Carl A. Gunter - Publications

Affiliations: 
University of Pennsylvania, Philadelphia, PA, United States 
Area:
Computer Science, Mathematics

29 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Kotz D, Gunter CA, Kumar S, Weiner JP. Privacy and Security in Mobile Health: A Research Agenda. Computer. 49: 22-30. PMID 28344359 DOI: 10.1109/Mc.2016.185  0.301
2015 Kotz D, Fu K, Gunter C, Rubin A. Security for mobile and cloud frontiers in healthcare Communications of the Acm. 58: 21-23. DOI: 10.1145/2790830  0.367
2015 LeMay M, Gunter CA. Network-on-chip firewall: Countering defective and malicious system-on-chip hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9200: 404-426. DOI: 10.1007/978-3-319-23165-5_19  0.34
2012 LeMay M, Gunter CA. Cumulative Attestation Kernels for Embedded Systems Ieee Transactions On Smart Grid. 3: 744-760. DOI: 10.1109/Tsg.2011.2174811  0.336
2012 Khanna S, Venkatesh SS, Fatemieh O, Khan F, Gunter CA. Adaptive selective verification: an efficient adaptive countermeasure to thwart DoS attacks Ieee Acm Transactions On Networking. 20: 715-728. DOI: 10.1109/Tnet.2011.2171057  0.375
2011 Zhang J, Gunter CA. Application-aware secure multicast for power grid communications International Journal of Security and Networks. 6: 40-52. DOI: 10.1504/Ijsn.2011.039632  0.411
2011 Uddin MYS, Khurshid A, Jung HD, Gunter C, Caesar M, Abdelzaher T. Making DTNs robust against spoofing attacks with localized countermeasures 2011 8th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2011. 332-340. DOI: 10.1109/SAHCN.2011.5984915  0.407
2010 Bobba R, Fatemieh O, Khan F, Khan A, Gunter CA, Khurana H, Prabhakaran M. Attribute-Based Messaging: Access control and confidentiality Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880025  0.367
2009 Goodloe AE, Gunter CA. Completeness of discovery protocols Proceedings of the Acm Conference On Computer and Communications Security. 29-36. DOI: 10.1145/1655062.1655070  0.736
2009 Anderson P, Gunter C, Kalmanek C, Narain S, Smith J, Talpade R, Xie G. Network infrastructure configuration Ieee Journal On Selected Areas in Communications. 27: 249-252. DOI: 10.1109/Jsac.2009.090401  0.429
2009 AlTurki M, Meseguer J, Gunter CA. Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol Electronic Notes in Theoretical Computer Science. 234: 3-18. DOI: 10.1016/J.Entcs.2009.02.069  0.468
2009 Lemay M, Gunter CA. Cumulative attestation kernels for embedded systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 655-670. DOI: 10.1007/978-3-642-04444-1_40  0.311
2009 Shankesi R, Alturki M, Sasse R, Gunter CA, Meseguer J. Model-checking DoS amplification for VoIP session initiation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 390-405. DOI: 10.1007/978-3-642-04444-1_24  0.354
2007 Boyer JP, Hasan R, Olson LE, Borisov N, Gunter CA, Raila D. Improving multi-tier security using redundant authentication Proceedings of the Acm Conference On Computer and Communications Security. 54-62. DOI: 10.1145/1314466.1314475  0.344
2007 Guha RK, Gunter CA, Sarkar S. Fair coalitions for power-aware routing in wireless networks Ieee Transactions On Mobile Computing. 6: 206-220. DOI: 10.1109/Tmc.2007.27  0.348
2007 Goodloe AE, Gunter CA. Reasoning about concurrency for security tunnels Proceedings - Ieee Computer Security Foundations Symposium. 64-78. DOI: 10.1109/CSF.2007.28  0.742
2006 May MJ, Shin W, Gunter CA, Lee I. Securing the drop-box architecture for assisted living Proceedings of the Fourth Acm Workshop On Formal Methods in Security Engineering, Fmse'06. a Workshop Held in Conjuction With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 1-12. DOI: 10.1145/1180337.1180338  0.339
2005 Bhargavan K, Gunter CA. Network event recognition Formal Methods in System Design. 27: 213-251. DOI: 10.1007/s10703-005-3398-4  0.705
2003 Kakkar P, Gunter CA, Abadi M. Reasoning about secrecy for active networks Journal of Computer Security. 11: 245-287. DOI: 10.3233/Jcs-2003-11205  0.497
2002 Bhargavan K, Obradovic D, Gunter CA. Formal verification of standards for distance vector routing protocols Journal of the Acm. 49: 538-576. DOI: 10.1145/581771.581775  0.74
2002 Bhargavan K, Gunter CA, Kim M, Lee I, Obradovic D, Sokolsky O, Viswanathan M. Verisim: Formal analysis of network simulations Ieee Transactions On Software Engineering. 28: 129-145. DOI: 10.1109/32.988495  0.707
2002 Bhargavan K, Gunter CA. Requirements for a practical network event recognition language Electronic Notes in Theoretical Computer Science. 70: 3-22. DOI: 10.1016/S1571-0661(04)80574-7  0.726
2000 Kakkar P, McDougall M, Gunter CA, Jim T. Certificate Distribution with Local Autonomy Lecture Notes in Computer Science. 277-295. DOI: 10.1007/3-540-40057-5_21  0.514
1999 Kakkar P, Hicks MW, Moore JT, Gunter CA. Specifying the PLAN Network Programming Langauge Electronic Notes in Theoretical Computer Science. 26: 87-104. DOI: 10.1016/S1571-0661(05)80285-3  0.433
1998 Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM. The switchware active network architecture Ieee Network. 12: 29-36. DOI: 10.1109/65.690959  0.503
1998 Hicks MW, Kakkar P, Moore JT, Gunter CA, Nettles S. Network Programming Using PLAN Lecture Notes in Computer Science. 127-143. DOI: 10.1007/3-540-47959-7_7  0.429
1996 Gunter C, Mitchell J, Notkin D. Strategic directions in software engineering and programming languages Acm Computing Surveys. 28: 727-737. DOI: 10.1145/242223.242283  0.311
1993 Gunter CA, Gunter EL, Macqueen DB. Computing ML Equality Kinds Using Abstract Interpretation Information and Computation. 107: 303-323. DOI: 10.1006/Inco.1993.1070  0.317
1991 Breazu-Tannen V, Coquand T, Gunter CA, Scedrov A. Inheritance as implicit coercion Information and Computation. 93: 172-221. DOI: 10.1016/0890-5401(91)90055-7  0.331
Show low-probability matches.