Kroeger, T., Donoghue, N.P., Zage, D.J., & Zage, D.J. (2017). Secure Distributed Membership Tests via Secret Sharing [Conference Poster]. https://www.osti.gov/biblio/1463944
Publications
Search results
Jump to search filtersWendt, J.D., Quach, T.T., Zage, D.J., Field, R.V., Wells, R., Soundarajan, S., Cruz, G.J., & Cruz, G.J. (2016). Data Inferencing on Semantic Graphs (DISeG) (Final Report). https://doi.org/10.2172/1562648
Fisher, A.L., Zage, D.J., Jarocki, J.C., & Jarocki, J.C. (2016). Towards a Formalization of Linkography. https://doi.org/10.2172/1562216
Bender, M.A., Berry, J., Johnson, R., Kroeger, T., McCauley, S., Phillips, C.A., Simon, B., Singh, S., Zage, D.J., & Zage, D.J. (2016). Anti-persistence on persistent storage: History-independent sparse tables and dictionaries [Conference Poster]. Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. https://doi.org/10.1145/2902251.2902276
Wendt, J.D., Field, R.V., Garcia, D., Quach, T.T., Wells, R., Zage, D.J., Phillips, C.A., Pinar, A., Soundarajan, S., & Soundarajan, S. (2016). Social-Media Network Collection Problems [Conference Poster]. https://www.osti.gov/biblio/1364805
Kroeger, T., Xu, H., Donoghue, N.P., Hahn, B., Zage, D.J., & Zage, D.J. (2016). TWIAD the Write-Optimized IP Address Database [Conference Poster]. https://www.osti.gov/biblio/1342350
Fisher, A.L., Kent, C., Zage, D.J., Jarocki, J.C., & Jarocki, J.C. (2015). Using linkography to understand cyberattacks [Conference Poster]. 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015. https://doi.org/10.1109/CNS.2015.7346839
Fisher, A.L., Kent, C., Zage, D.J., Jarocki, J.C., & Jarocki, J.C. (2015). Using linkography to understand cyberattacks [Conference Poster]. 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015. https://doi.org/10.1109/CNS.2015.7346839
Kroeger, T., Xu, H., Donoghue, N.P., Hahn, B., Zage, D.J., & Zage, D.J. (2015). Track Network Events with Write Optimized Data Structures [Conference Poster]. https://www.osti.gov/biblio/1325904
Choi, S.N., Zage, D.J., Choe, Y.R., Wasilow, B., & Wasilow, B. (2015). Physically Unclonable Digital ID [Conference Poster]. Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015. https://doi.org/10.1109/MobServ.2015.24
Zage, D.J. (2015). Security Implications of the Cloud [Presentation]. https://www.osti.gov/biblio/1262934
Kroeger, T., Zage, D.J., Benson, T., Donoghue, N.P., Xu, H., Hahn, B., Saia, J., & Saia, J. (2015). Secure Distributed Membership Tests via Secret Sharing How to Hide Your Hostile Hosts: Harnessing Shamir Secret Sharing [Conference Poster]. https://www.osti.gov/biblio/1262634
Kegelmeyer, W.P., Pinar, A., Zage, D.J., & Zage, D.J. (2015). Counter-Adversarial Data Analytics: Machine Learning (and Graph Analysis) [Conference Poster]. https://www.osti.gov/biblio/1530955
Kroeger, T., Zage, D.J., Phillips, C.A., Saia, J., Benson, T.R., & Benson, T.R. (2015). Secure Distributed Set Membership through Secret Sharing [Presentation]. https://www.osti.gov/biblio/1248829
Choe, Y.R., Choi, S.N., Zage, D.J., Wasilow, B., & Wasilow, B. (2015). Physically Unclonable Digital ID (PUDID) [Conference Poster]. https://www.osti.gov/biblio/1504589
Choe, Y.R., Choi, S.N., Bierma, M., Zage, D.J., & Zage, D.J. (2014). EMBERS: EpheMeral Biometrically Enhanced Real-time location System [Presentation]. https://www.osti.gov/biblio/1242054
Choe, Y.R., Choi, S.N., Bierma, M., Zage, D.J., & Zage, D.J. (2014). EMBERS: Ephemeral bioMetrically Enhanced Real-time location System [Conference Poster]. https://doi.org/10.1109/CCST.2014.6986971
Zage, D.J., Choi, S.N., & Choi, S.N. (2013). Ephemeral Biometrics: What are they and what do they solve? [Conference]. https://www.osti.gov/biblio/1113354
Zage, D.J., Glass, K., Colbaugh, R., & Colbaugh, R. (2013). Improving supply chain security using big data [Conference]. IEEE ISI 2013 - 2013 IEEE International Conference on Intelligence and Security Informatics: Big Data, Emergent Threats, and Decision-Making in Security Informatics. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84883399598&origin=inward
Colbaugh, R., Glass, K., Zage, D.J., & Zage, D.J. (2013). Increasing Cyber Resilience via Predictability-Based Defense [Conference]. https://www.osti.gov/biblio/1115033
Zage, D.J., Colbaugh, R., Glass, K., & Glass, K. (2013). Improving Supply Chain Security Using Big Data [Conference]. https://www.osti.gov/biblio/1082627
Choi, S.N., Zage, D.J., & Zage, D.J. (2013). Ephemeral Biometrics: What are they and what do they solve? [Conference]. Proceedings - International Carnahan Conference on Security Technology. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84908230515&origin=inward
Zage, D.J., Benner, R.E., Echeverria, V.T., Onunkwo, U., Patel, J., & Patel, J. (2013). Harnessing Many-core Processors for Scalable Highly Efficient and Adaptable Firewall Solutions [Conference]. https://www.osti.gov/biblio/1063330
Zage, D.J., Urias, V., & Urias, V. (2013). Understanding Securing and Deploying Cloud Computing Environments [Conference]. https://www.osti.gov/biblio/1063606
Choi, S.N., Zage, D.J., & Zage, D.J. (2012). Addressing insider threat using 'where you are' as fourth factor authentication [Conference]. Proceedings - International Carnahan Conference on Security Technology. https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84873207282&origin=inward