David Malone

Orcid: 0000-0002-6947-586X

According to our database1, David Malone authored at least 112 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Costs and Benefits of Authentication Advice.
ACM Trans. Priv. Secur., August, 2023

Adaptive password guessing: learning language, nationality and dataset source.
Ann. des Télécommunications, August, 2023

Staying at the Roach Motel: Cross-Country Analysis of Manipulative Subscription and Cancellation Flows.
CoRR, 2023

2022
A Framework to Model Bursty Electronic Data Interchange Messages for Queueing Systems.
Future Internet, 2022

Guessing PINs, One Partial PIN at a Time.
Entropy, 2022

A Supervised Learning Approach to Rankability.
CoRR, 2022

A Physical Layer Security (PLS) approach through Address Fed Mapping Crest Factor Reduction applicable for 5G/6G signals.
Proceedings of the 9th International Conference on Future Internet of Things and Cloud, 2022

2021
Quantum Money Scheme: Simulation Results.
Proceedings of the NANOCOM '21: The Eighth Annual ACM International Conference on Nanoscale Computing and Communication, Virtual Event, Italy, September 7, 2021

Heads Or Tails: A Framework To Model Supply Chain Heterogeneous Messages.
Proceedings of the 30th Conference of Open Innovations Association, 2021

Choosing Wordlists for Password Guessing: An Adaptive Multi-armed Bandit Approach.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Quantum Multi-factor Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2021

2020
A Novel Physical Layer Authentication With PAPR Reduction Based on Channel and Hardware Frequency Responses.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020

Performance Investigation of Peak Shrinking and Interpolating the PAPR Reduction Technique for LTE-Advance and 5G Signals.
Inf., 2020

Convergence of Password Guessing to Optimal Success Rates.
Entropy, 2020

Multi-armed bandit approach to password guessing.
CoRR, 2020

Implementing a Quantum Coin Scheme.
CoRR, 2020

Power Saving Proxies for Web Servers.
Comput. J., 2020

Using machine learning to predict links and improve Steiner tree solutions to team formation problems - a cross company study.
Appl. Netw. Sci., 2020

2019
Peak Shrinking and Interpolating Technique for reducing Peak to Average Power Ratio.
Proceedings of the 2019 Wireless Days, 2019

Using Machine Learning to Predict Links and Improve Steiner Tree Solutions to Team Formation Problems.
Proceedings of the Complex Networks and Their Applications VIII, 2019

2018
Exploring the Impact of Password Dataset Distribution on Guessing.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A Novel Physical Layer Encryption Scheme to Counter Eavesdroppers in Wireless Communications.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

Bundles: A Framework to Optimise Topic Analysis in Real-Time Chat Discourse.
Proceedings of the Collaboration and Technology - 24th International Conference, 2018

2017
Obscured by the cloud: A resource allocation framework to model cloud outage events.
J. Syst. Softw., 2017

Evaluating Password Advice.
CoRR, 2017

Imola: A decentralised learning-driven protocol for multi-hop White-Fi.
Comput. Commun., 2017

Identification and insight into a long transitory phase in random-access protocols.
Proceedings of the 15th International Symposium on Modeling and Optimization in Mobile, 2017

Approaching incast congestion with multi-host ethernet controllers.
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Different every time: A framework to model real-time instant message conversations.
Proceedings of the 21st Conference of Open Innovations Association, 2017

2016
Policing 802.11 MAC Misbehaviours.
IEEE Trans. Mob. Comput., 2016

Guest Editorial Power Line Communications and Its Integration With the Networking Ecosystem.
IEEE J. Sel. Areas Commun., 2016

State of the Art in Power Line Communications: From the Applications to the Medium.
IEEE J. Sel. Areas Commun., 2016

Greener Data Exchange in the Cloud: A Coding-Based Optimization for Big Data Processing.
IEEE J. Sel. Areas Commun., 2016

Rigorous and practical proportional-fair allocation for multi-rate Wi-Fi.
Ad Hoc Networks, 2016

A learning approach to decentralised beacon scheduling.
Ad Hoc Networks, 2016

Learning from experience: Efficient decentralized scheduling for 60GHz mesh networks.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

When is the right time to transmit in multi-hop White-Fi?
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

The Leap Second Behaviour of NTP Servers.
Proceedings of the Traffic Monitoring and Analysis - 8th International Workshop, 2016

Analysing and Predicting the Runtime of Social Graphs.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
On efficiency and validity of previous Homeplug MAC performance analysis.
Comput. Networks, 2015

WiFo: A diagnostic tool for IEEE 802.11 MAC.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

CodHoop: A system for optimizing big data processing.
Proceedings of the Annual IEEE Systems Conference, 2015

A lossless switch for data acquisition networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Analogues between tuning TCP for Data Acquisition and datacenter networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

When priority resolution goes way too far: An experimental evaluation in PLC networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Social testing: A framework to support adoption of continuous delivery by small medium enterprises.
Proceedings of the Second International Conference on Computer Science, 2015

2014
Mitigating collisions through power-hopping to improve 802.11 performance.
Pervasive Mob. Comput., 2014

Modeling, Analysis and Impact of a Long Transitory Phase in Random Access Protocols.
CoRR, 2014

Information Systems Implementation Delays and Inactivity Gaps: The End User Perspectives.
Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, 2014

2013
Decentralised learning MACs for collision-free access in WLANs.
Wirel. Networks, 2013

H-RCA: 802.11 Collision-Aware Rate Control.
IEEE/ACM Trans. Netw., 2013

RT-WiFi: real-time high speed communication protocol for wireless control systems.
SIGBED Rev., 2013

Policing 802.11 MAC Misbehaviour.
CoRR, 2013

On the Distributed Construction of a Collision-Free Schedule in WLANs.
CoRR, 2013

Practical node policing in 802.11WLANs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

On the improvement of receiver-initiated MAC protocols for WSNs by applying scheduling.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

802.11 Buffers: When Bigger Is Not Better?
Proceedings of the Wireless Access Flexibility - First International Workshop, 2013

Evaluation of the backoff procedure of Homeplug MAC vs. DCF.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Rogue femtocell owners: How mallory can monitor my devices.
Proceedings of the 2013 Proceedings IEEE INFOCOM Workshops, 2013

A generic algorithm for mid-call audio codec switching.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Power saving for web servers using proxies.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2013

Monitoring VoIP call quality using improved simplified E-model.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

A new adaptive redundancy control algorithm for VoIP applications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Improved E-model for monitoring quality of multi-party VoIP communications.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
WLAN channel selection without communication.
Comput. Networks, 2012

Investigating the distribution of password choices.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Exploiting the capture effect to improve WLAN throughput.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Addressing Slot Drift in Decentralized Collision Free Access Schemes for WLANs.
Proceedings of the Multiple Access Communications - 5th International Workshop, 2012

Experiments with radiated interference from in-home power line communication networks.
Proceedings of IEEE International Conference on Communications, 2012

Hash pile ups: Using collisions to identify unknown hash functions.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
The 802.11g 11 Mb/s Rate is More Robust than 6 Mb/s.
IEEE Trans. Wirel. Commun., 2011

Buffer sizing for 802.11-based networks.
IEEE/ACM Trans. Netw., 2011

Achieving End-to-end Fairness in 802.11e Based Wireless Multi-Hop Mesh Networks Without Coordination.
Mob. Networks Appl., 2011

Incentivising Fairness and Policing Nodes in WiFi.
IEEE Commun. Lett., 2011

Supporting first person shooter games with competing traffic in 802.11e MAC.
Proceedings of the 10th Annual Workshop on Network and Systems Support for Games, 2011

2010
On the Validity of IEEE 802.11 MAC Modeling Hypotheses.
IEEE/ACM Trans. Netw., 2010

Measuring Transmission Opportunities in 802.11 Links.
IEEE/ACM Trans. Netw., 2010

Optimisation of capacity in various 802.11 gaming scenarios.
Int. J. Adv. Media Commun., 2010

Field measurements of 802.11 collision, noise and hidden-node loss rates.
Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks (WiOpt 2010), May 31, 2010

Probabilistic approaches to cheating detection in online games.
Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, 2010

2009
Aggregation with fragment retransmission for very high-speed WLANs.
IEEE/ACM Trans. Netw., 2009

Inferring Queue State by Measuring Delay in a WiFi Network.
Proceedings of the Traffic Monitoring and Analysis, First International Workshop, 2009

802.11 wireless LAN multiplayer game capacity and optimization.
Proceedings of the 8th Annual Workshop on Network and Systems Support for Games, 2009

2008
Logarithmic asymptotics for a single-server processing distinguishable sources.
Math. Methods Oper. Res., 2008

Implementing TCP flow-level fairness using 802.11e in a multi-radio mesh testbed.
IEEE Commun. Lett., 2008

Spurious TCP timeouts in 802.11 networks.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Investigating the validity of IEEE 802.11 MAC modeling hypotheses.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Observations of IPv6 Addresses.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

2007
Modeling the 802.11 distributed coordination function in nonsaturated heterogeneous conditions.
IEEE/ACM Trans. Netw., 2007

MAC Layer Channel Quality Measurement in 802.11.
IEEE Commun. Lett., 2007

Experimental assessment of 802.11 MAC layer channel estimators.
IEEE Commun. Lett., 2007

Some remarks on ld plots for heavy-tailed traffic.
Comput. Commun. Rev., 2007

Understanding 802.11e Voice Behaviour via Testbed Measurements and Modeling.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Analysis of ICMP Quotations.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

Verification of Common 802.11 MAC Model Assumptions.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

2006
Unwanted HTTP: Who Has the Time?
login Usenix Mag., 2006

On buffer sizing for voice in 802.11 WLANs.
IEEE Commun. Lett., 2006

Modeling 802.11 mesh networks.
IEEE Commun. Lett., 2006

Counting 6to4 relay routers.
Comput. Commun. Rev., 2006

A New MAC Scheme for Very High-Speed WLANs.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Modeling 802.11e for data traffic parameter design.
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006

2005
Security Through Obscurity: A Review of a Few of FreeBSD's Lesser-Known Security Capabilities.
login Usenix Mag., 2005

A Sinister View of Dilation Equations.
Int. J. Wavelets Multiresolution Inf. Process., 2005

TCP fairness in. 802.11e WLANs.
IEEE Commun. Lett., 2005

Modeling the 802.11 distributed coordination function in non-saturated conditions.
IEEE Commun. Lett., 2005

Experimental evaluation of TCP performance and fairness in an 802.11e test-bed.
Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, 2005

Modelling 802.11 Wireless Links.
Proceedings of the 44th IEEE IEEE Conference on Decision and Control and 8th European Control Conference Control, 2005

IPv6 network administration - teaching the turtle to dance.
O'Reilly, ISBN: 978-0-596-00934-2, 2005

2004
Guesswork and entropy.
IEEE Trans. Inf. Theory, 2004

The root of the matter: hints or slaves.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2002
Knowledge management: A model for organizational learning.
Int. J. Account. Inf. Syst., 2002

Recent Filesystem Optimisations on FreeBSD.
Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference, 2002


  Loading...