Search the dblp DataBase
William Yurcik :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cristina Abad , Jed Taylor , Cigdem Sengul , William Yurcik , Yuanyuan Zhou , Kenneth E. Rowe Log Correlation for Intrusion Detection: A Proof of Concept. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:255-265 [Conf ] Nadir Kiyanclar , Gregory A. Koenig , William Yurcik Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing. [Citation Graph (0, 0)][DBLP ] CCGRID, 2006, pp:28- [Conf ] Gregory A. Koenig , Xin Meng , Adam J. Lee , Michael Treaster , Nadir Kiyanclar , William Yurcik Cluster security with NVisionCC: process monitoring by leveraging emergent properties. [Citation Graph (0, 0)][DBLP ] CCGRID, 2005, pp:121-132 [Conf ] Adam J. Lee , Gregory A. Koenig , Xin Meng , William Yurcik Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. [Citation Graph (0, 0)][DBLP ] CCGRID, 2005, pp:146-151 [Conf ] Dmitry Mogilevsky , Gregory A. Koenig , William Yurcik Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters. [Citation Graph (0, 0)][DBLP ] CCGRID, 2006, pp:30- [Conf ] Makan Pourzandi , David Gordon , William Yurcik , Gregory A. Koenig Clusters and security: distributed security for distributed systems. [Citation Graph (0, 0)][DBLP ] CCGRID, 2005, pp:96-104 [Conf ] Matthew Smith , Michael Engel , Thomas Friese , Bernd Freisleben , Gregory A. Koenig , William Yurcik Security Issues in On-Demand Grid and Cluster Computing. [Citation Graph (0, 0)][DBLP ] CCGRID, 2006, pp:24- [Conf ] William Yurcik , Chao Liu A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. [Citation Graph (0, 0)][DBLP ] CCGRID, 2005, pp:111-120 [Conf ] Ramona Su Thompson , Esa M. Rantanen , William Yurcik , Brian P. Bailey Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. [Citation Graph (0, 0)][DBLP ] CHI, 2007, pp:1205- [Conf ] William Yurcik Visualization Tools for Security Administrators. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:112-113 [Conf ] William Yurcik Providing ATM Multipoint Survivability Via Disjoint VC Mesh Backup Groups. [Citation Graph (0, 0)][DBLP ] ICCCN, 1998, pp:129-139 [Conf ] Cristina Abad , Indranil Gupta , William Yurcik Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:5-11 [Conf ] Aashish Sharma , William Yurcik An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003. [Citation Graph (0, 0)][DBLP ] ICETE (2), 2004, pp:257-262 [Conf ] Ragib Hasan , Zahid Anwar , William Yurcik , Larry Brumbaugh , Roy H. Campbell A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:205-213 [Conf ] Xiaoxin Yin , William Yurcik , Adam J. Slagell The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. [Citation Graph (0, 0)][DBLP ] IWIA, 2005, pp:141-153 [Conf ] Zahid Anwar , William Yurcik , Salman Baset , Henning Schulzrinne , Roy H. Campbell A First Step Towards Call Survivability in Cellular Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:501-502 [Conf ] Mary Grzywa , Ajit Dharmik , William Yurcik , Larry Brumbaugh Application-Level Survivable Software: rFTP Proof-of-Concept . [Citation Graph (0, 0)][DBLP ] LCN, 2001, pp:203-205 [Conf ] Alexander Gubin , William Yurcik , Larry Brumbaugh Network Management Visualization with PingTV. [Citation Graph (0, 0)][DBLP ] LCN, 2001, pp:62-65 [Conf ] Samuel Patton , David Doss , William Yurcik Distributed Weakness in Virtual Private Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2000, pp:96-0 [Conf ] Samuel Patton , David Doss , William Yurcik Open Source Versus Commercial Firewalls: Functional Comparison. [Citation Graph (0, 0)][DBLP ] LCN, 2000, pp:223-224 [Conf ] Samuel Patton , Bryan Smith , David Doss , William Yurcik A Virtual Private Network Deployment Framework. [Citation Graph (0, 0)][DBLP ] LCN, 2000, pp:225-0 [Conf ] Gregory Pluta , Larry Brumbaugh , William Yurcik BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments. [Citation Graph (0, 0)][DBLP ] LCN, 2004, pp:394-395 [Conf ] William Yurcik Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:134-135 [Conf ] William Yurcik , Xin Meng , Gregory A. Koenig A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept. [Citation Graph (0, 0)][DBLP ] LCN, 2004, pp:427-428 [Conf ] Gregory Pluta , Larry Brumbaugh , William Yurcik , Joseph Tucek Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. [Citation Graph (0, 0)][DBLP ] LISA, 2004, pp:177-186 [Conf ] William Yurcik Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. [Citation Graph (0, 0)][DBLP ] LISA, 2005, pp:169-176 [Conf ] Ahmed Sobeih , William Yurcik , Jennifer C. Hou VRing: A Case for Building Application-Layer Multicast Rings (Rather Than Trees). [Citation Graph (0, 0)][DBLP ] MASCOTS, 2004, pp:437-446 [Conf ] Zahid Anwar , Jalal Al-Muhtadi , William Yurcik , Roy H. Campbell Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:192-201 [Conf ] Joseph Tucek , Paul Stanton , Elizabeth Haubert , Ragib Hasan , Larry Brumbaugh , William Yurcik Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. [Citation Graph (0, 0)][DBLP ] MSST, 2005, pp:329-340 [Conf ] William Yurcik Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 1999, pp:235-243 [Conf ] William Yurcik , David Tipper , Deep Medhi The use of hop-limits to provide survivable ATM group communications. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2000, pp:131-140 [Conf ] William Yurcik , David Tipper A survivability framework for connection-oriented group communications. [Citation Graph (0, 0)][DBLP ] PRDC, 2000, pp:53-58 [Conf ] Xiaoxin Yin , William Yurcik , Adam J. Slagell VisFlowCluster-IP : Connectivity-Based Visual Clustering of Network Hosts. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:284-295 [Conf ] Gregory S. Wolffe , William Yurcik , Hugh Osborne , Mark A. Holliday Teaching computer organization/architecture with limited resources using simulators. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2002, pp:176-180 [Conf ] William Yurcik , Larry Brumbaugh A web-based little man computer simulator. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2001, pp:204-208 [Conf ] Kiran Lakkaraju , William Yurcik , Ratna Bearavolu , Adam J. Lee NVisionIP: an interactive network flow visualization tool for security. [Citation Graph (0, 0)][DBLP ] SMC (3), 2004, pp:2675-2680 [Conf ] Alexander Gubin , William Yurcik , Larry Brumbaugh PingTV: A Case Study in Visual Network Monitoring. [Citation Graph (0, 0)][DBLP ] IEEE Visualization, 2001, pp:- [Conf ] Kiran Lakkaraju , Ratna Bearavolu , Adam J. Slagell , William Yurcik , Stephen C. North Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:9- [Conf ] William Yurcik Tool update: visflowconnect-IP with advanced filtering from usability testing. [Citation Graph (0, 0)][DBLP ] VizSEC, 2006, pp:63-64 [Conf ] William Yurcik Tool update: NVisionIP improvements (difference view, sparklines, and shapes). [Citation Graph (0, 0)][DBLP ] VizSEC, 2006, pp:65-66 [Conf ] Xiaoxin Yin , William Yurcik , Michael Treaster , Yifan Li , Kiran Lakkaraju VisFlowConnect: netflow visualizations of link relationships for security situational awareness. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:26-34 [Conf ] William Yurcik , Xin Meng , Nadir Kiyanclar NVisionCC: a visualization framework for high performance cluster security. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:133-137 [Conf ] Kiran Lakkaraju , William Yurcik , Adam J. Lee NVisionIP: netflow visualizations of system state for security situational awareness. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:65-72 [Conf ] Wen Ding , William Yurcik , Xiaoxin Yin Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:947-958 [Conf ] William Yurcik , Hugh Osborne A crowd of little man computers: visual computer simulator teaching tools. [Citation Graph (0, 0)][DBLP ] Winter Simulation Conference, 2001, pp:1632-1639 [Conf ] Adam J. Slagell , William Yurcik Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] William Yurcik , David Doss Internet Attacks: A Policy Framework for Rules of Engagement [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] William Yurcik , Ramona Su Thompson , Michael B. Twidale , Esa M. Rantanen If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. [Citation Graph (0, 0)][DBLP ] Interactions, 2007, v:14, n:1, pp:12-14 [Journal ] Cecile Yehezkel , William Yurcik , Murray Pearson , Dean Armstrong Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim. [Citation Graph (0, 0)][DBLP ] ACM Journal of Educational Resources in Computing, 2001, v:1, n:4, pp:60-80 [Journal ] William Yurcik Editorial. [Citation Graph (0, 0)][DBLP ] ACM Journal of Educational Resources in Computing, 2001, v:1, n:4, pp:1-3 [Journal ] William Yurcik Special issue on specialized computer architecture simulators that see the present and may hold the future. [Citation Graph (0, 0)][DBLP ] ACM Journal of Educational Resources in Computing, 2002, v:2, n:1, pp:1-3 [Journal ] William Yurcik , David Doss Achieving Fault-Tolerant Software with Rejuvenation and Reconfiguration. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2001, v:18, n:4, pp:48-52 [Journal ] Charis Ermopoulos , William Yurcik NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. [Citation Graph (0, 0)][DBLP ] CLUSTER, 2006, pp:- [Conf ] Ruperto P. Majuca , William Yurcik , Jay P. Kesan The Evolution of Cyberinsurance [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Katherine Luo , Yifan Li , Charis Ermopoulos , William Yurcik , Adam J. Slagell SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Gregory Pluta , Larry Brumbaugh , William Yurcik Using SMART for Customized Monitoring of Windows Services [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Charis Ermopoulos , William Yurcik NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security) [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] William Yurcik , Cristina Abad , Ragib Hasan , Moazzam Saleem , Shyama Sridharan UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Aashish Sharma , William Yurcik Security Assessment of E-Tax Filing Websites [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] William Yurcik , Clay Woolam , Greg Hellings , Latifur Khan , Bhavani M. Thuraisingham Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Michael Treaster , Nadir Kiyanclar , Gregory A. Koenig , William Yurcik A Distributed Economics-based Infrastructure for Utility Computing [Citation Graph (0, 0)][DBLP ] CoRR, 2004, v:0, n:, pp:- [Journal ] Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. [Citation Graph (, )][DBLP ] Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. [Citation Graph (, )][DBLP ] Stochastic Process Models for Packet/Analytic-Based Network Simulations. [Citation Graph (, )][DBLP ] The techniques and challenges of immutable storage with applications in multimedia. [Citation Graph (, )][DBLP ] Tamper-resistant storage techniques for multimedia systems. [Citation Graph (, )][DBLP ] Protecting multimedia data in storage: a survey of techniques emphasizing encryption. [Citation Graph (, )][DBLP ] Multiple design patterns for voice over IP (VoIP) security. [Citation Graph (, )][DBLP ] A survey of PKI components and scalability issues. [Citation Graph (, )][DBLP ] The evolution of storage service providers: techniques and challenges to outsourcing storage. [Citation Graph (, )][DBLP ] Toward a threat model for storage systems. [Citation Graph (, )][DBLP ] A statistical analysis of disclosed storage security breaches. [Citation Graph (, )][DBLP ] The SCRUB security data sharing infrastructure. [Citation Graph (, )][DBLP ] Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. [Citation Graph (, )][DBLP ] A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market [Citation Graph (, )][DBLP ] Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut [Citation Graph (, )][DBLP ] Defining a Comprehensive Threat Model for High Performance Computational Clusters [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.011secs