Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis YO Yazir, C Matthews, R Farahbod, S Neville, A Guitouni, S Ganti, ... 2010 IEEE 3rd International Conference on Cloud Computing, 91-98, 2010 | 346 | 2010 |
System for regulating wireless device operations in wireless networks B Chow, H MacDonald, D Yarish, T Darcie, S Neville, AS Kroeker US Patent 9,451,451, 2016 | 109 | 2016 |
Sybil attacks as a mitigation strategy against the storm botnet CR Davis, JM Fernandez, S Neville, J McHugh 2008 3rd International Conference on Malicious and Unwanted Software …, 2008 | 93 | 2008 |
Secret key generation and agreement in UWB communication channels MG Madiseh, ML McGuire, SS Neville, L Cai, M Horie IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008 | 69 | 2008 |
Verification of secret key generation from UWB channel observations MG Madiseh, S He, ML McGuire, SW Neville, X Dong 2009 IEEE International Conference on Communications, 1-5, 2009 | 67 | 2009 |
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures? CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008 | 65 | 2008 |
Consumers' sentiment analysis of popular phone brands and operating system preference using Twitter data: A feasibility study D Arora, KF Li, SW Neville 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 58 | 2015 |
Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation MG Madiseh, SW Neville, ML McGuire IEEE Transactions on Information Forensics and Security 7 (4), 1278-1287, 2012 | 58 | 2012 |
Maitland: Lighter-weight vm introspection to support cyber-security in the cloud C Benninger, SW Neville, YO Yazir, C Matthews, Y Coady 2012 IEEE Fifth International Conference on Cloud Computing, 471-478, 2012 | 57 | 2012 |
Secret key extraction in ultra wideband channels for unsynchronized radios MG Madiseh, ML McGuire, SW Neville, AAB Shirazi 6th Annual Communication Networks and Services Research Conference (cnsr …, 2008 | 47 | 2008 |
Secure protocol for transactions SW Neville, M Horie US Patent 8,768,854, 2014 | 46 | 2014 |
Wavelet denoising of coarsely quantized signals S Neville, N Dimopoulos IEEE Transactions on Instrumentation and Measurement 55 (3), 892-901, 2006 | 37 | 2006 |
Optimising sybil attacks against P2P-based botnets CR Davis, JM Fernandez, S Neville 2009 4th International Conference on Malicious and Unwanted Software …, 2009 | 34 | 2009 |
System and method for evaluating wireless device and/or wireless network performance BS Chow, HBB Macdonald, DD Yarish, AS Kroeker, SW Neville, ... US Patent 10,827,371, 2020 | 28 | 2020 |
DockerSim: Full-stack simulation of container-based Software-as-a-Service (SaaS) cloud deployments and environments Z Nikdel, B Gao, SW Neville 2017 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2017 | 28 | 2017 |
STARS: A framework for statistically rigorous simulation-based network research E Millman, D Arora, SW Neville 2011 IEEE Workshops of International Conference on Advanced Information …, 2011 | 27 | 2011 |
The rational for developing larger-scale 1000+ machine emulation-based research test beds SW Neville, KF Li 2009 International Conference on Advanced Information Networking and …, 2009 | 17 | 2009 |
Method and system of controlling spam SW Neville, M Horie US Patent 9,137,138, 2015 | 15 | 2015 |
Time correlation analysis of secret key generation via uwb channels MG Madiseh, SW Neville, ML McGuire 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 13 | 2010 |
Assessing the performance of AODV, DYMO, and OLSR routing protocols in the context of larger-scale denser MANETs D Arora, E Millman, SW Neville Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers …, 2011 | 12 | 2011 |