Curtis R. Taylor

According to our database1, Curtis R. Taylor authored at least 16 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2019

Network-based Classification of Authentication Attempts using Machine Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Authenticating Endpoints and Vetting Connections in Residential Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Selloffs, bailouts, and feedback: Can asset markets inform policy?
J. Econ. Theory, 2017

On the feasibility of cloud-based SDN controllers for residential networks.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Contextual, flow-based access control with scalable host-based SDN techniques.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Whole home proxies: Bringing enterprise-grade security to residential networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Validating security protocols with cloud-based middleboxes.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Understanding the security of interoperable medical devices using attack graphs.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Bandwidth aggregation in allied WiFi routers.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

From an IP Address to a Street Address: Using Wireless Signals to Locate a Target.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

Hide and Seek: Costly Consumer Privacy in a Market with Repeat Purchases.
Mark. Sci., 2012

On building inexpensive network capabilities.
Comput. Commun. Rev., 2012

Implementing a "moving target" system to protect servers.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Public information and electoral bias.
Games Econ. Behav., 2010

A unified analysis of rational voting with private values and group-specific costs.
Games Econ. Behav., 2010