, Jun 2003
- Authenticated electronic coupon issuing and redemptionJan 2003US Patent 6,505,773
- Authenticated electronic coupon issuing and redemptionJan 2003US Patent 6,505,773
2002
- Vehicle customization, restriction, and data loggingAug 2002US Patent 6,430,488
2001
- Collaborative server processing of content and meta-information with application to virus checking in a server networkAug 2001US Patent 6,275,937
- Ethical hackingIBM Systems Journal, Aug 2001
1995
- An approach to a problem in network design using genetic algorithmsNetworks, Aug 1995
1994
- Two algorithms for finding optimal communications spanning treesAug 1994
- Two algorithms for finding optimal communications spanning treesAug 1994
- Representing trees in genetic algorithmsIn Proceedings of the First IEEE conference on evolutionary computation. IEEE World Congress on Computational Intelligence, Aug 1994
- Submitted in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY (Computer Science) at thePOLYTECHNIC UNIVERSITY, Aug 1994
1993
- The GILDA LAN Design ToolIn Proceedings of the International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, Aug 1993
1991
- GILDA: Graphically Interfaced Lan Design AdvisorIn Proceedings of the Second International Conference on Local Communication Systems: LAN and PBX, Palma, Spain, Aug 1991
1990
- Netbios name authenticationMay 1990US Patent 4,930,159
- Netbios name authenticationMay 1990US Patent 4,930,159