Paul Judge

According to our database1, Paul Judge authored at least 15 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Data-Driven Modelling for Harmonic Current Emission in Low-Voltage Grid Using MCReSANet with Interpretability Analysis.
CoRR, 2023

Comparison of Control Structures for Fault Current Injection and Energy Balancing in MMC-HVDC.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023

Voltage Support and Electrical Stresses in MMC-HVDC Systems during AC Faults.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2023

2008
VISOR: VoIP Security Using Reputation.
Proceedings of IEEE International Conference on Communications, 2008

Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data.
Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition, 2008

2007
Analyzing Network and Content Characteristics of Spim Using Honeypots.
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007

Taxonomy of Email Reputation Systems.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

2006
Fast and Effective Spam Sender Detection with Granular SVM on Highly Imbalanced Mail Server Behavior Data.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Understanding and Reversing the Profit Model of Spam.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

2003
Security issues and solutions in multicast content distribution: a survey.
IEEE Netw., 2003

A reputation system for peer-to-peer networks.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2003

CITADEL: a content protection architecture for decentralized peer-to-peer file sharing systems.
Proceedings of the Global Telecommunications Conference, 2003

2002
WHIM: watermarking multicast video with a hierarchy of intermediaries.
Comput. Networks, 2002

Gothic: A Group Access Control Architecture for Secure Multicast and Anycast.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

HySOR: group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002


  Loading...