Randy C. Marchany

Orcid: 0000-0002-9048-3872

According to our database1, Randy C. Marchany authored at least 48 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The current state of cryptocurrency forensics.
Forensic Sci. Int. Digit. Investig., September, 2023

2018
Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things.
IEEE Wirel. Commun. Lett., 2018

Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Privacy Preserving Network Security Data Analytics: Architectures and System Design.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Designing a Micro-Moving Target IPv6 Defense for the Internet of Things.
Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, 2017

Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

2016
Speed isn?t Enough: Usability and Adoption of an Optimized Alert Notification System.
IEEE Technol. Soc. Mag., 2016

Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities.
J. Electr. Comput. Eng., 2016

Modeling network based moving target defense impacts through simulation in Ns-3.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Malware propagation in fully connected networks: A netflow-based analysis.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

2015
Utilizing the BitTorrent DHT for blind rendezvous and information exchange.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Attention: moving target defense networks, <i>how well are you moving?</i>.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015

2014
Scaling IPv6 address bindings in support of a moving target defense.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Designing an Optimized Alert System Based on Geospatial Location Data.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
Using transport layer multihoming to enhance network layer moving target defenses.
Proceedings of the Cyber Security and Information Intelligence, 2013

Optimizing a network layer moving target defense for specific system architectures.
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013

2012
The Blind Man's Bluff Approach to Security Using IPv6.
IEEE Secur. Priv., 2012

Advancing the defense in depth model.
Proceedings of the 7th International Conference on System of Systems Engineering, 2012

Leveraging Cognitive Principles to Improve Security Visualization.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Validating a custom IPv6 security application using OPNET modeler.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Using an IPv6 moving target defense to protect the Smart Grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Dynamic analysis of large datasets with animated and correlated views: VAST 2012 Mini Challenge # award: Honorable mention for good use of coordinated displays.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2011
What DHCPv6 says about you.
Proceedings of the 2011 World Congress on Internet Security, 2011

MT6D: A Moving Target IPv6 Defense.
Proceedings of the MILCOM 2011, 2011

Cover-VT: Converged Security Visualization Tool.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

IPv6: Nowhere to Run, Nowhere to Hide.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

The Good, the Bad, the IPv6.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

2010
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

The privacy implications of stateless IPv6 addressing.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Using geographic information systems for enhanced network security visualization.
Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application, 2010

2009
Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols.
IEEE Trans. Veh. Technol., 2009

Simulating the Deployment of Battery-Sensing Intrusion Protection Systems.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Mobile Device Profiling and Intrusion Detection Using Smart Batteries.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks.
IEEE Trans. Parallel Distributed Syst., 2007

Internet Security: Intrusion Detection and Prevention in Mobile Systems.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Using Battery Constraints within Mobile Hosts to Improve Network Security.
IEEE Secur. Priv., 2006

RIM: Router Interface Marking for IP Traceback.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Ubiquitous Security: Privacy versus Protection.
Proceedings of the 2006 International Conference on Pervasive Systems & Computing, 2006

2004
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Reflections on Operating in Hostile Environments.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
CANDI: A System for Classifying the Security Risks in Network Appliances.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
E-commerce Security Issues.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Minitrack Introduction.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

1992
A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer.
Proceedings of the 1992 International Computer Music Conference, 1992


  Loading...