Thomas Moyer

According to our database1, Thomas Moyer authored at least 33 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Defeasible-PROV: Conflict Resolution in Smart Building Devices.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Detecting VoIP Data Streams: Approaches Using Hidden Representation Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning.
CoRR, 2022

Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing.
Proceedings of the 21st IEEE International Symposium on Network Computing and Applications, 2022

Flurry: A Fast Framework for Provenance Graph Generation for Representation Learning.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
PROV-GEM: Automated Provenance Analysis Framework using Graph Embeddings.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS Attack.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2019
Detecting Safety and Security Faults in PLC Systems with Data Provenance.
CoRR, 2019

IoTC<sup>2</sup>: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems.
CoRR, 2018

Curator: Provenance Management for Modern Distributed Systems.
Proceedings of the 10th USENIX Workshop on the Theory and Practice of Provenance, 2018

Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Runtime Analysis of Whole-System Provenance.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Taming the Costs of Trustworthy Provenance through Policy Reduction.
ACM Trans. Internet Techn., 2017

Transparent Web Service Auditing via Network Provenance Functions.
Proceedings of the 26th International Conference on World Wide Web, 2017

Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

Practical whole-system provenance capture.
Proceedings of the 2017 Symposium on Cloud Computing, SoCC 2017, Santa Clara, CA, USA, 2017

2016
Navy Enhanced Sierra Mechanics (NESM): Toolbox for Predicting Navy Shock and Damage.
Comput. Sci. Eng., 2016

High-throughput Ingest of Provenance Records into Accumulo.
CoRR, 2016

Retrofitting Applications with Provenance-Based Security Monitoring.
CoRR, 2016

Leveraging Data Provenance to Enhance Cyber Resilience.
Proceedings of the IEEE Cybersecurity Development, 2016

High-throughput ingest of data provenance records into Accumulo.
Proceedings of the 2016 IEEE High Performance Extreme Computing Conference, 2016

Bootstrapping and maintaining trust in the cloud.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Trustworthy Whole-System Provenance for the Linux Kernel.
Proceedings of the 24th USENIX Security Symposium, 2015

Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs.
Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance, 2015

2012
Scalable Web Content Attestation.
IEEE Trans. Computers, 2012

Scalable Integrity-Guaranteed AJAX.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Network-Based Root of Trust for Installation.
IEEE Secur. Priv., 2011

2010
New Security Architectures Based on Emerging Disk Functionality.
IEEE Secur. Priv., 2010

An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Configuration management at massive scale: system design and experience.
IEEE J. Sel. Areas Commun., 2009

Justifying Integrity Using a Virtual Machine Verifier.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...