Year |
Citation |
Score |
2019 |
Sung K, Biswas J, Learned-Miller E, Levine BN, Liberatore M. Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet Ieee Transactions On Mobile Computing. 18: 1407-1418. DOI: 10.1109/Tmc.2018.2857777 |
0.76 |
|
2017 |
Bissias G, Levine BN, Liberatore M, Prusty S. Forensic Identification of Anonymous Sources in OneSwarm Ieee Transactions On Dependable and Secure Computing. 14: 620-632. DOI: 10.1109/Tdsc.2015.2497706 |
0.711 |
|
2015 |
Bissias G, Levine B, Liberatore M, Lynn B, Moore J, Wallach H, Wolak J. Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. Child Abuse & Neglect. PMID 26746110 DOI: 10.1016/J.Chiabu.2015.10.022 |
0.701 |
|
2014 |
Wolak J, Liberatore M, Levine BN. Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. Child Abuse & Neglect. 38: 347-56. PMID 24252746 DOI: 10.1016/J.Chiabu.2013.10.018 |
0.789 |
|
2014 |
Liberatore M, Levine BN, Shields C, Lynn B. Efficient Tagging of Remote Peers during Child Pornography Investigations Ieee Transactions On Dependable and Secure Computing. 11: 425-439. DOI: 10.1109/Tdsc.2013.46 |
0.791 |
|
2012 |
Soroush H, Banerjee N, Corner M, Levine B, Lynn B. A retrospective look at the UMass DOME mobile testbed Acm Sigmobile Mobile Computing and Communications Review. 15: 2-15. DOI: 10.1145/2169077.2169079 |
0.71 |
|
2011 |
Liberatore M, Gurung B, Levine BN, Wright M. Empirical tests of anonymous voice over IP Journal of Network and Computer Applications. 34: 341-350. DOI: 10.1016/J.Jnca.2010.06.009 |
0.764 |
|
2011 |
Margolin NB, Levine BN, Miller JD, Wright M. Economic incentives for protecting digital rights online Electronic Commerce Research and Applications. 10: 553-564. DOI: 10.1016/J.Elerap.2010.12.006 |
0.547 |
|
2010 |
Banerjee N, Corner MD, Levine BN. Design and field experimentation of an energy-efficient architecture for DTN throwboxes Ieee/Acm Transactions On Networking. 18: 554-567. DOI: 10.1109/Tnet.2009.2039491 |
0.373 |
|
2010 |
Balasubramanian A, Levine BN, Venkataramani A. Replication routing in DTNs: A resource allocation approach Ieee/Acm Transactions On Networking. 18: 596-609. DOI: 10.1109/Tnet.2009.2036365 |
0.661 |
|
2010 |
Liberatore M, Erdely R, Kerle T, Levine BN, Shields C. Forensic investigation of peer-to-peer file sharing networks Digital Investigation. 7. DOI: 10.1016/J.Diin.2010.05.012 |
0.792 |
|
2009 |
Levine BN, Liberatore M. DEX: Digital evidence provenance supporting reproducibility and comparison Digital Investigation. 6. DOI: 10.1016/J.Diin.2009.06.011 |
0.752 |
|
2008 |
Wright MK, Adler M, Levine BN, Shields C. Passive-Logging Attacks Against Anonymous Communications Systems Acm Transactions On Information and System Security. 11: 3. DOI: 10.1145/1330332.1330335 |
0.693 |
|
2007 |
Baughman NE, Liberatore M, Levine BN. Cheat-proof playout for centralized and peer-to-peer gaming Ieee Acm Transactions On Networking. 15: 1-13. DOI: 10.1109/Tnet.2006.886289 |
0.773 |
|
2006 |
Burgess J, Zahorjan J, Mahajan R, Levine BN, Balasubramanian A, Venkataramani A, Zhou Y, Croft B, Banerjee N, Corner M, Towsley D. CRAWDAD dataset umass/diesel (v.2006-01-17) Crawdad Wireless Network Data Archive. DOI: 10.15783/C7488P |
0.503 |
|
2006 |
Partan J, Kurose J, Levine BN. A survey of practical issues in underwater networks Wuwnet 2006 - Proceedings of the First Acm International Workshop On Underwater Networks. 2006: 17-24. DOI: 10.1145/1347364.1347372 |
0.398 |
|
2006 |
Levine B, Shields C. Editorial: Internet security Computer Communications. 29: 279. DOI: 10.1016/J.Comcom.2004.12.005 |
0.607 |
|
2005 |
Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM. Authenticated routing for ad hoc networks Ieee Journal On Selected Areas in Communications. 23: 598-609. DOI: 10.1109/Jsac.2004.842547 |
0.666 |
|
2004 |
Arnold JL, Levine BN, Manmatha R, Lee F, Shenoy P, Tsai MC, Ibrahim TK, O'Brien DJ, Walsh DA. Information-sharing in out-of-hospital disaster response: the future role of information technology. Prehospital and Disaster Medicine. 19: 201-7. PMID 15571195 DOI: 10.1017/S1049023X00001783 |
0.386 |
|
2004 |
Wright MK, Adler M, Levine BN, Shields C. The predecessor attack: An analysis of a threat to anonymous communications systems Acm Transactions On Information and System Security. 7: 489-522. DOI: 10.1145/1042031.1042032 |
0.706 |
|
2003 |
Levine BN, Paul S, Garcia-Luna-Aceves JJ. Organizing multicast receivers deterministically by packet-loss correlation Multimedia Systems. 9: 3-14. DOI: 10.1007/S00530-003-0050-2 |
0.602 |
|
2002 |
Levine BN, Shields C. Hordes: a multicast based protocol for anonymity Journal of Computer Security. 10: 213-240. DOI: 10.3233/Jcs-2002-10302 |
0.689 |
|
2002 |
Towsley D, Diot C, Levine BN, Rizzo L. Guest editorial - network support for multicast communications Ieee Journal On Selected Areas in Communications. 20: 1441-1443. DOI: 10.1109/Jsac.2002.803064 |
0.386 |
|
2000 |
Walz J, Levine BN. A hierarchical multicast monitoring scheme New Generation Computing. 105-116. DOI: 10.1145/354644.354660 |
0.356 |
|
2000 |
Diot C, Levine BN, Lyles B, Kassem H, Balensiefen D. Deployment issues for the IP multicast service and architecture Ieee Network. 14: 78-88. DOI: 10.1109/65.819174 |
0.333 |
|
Show low-probability matches. |