Jelena Mirkovic

According to our database1, Jelena Mirkovic authored at least 81 papers between 2000 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Using Episodic Memory for User Authentication.
ACM Trans. Priv. Secur., 2019

Grammatical Generalisation in Statistical Learning: Is it implicit and invariant across development?
Proceedings of the 41th Annual Meeting of the Cognitive Science Society, 2019

2018
Handling Anti-Virtual Machine Techniques in Malicious Software.
ACM Trans. Priv. Secur., 2018

DEW: Distributed Experiment Workflows.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

Malware Analysis Through High-level Behavior.
Proceedings of the 11th USENIX Workshop on Cyber Security Experimentation and Test, 2018

GuidedPass: Helping Users to Create Strong and Memorable Passwords.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Game experience preferences of people with chronic illnesses.
Proceedings of the 10th Nordic Conference on Human-Computer Interaction, Oslo, 2018

Leveraging Semantic Transformation to Investigate Password Habits and Their Causes.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

SENSS Against Volumetric DDoS Attacks.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Do you see me now? Sparsity in passive observations of address liveness.
Proceedings of the Network Traffic Measurement and Analysis Conference, 2017

Hiding debuggers from malware with apate.
Proceedings of the Symposium on Applied Computing, 2017

User and Stakeholder Requirements of eHealth Support Tool Viewed In a Self-Determination Theory Lens.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

RESECT: Self-Learning Traffic Filters for IP Spoofing Defense.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Commoner Privacy And A Study On Network Traces.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Good Automatic Authentication Question Generation.
Proceedings of the INLG 2016, 2016

Life-experience passwords (LEPs).
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

DETERLab and the DETER Project.
Proceedings of the GENI Book, 2016

2015
Evaluating Cybersecurity Education Interventions: Three Case Studies.
IEEE Security & Privacy, 2015

Evaluation Theory and Practice Applied to Cybersecurity Education.
IEEE Security & Privacy, 2015

Expressing Different Traffic Models Using the LegoTG Framework.
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

2014
Optimal application allocation on multiple public clouds.
Computer Networks, 2014

Cardinal Pill Testing of System Virtual Machines.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Class Capture-the-Flag Exercises.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

Safe and Automated Live Malware Experimentation on Public Testbeds.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

SENSS: observe and control your own traffic in the internet.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

SENSS: Software Defined Security Service.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

Critter: Content-Rich Traffic Trace Repository.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

Identifying eHealth literacy demands of health information seeking tasks.
Proceedings of the AMIA 2014, 2014

iDECIDE: A Mobile Application for Pre-Meal Insulin Dosing Using an Evidence Based Equation to Account for Patient Preferences.
Proceedings of the AMIA 2014, 2014

2013
Usability, Security, and Mobility for Mobile Devices in Healthcare Information Systems.
PhD thesis, 2013

Integrating Sensor Networks for Energy Monitoring with Service-Oriented Architectures.
IJDSN, 2013

Utilizing emerging technologies to promote more efficient face-to-face patient-clinician communication.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Nap-related consolidation in learning the grammar and vocabulary of a novel language.
Proceedings of the 35th Annual Meeting of the Cognitive Science Society, 2013

2012
Teaching Cybersecurity with DeterLab.
IEEE Security & Privacy, 2012

Beyond Disk Imaging for Preserving User State in Network Testbeds.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

A framework for the development of ubiquitous patient support systems.
Proceedings of the 6th International Conference on Pervasive Computing Technologies for Healthcare, 2012

Enabling the usage of sensor networks with service-oriented architectures.
Proceedings of the Seventh International Workshop on Middleware for Sensor Networks, 2012

Reducing allocation errors in network testbeds.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

2011
Collaborative DoS Defenses.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Comparative Evaluation of Spoofing Defenses.
IEEE Trans. Dependable Sec. Comput., 2011

Rules Versus Statistics: Insights From a Highly Inflected Language.
Cognitive Science, 2011

A Semantic Framework for Data Analysis in Networked Systems.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Semantic Regularities in Grammatical Categories: Learning Grammatical Gender in an Artificial Language.
Proceedings of the 33th Annual Meeting of the Cognitive Science Society, 2011

2010
Tools for worm experimentation on the DETER testbed.
IJCNDS, 2010

2009
Accurately Measuring Denial of Service in Simulation and Testbed Experiments.
IEEE Trans. Dependable Sec. Comput., 2009

Incrementality and Prediction in Human Sentence Processing.
Cognitive Science, 2009

Tools for worm experimentation on the DETER testbed.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Modeling Human Behavior for Defense Against Flash-Crowd Attacks.
Proceedings of IEEE International Conference on Communications, 2009

RAD: Reflector Attack Defense Using Message Authentication Codes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise.
IEEE Trans. Computers, 2008

Learning the valid incoming direction of IP packets.
Computer Networks, 2008

On Performance of MIMO Link Adaptation in the Presence of Channel Uncertainty.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

Theoretical Analysis of Saturation Throughput in MU-DCF.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Managing the Health of Security Experiments.
Proceedings of the Workshop on Cyber Security and Test, 2008

Correcting congestion-based error in network telescope's observations of worm dynamics.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

Combining Speak-Up with DefCOM for Improved DDoS Defense.
Proceedings of IEEE International Conference on Communications, 2008

Privacy-safe network trace sharing via secure queries.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
Building Reputations for Internet Clients.
Electr. Notes Theor. Comput. Sci., 2007

A MAC Protocol for MIMO Based IEEE 802.11 Wireless Local Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Automating DDoS Experimentation.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

When is service really denied?: a user-centric dos metric.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

A Centralized MAC Protocol with QoS Support for Wireless LANs.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

A MAC Protocol with Multi-User MIMO Support for Ad-Hoc WLANs.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Towards user-centric metrics for denial-of-service measurement.
Proceedings of the Workshop on Experimental Computer Science, 2007

2006
A realistic simulation of internet-scale events.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006

MIMO Link Modeling for System Level Simulations.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Profiling and Clustering Internet Hosts.
Proceedings of the 2006 International Conference on Data Mining, 2006

Measuring denial Of service.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

A Framework for a Collaborative DDoS Defense.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
D-WARD: A Source-End Defense against Flooding Denial-of-Service Attacks.
IEEE Trans. Dependable Sec. Comput., 2005

Distributed Worm Simulation with a Realistic Internet Model.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

2004
A taxonomy of DDoS attack and DDoS defense mechanisms.
Computer Communication Review, 2004

Performance evaluation for IEEE 802.11G hot spot coverage using sectorised antennas.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

2003
Alliance formation for DDoS defense.
Proceedings of the New Security Paradigms Workshop 2003, 2003

Source-End DDoS Defense.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

DefCOM: Defensive Cooperative Overlay Mesh.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
SAVE: Source Address Validity Enforcement Protocol.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Attacking DDoS at the Source.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

2001
A self-organizing approach to data forwarding in large-scale sensor networks.
Proceedings of the IEEE International Conference on Communications, 2001

2000
Genetic Search Based on Multiple Mutations.
IEEE Computer, 2000


  Loading...