Brian N. Levine - Publications

Affiliations: 
University of Massachusetts, Amherst, Amherst, MA 
Area:
mobile networking, disruption tolerant networks, and peer-to-peer networking
Website:
https://www.cics.umass.edu/faculty/directory/levine_brian

25 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Sung K, Biswas J, Learned-Miller E, Levine BN, Liberatore M. Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet Ieee Transactions On Mobile Computing. 18: 1407-1418. DOI: 10.1109/Tmc.2018.2857777  0.76
2017 Bissias G, Levine BN, Liberatore M, Prusty S. Forensic Identification of Anonymous Sources in OneSwarm Ieee Transactions On Dependable and Secure Computing. 14: 620-632. DOI: 10.1109/Tdsc.2015.2497706  0.711
2015 Bissias G, Levine B, Liberatore M, Lynn B, Moore J, Wallach H, Wolak J. Characterization of contact offenders and child exploitation material trafficking on five peer-to-peer networks. Child Abuse & Neglect. PMID 26746110 DOI: 10.1016/J.Chiabu.2015.10.022  0.701
2014 Wolak J, Liberatore M, Levine BN. Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network. Child Abuse & Neglect. 38: 347-56. PMID 24252746 DOI: 10.1016/J.Chiabu.2013.10.018  0.789
2014 Liberatore M, Levine BN, Shields C, Lynn B. Efficient Tagging of Remote Peers during Child Pornography Investigations Ieee Transactions On Dependable and Secure Computing. 11: 425-439. DOI: 10.1109/Tdsc.2013.46  0.791
2012 Soroush H, Banerjee N, Corner M, Levine B, Lynn B. A retrospective look at the UMass DOME mobile testbed Acm Sigmobile Mobile Computing and Communications Review. 15: 2-15. DOI: 10.1145/2169077.2169079  0.71
2011 Liberatore M, Gurung B, Levine BN, Wright M. Empirical tests of anonymous voice over IP Journal of Network and Computer Applications. 34: 341-350. DOI: 10.1016/J.Jnca.2010.06.009  0.764
2011 Margolin NB, Levine BN, Miller JD, Wright M. Economic incentives for protecting digital rights online Electronic Commerce Research and Applications. 10: 553-564. DOI: 10.1016/J.Elerap.2010.12.006  0.547
2010 Banerjee N, Corner MD, Levine BN. Design and field experimentation of an energy-efficient architecture for DTN throwboxes Ieee/Acm Transactions On Networking. 18: 554-567. DOI: 10.1109/Tnet.2009.2039491  0.373
2010 Balasubramanian A, Levine BN, Venkataramani A. Replication routing in DTNs: A resource allocation approach Ieee/Acm Transactions On Networking. 18: 596-609. DOI: 10.1109/Tnet.2009.2036365  0.661
2010 Liberatore M, Erdely R, Kerle T, Levine BN, Shields C. Forensic investigation of peer-to-peer file sharing networks Digital Investigation. 7. DOI: 10.1016/J.Diin.2010.05.012  0.792
2009 Levine BN, Liberatore M. DEX: Digital evidence provenance supporting reproducibility and comparison Digital Investigation. 6. DOI: 10.1016/J.Diin.2009.06.011  0.752
2008 Wright MK, Adler M, Levine BN, Shields C. Passive-Logging Attacks Against Anonymous Communications Systems Acm Transactions On Information and System Security. 11: 3. DOI: 10.1145/1330332.1330335  0.693
2007 Baughman NE, Liberatore M, Levine BN. Cheat-proof playout for centralized and peer-to-peer gaming Ieee Acm Transactions On Networking. 15: 1-13. DOI: 10.1109/Tnet.2006.886289  0.773
2006 Burgess J, Zahorjan J, Mahajan R, Levine BN, Balasubramanian A, Venkataramani A, Zhou Y, Croft B, Banerjee N, Corner M, Towsley D. CRAWDAD dataset umass/diesel (v.2006-01-17) Crawdad Wireless Network Data Archive. DOI: 10.15783/C7488P  0.503
2006 Partan J, Kurose J, Levine BN. A survey of practical issues in underwater networks Wuwnet 2006 - Proceedings of the First Acm International Workshop On Underwater Networks. 2006: 17-24. DOI: 10.1145/1347364.1347372  0.398
2006 Levine B, Shields C. Editorial: Internet security Computer Communications. 29: 279. DOI: 10.1016/J.Comcom.2004.12.005  0.607
2005 Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM. Authenticated routing for ad hoc networks Ieee Journal On Selected Areas in Communications. 23: 598-609. DOI: 10.1109/Jsac.2004.842547  0.666
2004 Arnold JL, Levine BN, Manmatha R, Lee F, Shenoy P, Tsai MC, Ibrahim TK, O'Brien DJ, Walsh DA. Information-sharing in out-of-hospital disaster response: the future role of information technology. Prehospital and Disaster Medicine. 19: 201-7. PMID 15571195 DOI: 10.1017/S1049023X00001783  0.386
2004 Wright MK, Adler M, Levine BN, Shields C. The predecessor attack: An analysis of a threat to anonymous communications systems Acm Transactions On Information and System Security. 7: 489-522. DOI: 10.1145/1042031.1042032  0.706
2003 Levine BN, Paul S, Garcia-Luna-Aceves JJ. Organizing multicast receivers deterministically by packet-loss correlation Multimedia Systems. 9: 3-14. DOI: 10.1007/S00530-003-0050-2  0.602
2002 Levine BN, Shields C. Hordes: a multicast based protocol for anonymity Journal of Computer Security. 10: 213-240. DOI: 10.3233/Jcs-2002-10302  0.689
2002 Towsley D, Diot C, Levine BN, Rizzo L. Guest editorial - network support for multicast communications Ieee Journal On Selected Areas in Communications. 20: 1441-1443. DOI: 10.1109/Jsac.2002.803064  0.386
2000 Walz J, Levine BN. A hierarchical multicast monitoring scheme New Generation Computing. 105-116. DOI: 10.1145/354644.354660  0.356
2000 Diot C, Levine BN, Lyles B, Kassem H, Balensiefen D. Deployment issues for the IP multicast service and architecture Ieee Network. 14: 78-88. DOI: 10.1109/65.819174  0.333
Show low-probability matches.