Curtis R. Taylor

Orcid: 0000-0002-2270-3538

According to our database1, Curtis R. Taylor authored at least 18 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Evaluating Efficiency and Security of Connected and Autonomous Vehicle Applications.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Can the User Help? Leveraging User Actions for Network Profiling.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

2019
Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2019

Network-based Classification of Authentication Attempts using Machine Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Authenticating Endpoints and Vetting Connections in Residential Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2017
Selloffs, bailouts, and feedback: Can asset markets inform policy?
J. Econ. Theory, 2017

On the feasibility of cloud-based SDN controllers for residential networks.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

2016
Contextual, flow-based access control with scalable host-based SDN techniques.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Whole home proxies: Bringing enterprise-grade security to residential networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Validating security protocols with cloud-based middleboxes.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2014
Understanding the security of interoperable medical devices using attack graphs.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Bandwidth aggregation in allied WiFi routers.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
From an IP Address to a Street Address: Using Wireless Signals to Locate a Target.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

2012
Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases.
Mark. Sci., 2012

On building inexpensive network capabilities.
Comput. Commun. Rev., 2012

2011
Implementing a "moving target" system to protect servers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Public information and electoral bias.
Games Econ. Behav., 2010

A unified analysis of rational voting with private values and group-specific costs.
Games Econ. Behav., 2010


  Loading...