Year |
Citation |
Score |
2016 |
Kotz D, Gunter CA, Kumar S, Weiner JP. Privacy and Security in Mobile Health: A Research Agenda. Computer. 49: 22-30. PMID 28344359 DOI: 10.1109/Mc.2016.185 |
0.301 |
|
2015 |
Kotz D, Fu K, Gunter C, Rubin A. Security for mobile and cloud frontiers in healthcare Communications of the Acm. 58: 21-23. DOI: 10.1145/2790830 |
0.367 |
|
2015 |
LeMay M, Gunter CA. Network-on-chip firewall: Countering defective and malicious system-on-chip hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9200: 404-426. DOI: 10.1007/978-3-319-23165-5_19 |
0.34 |
|
2012 |
LeMay M, Gunter CA. Cumulative Attestation Kernels for Embedded Systems Ieee Transactions On Smart Grid. 3: 744-760. DOI: 10.1109/Tsg.2011.2174811 |
0.336 |
|
2012 |
Khanna S, Venkatesh SS, Fatemieh O, Khan F, Gunter CA. Adaptive selective verification: an efficient adaptive countermeasure to thwart DoS attacks Ieee Acm Transactions On Networking. 20: 715-728. DOI: 10.1109/Tnet.2011.2171057 |
0.375 |
|
2011 |
Zhang J, Gunter CA. Application-aware secure multicast for power grid communications International Journal of Security and Networks. 6: 40-52. DOI: 10.1504/Ijsn.2011.039632 |
0.411 |
|
2011 |
Uddin MYS, Khurshid A, Jung HD, Gunter C, Caesar M, Abdelzaher T. Making DTNs robust against spoofing attacks with localized countermeasures 2011 8th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2011. 332-340. DOI: 10.1109/SAHCN.2011.5984915 |
0.407 |
|
2010 |
Bobba R, Fatemieh O, Khan F, Khan A, Gunter CA, Khurana H, Prabhakaran M. Attribute-Based Messaging: Access control and confidentiality Acm Transactions On Information and System Security. 13. DOI: 10.1145/1880022.1880025 |
0.367 |
|
2009 |
Goodloe AE, Gunter CA. Completeness of discovery protocols Proceedings of the Acm Conference On Computer and Communications Security. 29-36. DOI: 10.1145/1655062.1655070 |
0.736 |
|
2009 |
Anderson P, Gunter C, Kalmanek C, Narain S, Smith J, Talpade R, Xie G. Network infrastructure configuration Ieee Journal On Selected Areas in Communications. 27: 249-252. DOI: 10.1109/Jsac.2009.090401 |
0.429 |
|
2009 |
AlTurki M, Meseguer J, Gunter CA. Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol Electronic Notes in Theoretical Computer Science. 234: 3-18. DOI: 10.1016/J.Entcs.2009.02.069 |
0.468 |
|
2009 |
Lemay M, Gunter CA. Cumulative attestation kernels for embedded systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 655-670. DOI: 10.1007/978-3-642-04444-1_40 |
0.311 |
|
2009 |
Shankesi R, Alturki M, Sasse R, Gunter CA, Meseguer J. Model-checking DoS amplification for VoIP session initiation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5789: 390-405. DOI: 10.1007/978-3-642-04444-1_24 |
0.354 |
|
2007 |
Boyer JP, Hasan R, Olson LE, Borisov N, Gunter CA, Raila D. Improving multi-tier security using redundant authentication Proceedings of the Acm Conference On Computer and Communications Security. 54-62. DOI: 10.1145/1314466.1314475 |
0.344 |
|
2007 |
Guha RK, Gunter CA, Sarkar S. Fair coalitions for power-aware routing in wireless networks Ieee Transactions On Mobile Computing. 6: 206-220. DOI: 10.1109/Tmc.2007.27 |
0.348 |
|
2007 |
Goodloe AE, Gunter CA. Reasoning about concurrency for security tunnels Proceedings - Ieee Computer Security Foundations Symposium. 64-78. DOI: 10.1109/CSF.2007.28 |
0.742 |
|
2006 |
May MJ, Shin W, Gunter CA, Lee I. Securing the drop-box architecture for assisted living Proceedings of the Fourth Acm Workshop On Formal Methods in Security Engineering, Fmse'06. a Workshop Held in Conjuction With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 1-12. DOI: 10.1145/1180337.1180338 |
0.339 |
|
2005 |
Bhargavan K, Gunter CA. Network event recognition Formal Methods in System Design. 27: 213-251. DOI: 10.1007/s10703-005-3398-4 |
0.705 |
|
2003 |
Kakkar P, Gunter CA, Abadi M. Reasoning about secrecy for active networks Journal of Computer Security. 11: 245-287. DOI: 10.3233/Jcs-2003-11205 |
0.497 |
|
2002 |
Bhargavan K, Obradovic D, Gunter CA. Formal verification of standards for distance vector routing protocols Journal of the Acm. 49: 538-576. DOI: 10.1145/581771.581775 |
0.74 |
|
2002 |
Bhargavan K, Gunter CA, Kim M, Lee I, Obradovic D, Sokolsky O, Viswanathan M. Verisim: Formal analysis of network simulations Ieee Transactions On Software Engineering. 28: 129-145. DOI: 10.1109/32.988495 |
0.707 |
|
2002 |
Bhargavan K, Gunter CA. Requirements for a practical network event recognition language Electronic Notes in Theoretical Computer Science. 70: 3-22. DOI: 10.1016/S1571-0661(04)80574-7 |
0.726 |
|
2000 |
Kakkar P, McDougall M, Gunter CA, Jim T. Certificate Distribution with Local Autonomy Lecture Notes in Computer Science. 277-295. DOI: 10.1007/3-540-40057-5_21 |
0.514 |
|
1999 |
Kakkar P, Hicks MW, Moore JT, Gunter CA. Specifying the PLAN Network Programming Langauge Electronic Notes in Theoretical Computer Science. 26: 87-104. DOI: 10.1016/S1571-0661(05)80285-3 |
0.433 |
|
1998 |
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM. The switchware active network architecture Ieee Network. 12: 29-36. DOI: 10.1109/65.690959 |
0.503 |
|
1998 |
Hicks MW, Kakkar P, Moore JT, Gunter CA, Nettles S. Network Programming Using PLAN Lecture Notes in Computer Science. 127-143. DOI: 10.1007/3-540-47959-7_7 |
0.429 |
|
1996 |
Gunter C, Mitchell J, Notkin D. Strategic directions in software engineering and programming languages Acm Computing Surveys. 28: 727-737. DOI: 10.1145/242223.242283 |
0.311 |
|
1993 |
Gunter CA, Gunter EL, Macqueen DB. Computing ML Equality Kinds Using Abstract Interpretation Information and Computation. 107: 303-323. DOI: 10.1006/Inco.1993.1070 |
0.317 |
|
1991 |
Breazu-Tannen V, Coquand T, Gunter CA, Scedrov A. Inheritance as implicit coercion Information and Computation. 93: 172-221. DOI: 10.1016/0890-5401(91)90055-7 |
0.331 |
|
Show low-probability matches. |