M. Garip, M. Gursoy, P. Reiher, M. Gerla, "Scalable Reactive Vehicle-to-Vehicle Congestion Avoidance Mechanism,"
First International Workshop on Vehicular Networking and Intelligent Transportation Systems, January 2015. Available as VENIT_2015.pdf
Vahab Pournaghshband, S. Hashemzadeh, and Peter Reiher, "How To Detect Middleboxes: Guidelines on a Methodology,"
Sixth International Conference on Network and Communications Security, December 2014. Available as NCS14.pdf
Vahab Pournaghshband, D. Meyer, M. Holyland, M. Sarrafzadeh, and Peter Reiher, "Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices,"
Workshop on Usable Mobile Security, December 2014. Available as wums14_paper.pdf
Vahab Pournaghshband, Alex Afanaseyev, and Peter Reiher, "End-to-End Detection of Compression of Traffic Flows by Intermediaries,"
IEEE/IFIP Network Operations and Management Symposium (NOMS), May 2014. Available as compression_detection.pdf
Vahab Pournaghshband, "Teaching the Security Mindset to CS 1 Students,"
44th ACM Technical Symposium on Computer Science Education (ACM SIGCSE), March 2013. Available as cs_education_paper.pdf
Nam Nguyen, Leonard Kleinrock, and Peter Reiher, "Debugging Ubiquitous Computing Applications With the Interaction Analyzer,"
International Journal on Advances in Software, vol. 5, no. 34, December 2012. Available as interaction_analyzer_journal.pdf
Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher, "Securing Legacy Mobile Medical Devices,"
3rd International Conference on Wireless Mobile Communication and Healthcare (MobiHealth), November 2012. Available as securing_medical_devices.pdf
Charles Fleming, Peter Peterson, Erik Kline, and Peter Reiher, "Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies,"
ICC 2012, June 2012. Available as icc_12_data_tethers.pdf
Vahab Pournaghshband, Leonard Kleinrock, Peter Reiher, and Alex Afanaseyev, "Controlling Applications by Managing Network Characteristics,"
IEEE Communication and Information Systems Security Symposium (ICC), June 2012. Available as dissuade.pdf
Nam Nguyen, Leonard Kleinrock, and Peter Reiher, "The Interaction Analyzer: A Tool for Debugging Ubiquitous Computing Applications ,"
UBICOMM, November 2011. Best Paper Award. Available as interaction analyzer 2011.pdf
Erik Kline, Alex Afanaseyev, and Peter Reiher, "Shield: DoS Filtering Using Traffic Deflection," Second International Workshop on Security and
Trust in the Future Internet (FIST), October 2011. Available as shield.pdf
Peter Peterson, Digvijay Singh, William Kaiser, and Peter Reiher, "Investigating Energy and Security Trade-offs in the Classroom
with the Atom LEAP Testbed," Workshop on Computer Security Education and Testbeds, August 2011. Available as CSET-LEAP-2011.pdf
Peter Peterson and Peter Reiher, "Security Exercises for the Online Classroom with DETER," Workshop on Computer Security Eduction and
Testbeds, August 2010. Available as cset-paper-2010rad.pdf
Alex Afanaseyev, Neil Tilley, Peter Reiher, and Leonard Kleinrock, "Host-To-Host Congestion Control for TCP," IEEE Communications
Surveys and Tutorials, Vol 12, No. 3, Third Quarter 2010. Available as TCP-congestion-control.pdf
Erik Kline, Matthew Beaumont-Gay, Jelena Mirkovic, and Peter Reiher, "RAD: Reflector Attack Defense Using Message Authentication Codes,"
Annual Computer Security Applications Conference (ACSAC), December 2009. Available as acsac 2009.pdf.
Erik Kline and Peter Reiher, "Securing Data Through Avoidance Routing," New Security Paradigms Workshop, September 2009. Available as nspw09.pdf
Jelena Mirkovic, Alefiya Hussain, Sonia Fahmy, Peter Reiher, and Roshan Tomas,"Accurately Measuring Denial of Service
in Simulation and Testbed Experiments," IEEE Transactions on Dependable and Secure Computing, Vol. 6, No. 2,
April-June 2009. Available as TDSC-2008-04-069.pdf.
Venkata Ramakrishna, Peter Reiher, and Leonard Kleinrock, "Distributed Policy Resolution Through Negotiation in
Ubiquitous Computing Environments," PerCom 2009. Available as Percom_2009_Distributed_Policy_Resolution.pdf
Jelena Mirkovic, Sonia Fahmy, Peter Reiher, and Roshan Thomas, "How to Test DoS Defenses," Cybersecurity
Applications and Technologies Conference for Homeland Security (CATCH09), March 2009. Available as catch-ddos-2009.pdf
J. Mirkovic and P. Reiher, “Building Accountability into the Future Internet,”NPSec 2008, October 2008. Available as npsec 2008.pdf
K. Eustice, A. M. Jourabchi, J. Stoops, and P. Reiher, “Improving User Satisfaction in a Ubiquitous Computing Application,”
SAUCE 2008, October 2008. Available as SAUCE 2008.pdf
Da Silva 08
T. Da Silva, K. Eustice, and P. Reiher, “Johnny Appleseed: Wardriving to Reduce Interference in Chaotic Wireless
Deployments,” MSWIM, October 2008. Available as Johnny_Appleseed.pdf
J. Mirkovic, P. Reiher, C. Papadopoulos, A. Hussain, M. Shepard, M. Berg, and R. Jung, “Testing a Collaborative DDoS
Defense in a Red Team/Blue Team Exercise,” IEEE Transactions on Computing, vol. 57, no. 8, August 2008. Available
as acm transactions 2008.pdf
K. Eustice, V. Ramakrishna, N. Nguyen, and P. Reiher, “The Smart Party: A Personalized Location-Aware Multimedia
Experience,” Consumer Communications and Networking Conference, January 2008. Available as Smart_Party_CCNC_2008.pdf
C. Weddle, M. Oldham, J. Qian, A. Wang, P. Reiher, and G. Kuenning, “PARAID: A Gear-Shifting Power-Aware
RAID,” ACM Transactions on Storage, Vol. 3, No. 3, October 2007. Available as tos2007.pdf
J. Li, J. Mirkovic, T. Ehrenkranz, M. Wang, P. Reiher, and L. Zhang, “Learning the Valid Incoming Direction of IP Packets,"
Computer Networks (52), October 2007, pp. 399-417. Available as save2006.pdf
M. Beaumont-Gay, K. Eustice, V. Ramakrishna, and P. Reiher, “Information Protection Via Environmental Data Tethers,”
New Security Paradigms Workshop, September 2007. Available as data-tethers-nspw.pdf
A. Wang, G. Kuenning, and P. Reiher, “Using Permuted States and Validated Simulation to Analyze Conflict Rates in
Optimistic Replication,”Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 83, No. 8.
August 2007, pp. 551-569, 2007. Available as simulation_2007.pdf
P. Reiher, S. Maki, N. Pissinou, K. Makki, M. Burmester, T. Van, and T. Ghosh, “Research Directions in Security and Privacy
for Mobile and Wireless Networks,”chapter in Mobile and Wireless Security and Privacy (editors S. Makki, P. Reiher, K. Makki,
N. Pissinou, and S. Makki), Springer Verlag, 2007, pp. 1-22.
J. Mirkovic, B. Wilson, A. Hussain, S. Fahmy, P. Reiher, R. Thomas, and S. Schwab, “Automating DDoS Experimentation,"
Deter Community Workshop on Cyber Security Experimentation and Testing, July 2007. Available as deter.pdf
K. Eustice, V. Ramakrishna, A. Walker, M. Schnaider, N. Nguyen, and P. Reiher, “nan0Sphere: Location-Driven Fiction for
Groups of Users,” 12th International Conference on Human-Computer Interactions, July 2007. Available as heii2007.pdf
J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W. Yao, and S. Schwab, “Towards User-Centric Metrics
for Denial-of-Service Measurement,” Workshop on Experimental Computer Science, June 2007. Available as a8-mirkovic.pdf
V. Ramakrishna, K. Eustice, and P. Reiher, “Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios,”
Proceedings IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2007, June 2007.
Available as soca2007.pdf
J. Mirkovic, S. Fahmy, R. Thomas, S. Wei, P. Reiher, A. Hussain, B. Wilson, S. Schwab, and R. Chertov, "DDoS Benchmarks
and Experimentation Workbench for the DETER Testbed," Tridentcom, May 2007. Available as tric.pdf
V. Ramakrishna, Kevin Eustice and Matthew Schnaider, "Chapter 8: Approaches for Ensuring Security and Privacy
in Unplanned Ubiquitous Computing Interactions," Mobile and Wireless Networks Security and Privacy,
Ed: Makki et al., Springer Science+Business Media, 2007.
V. Ramakrishna, Max Robinson, Kevin Eustice and Peter Reiher, "An Active Self-Optimizing Multiplayer
Gaming Architecture," Cluster Computing Journal, Vol 9 No 2. special issue on Autonomic Computing, Springer
Netherlands, 2006. Available as cluster_computing.pdf