Lisa M. Marvel

According to our database1, Lisa M. Marvel authored at least 38 papers between 1996 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Packet Header Obfuscation Using MIMO.
IEEE/ACM Trans. Netw., 2020

2019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud.
IEEE/ACM Trans. Netw., 2019

2018
Off-Path TCP Exploits of the Challenge ACK Global Rate Limit.
IEEE/ACM Trans. Netw., 2018

A Framework for MIMO-based Packet Header Obfuscation.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Malicious co-residency on the cloud: Attacks and defense.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A Theoretical Exploration of the Impact of Packet Loss on Network Intrusion Detection.
Int. J. Networked Distributed Comput., 2016

Off-Path TCP Exploits: Global Rate Limit Considered Dangerous.
Proceedings of the 25th USENIX Security Symposium, 2016

Agility maneuvers to mitigate inference attacks on sensed location data.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

ACyDS: An adaptive cyber deception system.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

CyberVAN: A Cyber Security Virtual Assured Network testbed.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Enabling reproducible cyber research - four labeled datasets.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Cyber Fighter Associate: A Decision Support System for cyber agility.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
A framework to evaluate cyber agility.
Proceedings of the 34th IEEE Military Communications Conference, 2015

To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
A comparison of two hands-on laboratory experiences in computers, networks and cyber security for 10th-12th graders (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Towards self-healing smartphone software via automated patching.
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014


2012
Detecting clustering in streams.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Large scale MANET emulations using U.S. Army waveforms with application: VoIP.
Proceedings of the MILCOM 2011, 2011

Detecting clustering in binary sequences.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2009
Using adaptive lossless compression to characterize network traffic.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

Using XACML for Embedded and Fine-Grained Access Control Policy.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Rate insensitive steganalysis of +/-1 embedding in images.
Proceedings of the International Conference on Image Processing, 2008

Integrated mandatory access control for digital data.
Proceedings of the Data Mining, 2008

Fusing rate-specific SVM Classifiers for +/-1 embedding steganalysis.
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008

2007
Steganalysis of ±1 Embedding using Lossless Image Compression.
Proceedings of the International Conference on Image Processing, 2007

Lossless Compression-Based Steganalysis of LSB Embedded Images.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

2006
Compression-based steganalysis of LSB embedded images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

Q-ary Piecewise Linear Noise Modulation.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Enabling control over adaptive program transformation for dynamically evolving mobile software validation.
ACM SIGSOFT Softw. Eng. Notes, 2005

2003
A Framework for Tamper Detection Marking of Mobile Applications.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

2002
Bandwidth Efficient Tamper Detection for Distributed Java Systems.
Proceedings of the 16th Annual International Symposium on High Performance Computing Systems and Applications, 2002

2000
Compression-compatible fragile and semifragile tamper detection.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

1999
Robust source coding of images for very noisy channels.
IEEE Trans. Signal Process., 1999

Spread spectrum image steganography.
IEEE Trans. Image Process., 1999

1998
Reliable Blind Information Hiding for Images.
Proceedings of the Information Hiding, 1998

Hiding Information in Images.
Proceedings of the 1998 IEEE International Conference on Image Processing, 1998

1996
Robust source coding for images over very noisy channels.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996


  Loading...