Clay Shields
Affiliations: | Purdue University, West Lafayette, IN, United States | ||
Computer Science | Georgetown University, Washington, DC |
Area:
network securityWebsite:
http://people.cs.georgetown.edu/~clay/Google:
"Clay Shields"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bates A, Butler KRB, Sherr M, et al. (2015) Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195 |
Liberatore M, Levine BN, Shields C, et al. (2014) Efficient Tagging of Remote Peers during Child Pornography Investigations Ieee Transactions On Dependable and Secure Computing. 11: 425-439 |
Shields C, Frieder O, Maloof M. (2011) A system for the proactive, continuous, and efficient collection of digital forensic evidence Digital Investigation. 8 |
Liberatore M, Erdely R, Kerle T, et al. (2010) Forensic investigation of peer-to-peer file sharing networks Digital Investigation. 7 |
Cabuk S, Brodley CE, Shields C. (2009) IP covert channel detection Acm Transactions On Information and System Security. 12 |
Wright MK, Adler M, Levine BN, et al. (2008) Passive-Logging Attacks Against Anonymous Communications Systems Acm Transactions On Information and System Security. 11: 3 |
Levine B, Shields C. (2006) Editorial: Internet security Computer Communications. 29: 279 |
Sanzgiri K, LaFlamme D, Dahill B, et al. (2005) Authenticated routing for ad hoc networks Ieee Journal On Selected Areas in Communications. 23: 598-609 |
Buchholz FP, Shields C. (2004) Providing process origin information to aid in computer forensic investigations Journal of Computer Security. 12: 753-776 |
Wright MK, Adler M, Levine BN, et al. (2004) The predecessor attack: An analysis of a threat to anonymous communications systems Acm Transactions On Information and System Security. 7: 489-522 |