David Zage
David Zage
Intel Corporation
Verified email at cerias.net
Title
Cited by
Cited by
Year
A survey of attack and defense techniques for reputation systems
K Hoffman, D Zage, C Nita-Rotaru
ACM Computing Surveys (CSUR) 42 (1), 1-31, 2009
7462009
Scaling byzantine fault-tolerant replication towide area networks
Y Amir, C Danilov, J Kirsch, J Lane, D Dolev, C Nita-Rotaru, J Olsen, ...
International Conference on Dependable Systems and Networks (DSN'06), 105-114, 2006
752006
Steward: Scaling Byzantine fault-tolerant replication to wide area networks
Y Amir, C Danilov, D Dolev, J Kirsch, J Lane, C Nita-Rotaru, J Olsen, ...
IEEE Transactions on Dependable and Secure Computing 7 (1), 80-93, 2008
592008
Experimental comparison of peer-to-peer streaming overlays: An application perspective
J Seibert, D Zage, S Fahmy, C Nita-Rotaru
2008 33rd IEEE Conference on Local Computer Networks (LCN), 20-27, 2008
482008
On the accuracy of decentralized virtual coordinate systems in adversarial networks
DJ Zage, C Nita-Rotaru
Proceedings of the 14th ACM conference on Computer and communications …, 2007
442007
An architectural vision for a data-centric iot: Rethinking things, trust and clouds
EM Schooler, D Zage, J Sedayao, H Moustafa, A Brown, M Ambrosin
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
322017
Addressing insider threat using “where you are” as fourth factor authentication
S Choi, D Zage
2012 IEEE International Carnahan Conference on Security Technology (ICCST …, 2012
292012
Improving supply chain security using big data
D Zage, K Glass, R Colbaugh
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
252013
Adaptive post-filtering for reducing noise in highly compressed image/video coding
C Kim
US Patent 7,031,552, 2006
242006
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
A Walters, D Zage, CN Rotaru
IEEE/ACM Transactions on Networking 16 (6), 1434-1446, 2008
212008
Mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
AA Walters, D Zage, C Nita-Rotaru
Proceedings of the 2006 IEEE International Conference on Network Protocols …, 2006
192006
Applying game theory to analyze attacks and defenses in virtual coordinate systems
S Beckery, J Seibert, D Zage, C Nita-Rotaru, R Statey
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
172011
On the accuracy of decentralized network coordinate systems in adversarial networks
D Zage, C Nita-Rotaru
Proc. CCS 7, 2007
142007
Utilizing linear subspaces to improve cloud security
D Zage, J Obert
IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012
122012
A Survey of attacks on Reputation Systems
K Hoffman, D Zage, C Nita-Rotaru
122007
A network-aware distributed membership protocol for collaborative defense
D Zage, C Livadas, EM Schooler
2009 International Conference on Computational Science and Engineering 4 …, 2009
112009
Steward: Scaling byzantine fault-tolerant systems to wide area networks
Y Amir, C Danilov, D Dolev, J Kirsch, J Lane, C Nita-Rotaru, J Olsen, ...
Proceedings of the IEEE International Conference on Dependable Systems and …, 2005
92005
Method and manufacturing a precisely aligned microlens array
J Border, SH Bernegger, JC Pulver, MA Smith
US Patent 6,594,084, 2003
9*2003
Anti-persistence on persistent storage: History-independent sparse tables and dictionaries
MA Bender, JW Berry, R Johnson, TM Kroeger, S McCauley, CA Phillips, ...
Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2016
82016
Using linkography to understand cyberattacks
A Fisher, C Kent, D Zage, J Jarocki
2015 IEEE Conference on Communications and Network Security (CNS), 290-298, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20