Douglas Reeves
Douglas Reeves
Professor of Computer Science, N.C. State University
Verified email at
Cited by
Cited by
Constructing attack scenarios through correlation of intrusion alerts
P Ning, Y Cui, DS Reeves
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
Evaluation of multicast routing algorithms for real-time communication on high-speed networks
HF Salama, DS Reeves, Y Viniotis
IEEE Journal on Selected Areas in Communications 15 (3), 332-345, 1997
Real-time communication in packet-switched networks
CM Aras, JF Kurose, DS Reeves, H Schulzrinne
Proceedings of the IEEE 82 (1), 122-139, 1994
Techniques and tools for analyzing intrusion alerts
P Ning, Y Cui, DS Reeves, D Xu
ACM Transactions on Information and System Security (TISSEC) 7 (2), 274-318, 2004
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
X Wang, DS Reeves
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Fast malware classification by automated behavioral graph matching
Y Park, D Reeves, V Mulukutla, B Sundaravel
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Analyzing intensive intrusion alerts via correlation
P Ning, Y Cui, DS Reeves
Recent Advances in Intrusion Detection: 5th International Symposium, RAID …, 2002
A distributed algorithm for delay-constrained unicast routing
HF Salama, DS Reeves, Y Viniotis
Proceedings of INFOCOM'97 1, 84-91, 1997
A distributed algorithm for delay-constrained unicast routing
DS Reeves, HF Salama
IEEE/ACM Transactions on networking 8 (2), 239-250, 2000
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
X Wang, DS Reeves, SF Wu
Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002
Sleepy watermark tracing: An active network-based intrusion response framework
X Wang, DS Reeves, SF Wu, J Yuill
Trusted Information: The New Decade Challenge 16, 369-384, 2001
On the secrecy of timing-based active watermarking trace-back techniques
P Peng, P Ning, DS Reeves
2006 IEEE Symposium on Security and Privacy (S&P'06), 15 pp.-349, 2006
Metaaware: Identifying metamorphic malware
Q Zhang, DS Reeves
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
Defending against sybil attacks in sensor networks
Q Zhang, P Wang, DS Reeves, P Ning
25th ieee international conference on distributed computing systems …, 2005
Tracing traffic through intermediate hosts that repacketize flows
YJ Pyun, YH Park, X Wang, DS Reeves, P Ning
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Deriving common malware behavior through graph clustering
Y Park, D Reeves
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
A survey of statistical source models for variable-bit-rate compressed video
MR Izquierdo, DS Reeves
Multimedia systems 7, 199-213, 1999
Self-stabilizing structured ring topology p2p systems
A Shaker, DS Reeves
Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05), 39-46, 2005
Analyzing network traffic to detect self-decrypting exploit code
Q Zhang, DS Reeves, P Ning, SP Iyer
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
The delay-constrained minimum spanning tree problem
HF Salama, DS Reeves, Y Viniotis
Proceedings Second IEEE Symposium on Computer and Communications, 699-703, 1997
The system can't perform the operation now. Try again later.
Articles 1–20