Year |
Citation |
Score |
2015 |
Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515 |
0.407 |
|
2014 |
Liberatore M, Levine BN, Shields C, Lynn B. Efficient Tagging of Remote Peers during Child Pornography Investigations Ieee Transactions On Dependable and Secure Computing. 11: 425-439. DOI: 10.1109/Tdsc.2013.46 |
0.588 |
|
2011 |
Shields C, Frieder O, Maloof M. A system for the proactive, continuous, and efficient collection of digital forensic evidence Digital Investigation. 8. DOI: 10.1016/J.Diin.2011.05.002 |
0.431 |
|
2010 |
Liberatore M, Erdely R, Kerle T, Levine BN, Shields C. Forensic investigation of peer-to-peer file sharing networks Digital Investigation. 7. DOI: 10.1016/J.Diin.2010.05.012 |
0.597 |
|
2009 |
Cabuk S, Brodley CE, Shields C. IP covert channel detection Acm Transactions On Information and System Security. 12. DOI: 10.1145/1513601.1513604 |
0.319 |
|
2008 |
Wright MK, Adler M, Levine BN, Shields C. Passive-Logging Attacks Against Anonymous Communications Systems Acm Transactions On Information and System Security. 11: 3. DOI: 10.1145/1330332.1330335 |
0.581 |
|
2006 |
Levine B, Shields C. Editorial: Internet security Computer Communications. 29: 279. DOI: 10.1016/J.Comcom.2004.12.005 |
0.565 |
|
2005 |
Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM. Authenticated routing for ad hoc networks Ieee Journal On Selected Areas in Communications. 23: 598-609. DOI: 10.1109/Jsac.2004.842547 |
0.613 |
|
2004 |
Buchholz FP, Shields C. Providing process origin information to aid in computer forensic investigations Journal of Computer Security. 12: 753-776. DOI: 10.3233/Jcs-2004-12505 |
0.419 |
|
2004 |
Wright MK, Adler M, Levine BN, Shields C. The predecessor attack: An analysis of a threat to anonymous communications systems Acm Transactions On Information and System Security. 7: 489-522. DOI: 10.1145/1042031.1042032 |
0.616 |
|
2004 |
Carrier B, Shields C. The session token protocol for forensics and traceback Acm Transactions On Information and System Security (Tissec). 7: 333-362. DOI: 10.1145/1015040.1015041 |
0.513 |
|
2002 |
Levine BN, Shields C. Hordes: a multicast based protocol for anonymity Journal of Computer Security. 10: 213-240. DOI: 10.3233/Jcs-2002-10302 |
0.643 |
|
1998 |
Shields C, Garcia-Luna-Aceves JJ. HIP protocol for hierarchical multicast routing Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 257-266. DOI: 10.1016/S0140-3664(99)00190-5 |
0.554 |
|
Show low-probability matches. |