Jedidiah R. Crandall - Publications

Affiliations: 
Computer Science University of New Mexico, Albuquerque, NM, United States 
Area:
Computer Science

9 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Ensafi R, Knockel J, Alexander G, Crandall JR. Detecting intentional packet drops on the internet via TCP/IP side channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8362: 109-118. DOI: 10.1007/978-3-319-04918-2_11  0.701
2013 Shebaro B, Pérez-González F, Crandall JR. Exploiting geometrical structure for forensic applications of timing inference channels International Journal of Digital Crime and Forensics. 5: 54-69. DOI: 10.4018/Jdcf.2013010104  0.69
2013 Al-Saleh MI, Espinoza AM, Crandall JR. Antivirus performance characterisation: System-wide view Iet Information Security. 7: 126-133. DOI: 10.1049/Iet-Ifs.2012.0192  0.678
2011 Shebaro B, Crandall JR. Privacy-preserving network flow recording Dfrws 2011 Annual Conference. S90-S100. DOI: 10.1016/J.Diin.2011.05.011  0.701
2010 Al-Saleh MI, Crandall JR. On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible? Proceedings New Security Paradigms Workshop. 17-32. DOI: 10.1145/1900546.1900551  0.693
2010 Shebaro B, Perez-Gonzalez F, Crandall JR. Leaving timing-channel fingerprints in hidden service log files Digital Investigation. 7. DOI: 10.1016/J.Diin.2010.05.013  0.703
2009 Crandall JR, Ensafi R, Forrest S, Ladau J, Shebaro B. The ecology of malware Proceedings New Security Paradigms Workshop. 99-106. DOI: 10.1145/1595676.1595692  0.594
2006 Crandall JR, Wu SF, Chong FT. Minos: Architectural support for protecting control data Acm Transactions On Architecture and Code Optimization. 3: 359-389. DOI: 10.1145/1187976.1187977  0.32
2005 Crandall JR, Chong FT. A security assessment of the minos architecture Acm Sigarch Computer Architecture News. 33: 48-57. DOI: 10.1145/1055626.1055634  0.319
Show low-probability matches.