William Yurcik

Affiliations:
  • University of Illinois, USA


According to our database1, William Yurcik authored at least 98 papers between 1998 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2008
Stochastic Process Models for Packet/Analytic-Based Network Simulations.
Proceedings of the 22st International Workshop on Principles of Advanced and Distributed Simulation, 2008

Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

The SCRUB security data sharing infrastructure.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case.
Proceedings of the The Third International Conference on Availability, 2008

2007
If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration.
Interactions, 2007

Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs
CoRR, 2007

SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

2006
Security Assessment of E-Tax Filing Websites
CoRR, 2006

UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
CoRR, 2006

NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security)
CoRR, 2006

Using SMART for Customized Monitoring of Windows Services
CoRR, 2006

SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting
CoRR, 2006

The Evolution of Cyberinsurance
CoRR, 2006

Tool update: <i>NVisionIP</i> improvements (difference view, sparklines, and shapes).
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

Tool update: <i>visflowconnect-IP</i> with advanced filtering from usability testing.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

A statistical analysis of disclosed storage security breaches.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006

Outsourcing Security Analysis with Anonymized Logs.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

<i>VisFlowCluster-IP</i>: Connectivity-Based Visual Clustering of Network Hosts.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection Standards.
Proceedings of the 2006 IEEE International Symposium on Secure Software Engineering, 2006

A survey of PKI components and scalability issues.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Multiple design patterns for voice over IP (VoIP) security.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

An implementation-independent threat model for group communications.
Proceedings of the Data Mining, 2006

NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006

Security Issues in On-Demand Grid and Cluster Computing.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Reputation and Dispute in eBay Transactions.
Int. J. Electron. Commer., 2005

Defining a Comprehensive Threat Model for High Performance Computational Clusters
CoRR, 2005

Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut
CoRR, 2005

A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market
CoRR, 2005

Multiring techniques for scalable battlespace group communications.
IEEE Commun. Mag., 2005

Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

Cyber-insurance As A Market-Based Solution To The Problem Of Cybersecurity.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

The 'Little Man Storage' model.
Proceedings of the 2005 workshop on Computer architecture education, 2005

Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

The evolution of storage service providers: techniques and challenges to outsourcing storage.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Toward a threat model for storage systems.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Protecting multimedia data in storage: a survey of techniques emphasizing encryption.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005

Tamper-resistant storage techniques for multimedia systems.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005

The techniques and challenges of immutable storage with applications in multimedia.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005

Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions.
Proceedings of the 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST 2005), 2005

Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

A First Step Towards Call Survivability in Cellular Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Clusters and security: distributed security for distributed systems.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization
CoRR, 2004

A Distributed Economics-based Infrastructure for Utility Computing
CoRR, 2004

NVisionCC: a visualization framework for high performance cluster security.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

VisFlowConnect: netflow visualizations of link relationships for security situational awareness.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

NVisionIP: netflow visualizations of system state for security situational awareness.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

NVisionIP: an interactive network flow visualization tool for security.
Proceedings of the IEEE International Conference on Systems, 2004

VRing: A Case for Building Application-Layer Multicast Rings (Rather Than Trees).
Proceedings of the 12th International Workshop on Modeling, 2004

Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

VisFlowConnect: providing security situational awareness by visualizing network traffic flows.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003.
Proceedings of the ICETE 2004, 2004

Visualization Tools for Security Administrators.
Proceedings of the Financial Cryptography, 2004

2003
Using theoretical computer simulators for formal languages and automata theory.
ACM SIGCSE Bull., 2003

Log Correlation for Intrusion Detection: A Proof of Concept.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Software technology issues for a US National Missile Defense System.
IEEE Technol. Soc. Mag., 2002

Special issue on specialized computer architecture simulators that see the present and may hold the future.
ACM J. Educ. Resour. Comput., 2002

A survey of web resources for teaching computer architecture.
Proceedings of the 2002 workshop on Computer architecture education, 2002

PECTOPAH: promoting education in computer technology using an open-ended pedagogically adaptable hierarchy.
Proceedings of the 2002 workshop on Computer architecture education, 2002

How computers really work: a children's guide.
Proceedings of the 2002 workshop on Computer architecture education, 2002

Teaching computer organization/architecture with limited resources using simulators.
Proceedings of the 33rd SIGCSE Technical Symposium on Computer Science Education, 2002

Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Ethical hacking: the security justification redux.
Proceedings of the 2002 International Symposium on Technology and Society, 2002

Internet honeypots: protection or entrapment?
Proceedings of the 2002 International Symposium on Technology and Society, 2002

Internet hack back: counter attacks as self-defense or vigilantism?
Proceedings of the 2002 International Symposium on Technology and Society, 2002

2001
Achieving Fault-Tolerant Software with Rejuvenation and Reconfiguration.
IEEE Softw., 2001

The Simulation Education Homepage.
Simul., 2001

Distributed expertise for teaching computer organization & architecture.
ACM SIGCSE Bull., 2001

Editorial.
ACM J. Educ. Resour. Comput., 2001

Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim.
ACM J. Educ. Resour. Comput., 2001

Internet Attacks: A Policy Framework for Rules of Engagement
CoRR, 2001

A crowd of little man computers: visual computer simulator teaching tools.
Proceedings of the 33nd conference on Winter simulation, 2001

PingTV: A Case Study in Visual Network Monitoring.
Proceedings of the 12th IEEE Visualization Conference, 2001

A web-based little man computer simulator.
Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, 2001

Network Management Visualization with PingTV.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Application-Level Survivable Software: rFTP Proof-of-Concept .
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

2000
A survivability framework for connection-oriented group communications.
Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 2000

The use of hop-limits to provide survivable ATM group communications.
Proceedings of the Networked Group Communication, 2000

A Virtual Private Network Deployment Framework.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Open Source Versus Commercial Firewalls: Functional Comparison.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Distributed Weakness in Virtual Private Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Providing guaranteed assurance to connection-oriented group communications using disjoint routing.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

A layered framework strategy for deploying high assurance VPNs.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

1999
Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings.
Proceedings of the Networked Group Communication, 1999

1998
Providing ATM Multipoint Survivability Via Disjoint VC Mesh Backup Groups.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998


  Loading...