Follow
Stephen Neville
Stephen Neville
Verified email at uvic.ca
Title
Cited by
Cited by
Year
Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis
YO Yazir, C Matthews, R Farahbod, S Neville, A Guitouni, S Ganti, ...
2010 IEEE 3rd International Conference on Cloud Computing, 91-98, 2010
3462010
System for regulating wireless device operations in wireless networks
B Chow, H MacDonald, D Yarish, T Darcie, S Neville, AS Kroeker
US Patent 9,451,451, 2016
1092016
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
932008
Secret key generation and agreement in UWB communication channels
MG Madiseh, ML McGuire, SS Neville, L Cai, M Horie
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
692008
Verification of secret key generation from UWB channel observations
MG Madiseh, S He, ML McGuire, SW Neville, X Dong
2009 IEEE International Conference on Communications, 1-5, 2009
672009
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
652008
Consumers' sentiment analysis of popular phone brands and operating system preference using Twitter data: A feasibility study
D Arora, KF Li, SW Neville
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
582015
Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation
MG Madiseh, SW Neville, ML McGuire
IEEE Transactions on Information Forensics and Security 7 (4), 1278-1287, 2012
582012
Maitland: Lighter-weight vm introspection to support cyber-security in the cloud
C Benninger, SW Neville, YO Yazir, C Matthews, Y Coady
2012 IEEE Fifth International Conference on Cloud Computing, 471-478, 2012
572012
Secret key extraction in ultra wideband channels for unsynchronized radios
MG Madiseh, ML McGuire, SW Neville, AAB Shirazi
6th Annual Communication Networks and Services Research Conference (cnsr …, 2008
472008
Secure protocol for transactions
SW Neville, M Horie
US Patent 8,768,854, 2014
462014
Wavelet denoising of coarsely quantized signals
S Neville, N Dimopoulos
IEEE Transactions on Instrumentation and Measurement 55 (3), 892-901, 2006
372006
Optimising sybil attacks against P2P-based botnets
CR Davis, JM Fernandez, S Neville
2009 4th International Conference on Malicious and Unwanted Software …, 2009
342009
System and method for evaluating wireless device and/or wireless network performance
BS Chow, HBB Macdonald, DD Yarish, AS Kroeker, SW Neville, ...
US Patent 10,827,371, 2020
282020
DockerSim: Full-stack simulation of container-based Software-as-a-Service (SaaS) cloud deployments and environments
Z Nikdel, B Gao, SW Neville
2017 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2017
282017
STARS: A framework for statistically rigorous simulation-based network research
E Millman, D Arora, SW Neville
2011 IEEE Workshops of International Conference on Advanced Information …, 2011
272011
The rational for developing larger-scale 1000+ machine emulation-based research test beds
SW Neville, KF Li
2009 International Conference on Advanced Information Networking and …, 2009
172009
Method and system of controlling spam
SW Neville, M Horie
US Patent 9,137,138, 2015
152015
Time correlation analysis of secret key generation via uwb channels
MG Madiseh, SW Neville, ML McGuire
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
132010
Assessing the performance of AODV, DYMO, and OLSR routing protocols in the context of larger-scale denser MANETs
D Arora, E Millman, SW Neville
Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers …, 2011
122011
The system can't perform the operation now. Try again later.
Articles 1–20