Curtis R. Taylor

According to our database1, Curtis R. Taylor authored at least 15 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Network-based Classification of Authentication Attempts using Machine Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Authenticating Endpoints and Vetting Connections in Residential Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2017
Selloffs, bailouts, and feedback: Can asset markets inform policy?
J. Economic Theory, 2017

On the feasibility of cloud-based SDN controllers for residential networks.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

2016
Contextual, flow-based access control with scalable host-based SDN techniques.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Whole home proxies: Bringing enterprise-grade security to residential networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Validating security protocols with cloud-based middleboxes.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2014
Understanding the security of interoperable medical devices using attack graphs.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Bandwidth aggregation in allied WiFi routers.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2013
From an IP Address to a Street Address: Using Wireless Signals to Locate a Target.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

2012
Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases.
Marketing Science, 2012

On building inexpensive network capabilities.
Computer Communication Review, 2012

2011
Implementing a "moving target" system to protect servers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Public information and electoral bias.
Games and Economic Behavior, 2010

A unified analysis of rational voting with private values and group-specific costs.
Games and Economic Behavior, 2010


  Loading...