José Carlos Brustoloni

Affiliations:
  • Bell Labs


According to our database1, José Carlos Brustoloni authored at least 37 papers between 1994 and 2010.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2010
In-network server-directed client authentication and packet classification.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Using reinforcement to strengthen users' secure behaviors.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
Bayesian bot detection based on DNS traffic similarity.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Secure web-based retrieval of documents with usage controls.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Efficient Detection of Bots in Subscribers' Computers.
Proceedings of IEEE International Conference on Communications, 2009

2008
Evaluating the usability of usage controls in electronic collaboration.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Updates and Asynchronous Communication in Trusted Computing Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Improving security decisions with polymorphic and audited dialogs.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

Automatically Segregating Greedy and Malicious Internet Flows.
Proceedings of IEEE International Conference on Communications, 2007

Uclinux: a linux security module for trusted-computing-based usage controls enforcement.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
Laboratory experiments for network security instruction.
ACM J. Educ. Resour. Comput., 2006

Intellectual Property Protection in Collaborative Design through Lean Information Modeling and Sharing.
J. Comput. Inf. Sci. Eng., 2006

RideSharing: Fault Tolerant Aggregation in Sensor Networks Using Corrective Actions.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Secure-CITI Critical Information-Technology Infrastructure.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

2005
Hardening Web browsers against man-in-the-middle and eavesdropping attacks.
Proceedings of the 14th international conference on World Wide Web, 2005

Using Secure Coprocessors to Protect Access to Enterprise Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Automatic VPN Client Recovery from IPsec Pass-through Failures.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Secure and flexible support for visitors in enterprise Wi-Fi networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Detecting and Blocking Unauthorized Access in Wi-Fi Networks.
Proceedings of the NETWORKING 2004, 2004

2002
Protecting electronic commerce from distributed denial-of-service attacks.
Proceedings of the Eleventh International World Wide Web Conference, 2002

2000
MicroISPs: providing convenient and low-cost high-bandwidth Internet access.
Comput. Networks, 2000

Signaled Receiver Processing.
Proceedings of the General Track: 2000 USENIX Annual Technical Conference, 2000

Building appliances out of components using Pebble.
Proceedings of the 9th ACM SIGOPS European Workshop, 2000

Application-Independent End-to-End Security in Shared-Link Access Networks.
Proceedings of the NETWORKING 2000, 2000

1999
User-level billing and accounting in IP networks.
Bell Labs Tech. J., 1999

The Pebble Component-Based Operating System.
Proceedings of the 1999 USENIX Annual Technical Conference, 1999

Retrofitting Quality of Service into a Time-Sharing Operating System.
Proceedings of the 1999 USENIX Annual Technical Conference, 1999

Interoperation of Copy Avoidance in Network and File I/O.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

Disk Scheduling with Quality of Service Guarantees.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Pebble: A Component-based Operating System for Embedded Applications.
Proceedings of the USENIX Workshop on Embedded Systems 1999, 1999

1998
User-Level Protocol Servers with Kernel-Level Performance.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

1997
Copy Emulation in Checksummed, Multiple-Packet Communication.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Effects of Buffering Semantics on I/O Performance.
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996

1994
Exposed Buffering and Sub-Datagram Flow Control for ATM LANs.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994


  Loading...