Joseph G. Tront

Affiliations:
  • Virginia Tech, Blacksburg, VA, USA


According to our database1, Joseph G. Tront authored at least 72 papers between 1979 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things.
IEEE Wirel. Commun. Lett., 2018

Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Privacy Preserving Network Security Data Analytics: Architectures and System Design.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Spark on the ARC: Big data analytics frameworks on HPC clusters.
Proceedings of the Practice and Experience in Advanced Research Computing 2017: Sustainability, 2017

System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Designing a Micro-Moving Target IPv6 Defense for the Internet of Things.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

MARCS: mobile augmented reality for cybersecurity.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2016
Speed isn?t Enough: Usability and Adoption of an Optimized Alert Notification System.
IEEE Technol. Soc. Mag., 2016

Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities.
J. Electr. Comput. Eng., 2016

Modeling network based moving target defense impacts through simulation in Ns-3.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Energy efficiency of Zipf traffic distributions within Facebook's data center fabric architecture.
Proceedings of the 25th International Workshop on Power and Timing Modeling, 2015

Utilizing the BitTorrent DHT for blind rendezvous and information exchange.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Tablet PCs and slate devices can improve active learning classroom experiences.
Proceedings of the International Conference on Interactive Collaborative Learning, 2015

Attention: moving target defense networks, <i>how well are you moving?</i>.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Scaling IPv6 address bindings in support of a moving target defense.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Designing an Optimized Alert System Based on Geospatial Location Data.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Developing and evaluating active learning classroom experiences with tablet PCs and slate devices: Half-day tutorial.
Proceedings of the IEEE Frontiers in Education Conference, 2014

Learning from the Best: How award-winning courseware has impacted engineering education.
Proceedings of the IEEE Frontiers in Education Conference, 2014

Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Using transport layer multihoming to enhance network layer moving target defenses.
Proceedings of the Cyber Security and Information Intelligence, 2013

Optimizing a network layer moving target defense for specific system architectures.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
The Blind Man's Bluff Approach to Security Using IPv6.
IEEE Secur. Priv., 2012

Advancing the defense in depth model.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

Leveraging Cognitive Principles to Improve Security Visualization.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Validating a custom IPv6 security application using OPNET modeler.
Proceedings of the 31st IEEE Military Communications Conference, 2012

A tale of two studies: is dissemination working?
Proceedings of the 12th ACM/IEEE-CS Joint Conference on Digital Libraries, 2012

Using an IPv6 moving target defense to protect the Smart Grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Developing a plug-in tool to make OneNote an e-textbook.
Proceedings of the Second International Workshop on Developing Tools as Plug-Ins, 2012

2011
What DHCPv6 says about you.
Proceedings of the 2011 World Congress on Internet Security, 2011

MT6D: A Moving Target IPv6 Defense.
Proceedings of the MILCOM 2011, 2011

Cover-VT: Converged Security Visualization Tool.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

IPv6: Nowhere to Run, Nowhere to Hide.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Work in progress - Improving the dissemination of CCLI (TUES) educational innovations.
Proceedings of the 2011 Frontiers in Education Conference, 2011

Mini workshop - How to improve teaching and learning: Selecting, implementing and evaluating digital resources in the Engineering Pathway.
Proceedings of the 2011 Frontiers in Education Conference, 2011

Workshop - Developing active learning classroom exercises for use with Tablet PCs.
Proceedings of the 2011 Frontiers in Education Conference, 2011

Work in progress - The process of evaluating the impact of an international experience on students' global engineering skills.
Proceedings of the 2011 Frontiers in Education Conference, 2011

The Good, the Bad, the IPv6.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

2010
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

The privacy implications of stateless IPv6 addressing.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
WriteOn1.0: a tablet PC-based tool for effective classroom instruction.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009

Simulating the Deployment of Battery-Sensing Intrusion Protection Systems.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Mobile Device Profiling and Intrusion Detection Using Smart Batteries.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Facilitating Pedagogical Practices through a Large-Scale Tablet PC Deployment.
Computer, 2007

Internet Security: Intrusion Detection and Prevention in Mobile Systems.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
WriteOn: a tool for classroom presentations on tablet PCs.
Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2006

Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Ubiquitous Security: Privacy versus Protection.
Proceedings of the 2006 International Conference on Pervasive Systems & Computing, 2006

2004
Implementation Issues on the Quality Evaluation ofWeb-Based Courses and Digital Learning Resources.
Proceedings of the Advances in Web-Based Learning, 2004

Internet Security: Intrusion Detection and Prevention: Minitrack Introduction.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Design and Implementation of a Configurable Platform for Embedded Communication Systems.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

CANDI: A System for Classifying the Security Risks in Network Appliances.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
E-commerce Security Issues.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Minitrack Introduction.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

2001
Synchronized Streaming Media in VLSI Education.
Proceedings of the 2001 International Conference on Microelectronics Systems Education, 2001

1999
A Development System for Creating Real-time Machine Vision Hardware using Field Programmable Gate Arrays.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1996
FX: a fast approximate fault simulator for the switch-level using VHDL.
IEEE Trans. Very Large Scale Integr. Syst., 1996

1995
Parallel Switch-Level Fault Simulation Performance Modeling using VHDL.
Simul., 1995

MORRPH: a modular and reprogrammable real-time processing hardware.
Proceedings of the 3rd IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM '95), 1995

1994
Block-Level Logic Extraction from CMOS VLSI Layouts.
VLSI Design, 1994

VHDL switch level fault simulation.
Proceedings of the Proceedings EURO-DAC'94, 1994

1993
On parallel switch level fault simulation.
Proceedings of the 11th IEEE VLSI Test Symposium (VTS'93), 1993

Parallel switch level fault simulation algorithm/complexity verification using compiled code VHDL.
Proceedings of the Fourth International Workshop on Rapid System Prototyping, 1993

1992
A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer.
Proceedings of the 1992 International Computer Music Conference, 1992

1991
BIDES: A BIST design expert system.
J. Electron. Test., 1991

1988
On using signature registers as pseudorandom pattern generators in built-in self-testing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1988

Automatic Insertion of BIST Hardware Using VHDL.
Proceedings of the 25th ACM/IEEE Conference on Design Automation, 1988

1986
Design and construction of a multiplexed electrode for monitoring evoked responses in cerebral cortex.
Proceedings of the IEEE International Conference on Acoustics, 1986

1985
Parallel Computer Architectures and Problem Solving Strategies for the Consistent Labeling Problem.
IEEE Trans. Computers, 1985

1979
A Design for Multiple-Valued Logic Gates Based on MESFET's.
IEEE Trans. Computers, 1979


  Loading...