Karen R. Sollins

Orcid: 0000-0003-3686-4065

According to our database1, Karen R. Sollins authored at least 39 papers between 1981 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Speranza: Usable, Privacy-friendly Software Signing.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Measuring and Analyzing DoS Flooding Experiments.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

Context Matters: Accurately Measuring the Efficacy of Denial-of-Service Mitigations.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

2021
Using proof-of-work to mitigate spoofing-based denial of service attacks.
Proceedings of the CoNEXT-SW '21: Proceedings of the CoNEXT Student Workshop, 2021

2019
IoT Big Data Security and Privacy Versus Innovation.
IEEE Internet Things J., 2019

2018
MNDN: scalable mobility support in named data networking.
Proceedings of the 5th ACM Conference on Information-Centric Networking, 2018

2012
Pervasive persistent identification for information centric networking.
Proceedings of the ICN'12, 2012

2011
Data Delivery Properties of Human Contact Networks.
IEEE Trans. Mob. Comput., 2011

Challenges to Privacy in Social Networking Mashups: Social TV as a Case Study.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

2010
Arguments for an information-centric internetworking architecture.
Comput. Commun. Rev., 2010

2009
Delivery Properties of Human Social Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

An architecture for network management.
Proceedings of the 2009 workshop on Re-architecting the internet, ReArch@CoNEXT 2009, 2009

2008
Managing the Health of Security Experiments.
Proceedings of the Workshop on Cyber Security and Test, 2008

An Internet Protocol Address Clustering Algorithm.
Proceedings of the Third Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, 2008

Exploiting Transport-Level Characteristics of Spam.
Proceedings of the CEAS 2008, 2008

2007
Dependency-based Distributed Intrusion Detection.
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007, 2007

Effective keyword-based selection of relational databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

Architecting Citywide Ubiquitous Wi-Fi Access.
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007

2006
SVM learning of IP address structure for latency prediction.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006

2005
Tussle in cyberspace: defining tomorrow's internet.
IEEE/ACM Trans. Netw., 2005

2004
Implementing aggregation and broadcast over Distributed Hash Tables.
Comput. Commun. Rev., 2004

Exploiting Autonomous System Information in Structured Peer-to-Peer Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2003
Network research: exploration of dimensions and scope.
Comput. Commun. Rev., 2003

Designing for scale and differentiation.
Comput. Commun. Rev., 2003

Addressing reality: an architectural response to real-world demands on the evolving Internet.
Comput. Commun. Rev., 2003

2002
AFBV: a scalable packet classification algorithm.
Comput. Commun. Rev., 2002

2000
Context and Goals for Common Name Resolution.
RFC, October, 2000

1998
Architectural Principles of Uniform Resource Name Resolution.
RFC, January, 1998

Expanding and Extending the Security Features of Java.
Proceedings of the 7th USENIX Security Symposium, 1998

1996
Linking in a Global Information Architecture.
World Wide Web J., 1996

Supporting Longevity in an Information Infrastructure Architecture.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

1995
Report of the IAB Workshop on Internet Information Infrastructure, October 12-14, 1994.
RFC, November, 1995

1994
Functional Requirements for Uniform Resource Names.
RFC, December, 1994

1992
Towards Security in an Open Systems Federation.
Proceedings of the Computer Security, 1992

1989
Plan for Internet directory services.
RFC, July, 1989

1988
Cascaded authentication.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

Submission to the European SIGOPS workshop, 1988.
Proceedings of the 3rd ACM SIGOPS European Workshop: Autonomy or Interdependence in Distributed Systems? Cambridge, 1988

1981
TFTP Protocol (revision 2).
RFC, June, 1981

Copying Structured Objects in a Distributed System.
Comput. Networks, 1981


  Loading...