The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William Yurcik: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe
    Log Correlation for Intrusion Detection: A Proof of Concept. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:255-265 [Conf]
  2. Nadir Kiyanclar, Gregory A. Koenig, William Yurcik
    Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:28- [Conf]
  3. Gregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik
    Cluster security with NVisionCC: process monitoring by leveraging emergent properties. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:121-132 [Conf]
  4. Adam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik
    Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:146-151 [Conf]
  5. Dmitry Mogilevsky, Gregory A. Koenig, William Yurcik
    Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:30- [Conf]
  6. Makan Pourzandi, David Gordon, William Yurcik, Gregory A. Koenig
    Clusters and security: distributed security for distributed systems. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:96-104 [Conf]
  7. Matthew Smith, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik
    Security Issues in On-Demand Grid and Cluster Computing. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:24- [Conf]
  8. William Yurcik, Chao Liu
    A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:111-120 [Conf]
  9. Ramona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey
    Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:1205- [Conf]
  10. William Yurcik
    Visualization Tools for Security Administrators. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:112-113 [Conf]
  11. William Yurcik
    Providing ATM Multipoint Survivability Via Disjoint VC Mesh Backup Groups. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:129-139 [Conf]
  12. Cristina Abad, Indranil Gupta, William Yurcik
    Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:5-11 [Conf]
  13. Aashish Sharma, William Yurcik
    An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003. [Citation Graph (0, 0)][DBLP]
    ICETE (2), 2004, pp:257-262 [Conf]
  14. Ragib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, Roy H. Campbell
    A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:205-213 [Conf]
  15. Xiaoxin Yin, William Yurcik, Adam J. Slagell
    The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:141-153 [Conf]
  16. Zahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, Roy H. Campbell
    A First Step Towards Call Survivability in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:501-502 [Conf]
  17. Mary Grzywa, Ajit Dharmik, William Yurcik, Larry Brumbaugh
    Application-Level Survivable Software: rFTP Proof-of-Concept . [Citation Graph (0, 0)][DBLP]
    LCN, 2001, pp:203-205 [Conf]
  18. Alexander Gubin, William Yurcik, Larry Brumbaugh
    Network Management Visualization with PingTV. [Citation Graph (0, 0)][DBLP]
    LCN, 2001, pp:62-65 [Conf]
  19. Samuel Patton, David Doss, William Yurcik
    Distributed Weakness in Virtual Private Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2000, pp:96-0 [Conf]
  20. Samuel Patton, David Doss, William Yurcik
    Open Source Versus Commercial Firewalls: Functional Comparison. [Citation Graph (0, 0)][DBLP]
    LCN, 2000, pp:223-224 [Conf]
  21. Samuel Patton, Bryan Smith, David Doss, William Yurcik
    A Virtual Private Network Deployment Framework. [Citation Graph (0, 0)][DBLP]
    LCN, 2000, pp:225-0 [Conf]
  22. Gregory Pluta, Larry Brumbaugh, William Yurcik
    BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:394-395 [Conf]
  23. William Yurcik
    Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:134-135 [Conf]
  24. William Yurcik, Xin Meng, Gregory A. Koenig
    A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:427-428 [Conf]
  25. Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph Tucek
    Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. [Citation Graph (0, 0)][DBLP]
    LISA, 2004, pp:177-186 [Conf]
  26. William Yurcik
    Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. [Citation Graph (0, 0)][DBLP]
    LISA, 2005, pp:169-176 [Conf]
  27. Ahmed Sobeih, William Yurcik, Jennifer C. Hou
    VRing: A Case for Building Application-Layer Multicast Rings (Rather Than Trees). [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2004, pp:437-446 [Conf]
  28. Zahid Anwar, Jalal Al-Muhtadi, William Yurcik, Roy H. Campbell
    Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:192-201 [Conf]
  29. Joseph Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, William Yurcik
    Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. [Citation Graph (0, 0)][DBLP]
    MSST, 2005, pp:329-340 [Conf]
  30. William Yurcik
    Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 1999, pp:235-243 [Conf]
  31. William Yurcik, David Tipper, Deep Medhi
    The use of hop-limits to provide survivable ATM group communications. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2000, pp:131-140 [Conf]
  32. William Yurcik, David Tipper
    A survivability framework for connection-oriented group communications. [Citation Graph (0, 0)][DBLP]
    PRDC, 2000, pp:53-58 [Conf]
  33. Xiaoxin Yin, William Yurcik, Adam J. Slagell
    VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:284-295 [Conf]
  34. Gregory S. Wolffe, William Yurcik, Hugh Osborne, Mark A. Holliday
    Teaching computer organization/architecture with limited resources using simulators. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2002, pp:176-180 [Conf]
  35. William Yurcik, Larry Brumbaugh
    A web-based little man computer simulator. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2001, pp:204-208 [Conf]
  36. Kiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee
    NVisionIP: an interactive network flow visualization tool for security. [Citation Graph (0, 0)][DBLP]
    SMC (3), 2004, pp:2675-2680 [Conf]
  37. Alexander Gubin, William Yurcik, Larry Brumbaugh
    PingTV: A Case Study in Visual Network Monitoring. [Citation Graph (0, 0)][DBLP]
    IEEE Visualization, 2001, pp:- [Conf]
  38. Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North
    Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:9- [Conf]
  39. William Yurcik
    Tool update: visflowconnect-IP with advanced filtering from usability testing. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2006, pp:63-64 [Conf]
  40. William Yurcik
    Tool update: NVisionIP improvements (difference view, sparklines, and shapes). [Citation Graph (0, 0)][DBLP]
    VizSEC, 2006, pp:65-66 [Conf]
  41. Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju
    VisFlowConnect: netflow visualizations of link relationships for security situational awareness. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:26-34 [Conf]
  42. William Yurcik, Xin Meng, Nadir Kiyanclar
    NVisionCC: a visualization framework for high performance cluster security. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:133-137 [Conf]
  43. Kiran Lakkaraju, William Yurcik, Adam J. Lee
    NVisionIP: netflow visualizations of system state for security situational awareness. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:65-72 [Conf]
  44. Wen Ding, William Yurcik, Xiaoxin Yin
    Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. [Citation Graph (0, 0)][DBLP]
    WINE, 2005, pp:947-958 [Conf]
  45. William Yurcik, Hugh Osborne
    A crowd of little man computers: visual computer simulator teaching tools. [Citation Graph (0, 0)][DBLP]
    Winter Simulation Conference, 2001, pp:1632-1639 [Conf]
  46. Adam J. Slagell, William Yurcik
    Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  47. William Yurcik, David Doss
    Internet Attacks: A Policy Framework for Rules of Engagement [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  48. William Yurcik, Ramona Su Thompson, Michael B. Twidale, Esa M. Rantanen
    If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. [Citation Graph (0, 0)][DBLP]
    Interactions, 2007, v:14, n:1, pp:12-14 [Journal]
  49. Cecile Yehezkel, William Yurcik, Murray Pearson, Dean Armstrong
    Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2001, v:1, n:4, pp:60-80 [Journal]
  50. William Yurcik
    Editorial. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2001, v:1, n:4, pp:1-3 [Journal]
  51. William Yurcik
    Special issue on specialized computer architecture simulators that see the present and may hold the future. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2002, v:2, n:1, pp:1-3 [Journal]
  52. William Yurcik, David Doss
    Achieving Fault-Tolerant Software with Rejuvenation and Reconfiguration. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2001, v:18, n:4, pp:48-52 [Journal]
  53. Charis Ermopoulos, William Yurcik
    NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. [Citation Graph (0, 0)][DBLP]
    CLUSTER, 2006, pp:- [Conf]
  54. Ruperto P. Majuca, William Yurcik, Jay P. Kesan
    The Evolution of Cyberinsurance [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  55. Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam J. Slagell
    SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  56. Gregory Pluta, Larry Brumbaugh, William Yurcik
    Using SMART for Customized Monitoring of Windows Services [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  57. Charis Ermopoulos, William Yurcik
    NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security) [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  58. William Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan
    UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  59. Aashish Sharma, William Yurcik
    Security Assessment of E-Tax Filing Websites [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  60. William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham
    Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  61. Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik
    A Distributed Economics-based Infrastructure for Utility Computing [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]

  62. Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. [Citation Graph (, )][DBLP]


  63. Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. [Citation Graph (, )][DBLP]


  64. Stochastic Process Models for Packet/Analytic-Based Network Simulations. [Citation Graph (, )][DBLP]


  65. The techniques and challenges of immutable storage with applications in multimedia. [Citation Graph (, )][DBLP]


  66. Tamper-resistant storage techniques for multimedia systems. [Citation Graph (, )][DBLP]


  67. Protecting multimedia data in storage: a survey of techniques emphasizing encryption. [Citation Graph (, )][DBLP]


  68. Multiple design patterns for voice over IP (VoIP) security. [Citation Graph (, )][DBLP]


  69. A survey of PKI components and scalability issues. [Citation Graph (, )][DBLP]


  70. The evolution of storage service providers: techniques and challenges to outsourcing storage. [Citation Graph (, )][DBLP]


  71. Toward a threat model for storage systems. [Citation Graph (, )][DBLP]


  72. A statistical analysis of disclosed storage security breaches. [Citation Graph (, )][DBLP]


  73. The SCRUB security data sharing infrastructure. [Citation Graph (, )][DBLP]


  74. Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. [Citation Graph (, )][DBLP]


  75. A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market [Citation Graph (, )][DBLP]


  76. Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut [Citation Graph (, )][DBLP]


  77. Defining a Comprehensive Threat Model for High Performance Computational Clusters [Citation Graph (, )][DBLP]


Search in 0.807secs, Finished in 0.809secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002