William Yurcik Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

83 Spyros Antonatos, Michele Bezzi, Elisa Boschi, Brian Trammell, William Yurcik: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
82 Yongdae Kim, William Yurcik: Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008
81EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. ARES 2008: 237-244
80EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. Financial Cryptography 2008: 323-324
79EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: The SCRUB security data sharing infrastructure. NOMS 2008: 630-644
78EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. NOMS 2008: 991-994
77EERobert G. Cole, George F. Riley, Derya Cansever, William Yurcik: Stochastic Process Models for Packet/Analytic-Based Network Simulations. PADS 2008: 72-79
76EERamona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey: Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. CHI 2007: 1205
75EEWilliam Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham: Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs CoRR abs/0710.3979: (2007)
74EEWilliam Yurcik, Ramona Su Thompson, Michael B. Twidale, Esa M. Rantanen: If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. Interactions 14(1): 12-14 (2007)
73 William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh: 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 3 November 2006, Alexandria, Virginia, USA ACM 2006
72EEMatthew Smith, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik: Security Issues in On-Demand Grid and Cluster Computing. CCGRID 2006: 24
71EENadir Kiyanclar, Gregory A. Koenig, William Yurcik: Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing. CCGRID 2006: 28
70EEDmitry Mogilevsky, Gregory A. Koenig, William Yurcik: Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters. CCGRID 2006: 30
69EECharis Ermopoulos, William Yurcik: NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. CLUSTER 2006
68EEAdam J. Slagell, Rafael Bonilla, William Yurcik: A survey of PKI components and scalability issues. IPCCC 2006
67EEZahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell: Multiple design patterns for voice over IP (VoIP) security. IPCCC 2006
66EEXiaoxin Yin, William Yurcik, Adam J. Slagell: VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. SEC 2006: 284-295
65EERagib Hasan, William Yurcik: A statistical analysis of disclosed storage security breaches. StorageSS 2006: 1-8
64EEWilliam Yurcik: Tool update: visflowconnect-IP with advanced filtering from usability testing. VizSEC 2006: 63-64
63EEWilliam Yurcik: Tool update: NVisionIP improvements (difference view, sparklines, and shapes). VizSEC 2006: 65-66
62EERuperto P. Majuca, William Yurcik, Jay P. Kesan: The Evolution of Cyberinsurance CoRR abs/cs/0601020: (2006)
61EEKatherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam J. Slagell: SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting CoRR abs/cs/0601079: (2006)
60EEGregory Pluta, Larry Brumbaugh, William Yurcik: Using SMART for Customized Monitoring of Windows Services CoRR abs/cs/0603114: (2006)
59EECharis Ermopoulos, William Yurcik: NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security) CoRR abs/cs/0606089: (2006)
58EEWilliam Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan: UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs CoRR abs/cs/0607111: (2006)
57EEAashish Sharma, William Yurcik: Security Assessment of E-Tax Filing Websites CoRR abs/cs/0608034: (2006)
56 Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005
55 Kwan-Liu Ma, Stephen C. North, William Yurcik: IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 26 October 2005, Minneapolis, MN, USA IEEE Computer Society 2005
54EEWilliam Yurcik, Chao Liu: A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. CCGRID 2005: 111-120
53EEGregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik: Cluster security with NVisionCC: process monitoring by leveraging emergent properties. CCGRID 2005: 121-132
52EEAdam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik: Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. CCGRID 2005: 146-151
51EEMakan Pourzandi, David Gordon, William Yurcik, Gregory A. Koenig: Clusters and security: distributed security for distributed systems. CCGRID 2005: 96-104
50EECristina Abad, Indranil Gupta, William Yurcik: Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. ICDCS Workshops 2005: 5-11
49EERagib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, Roy H. Campbell: A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. ITCC (2) 2005: 205-213
48 Xiaoxin Yin, William Yurcik, Adam J. Slagell: The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. IWIA 2005: 141-153
47EEZahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, Roy H. Campbell: A First Step Towards Call Survivability in Cellular Networks. LCN 2005: 501-502
46EEWilliam Yurcik: Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. LISA 2005: 169-176
45EEJoseph Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, William Yurcik: Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. MSST 2005: 329-340
44EEZahid Anwar, Jalal Al-Muhtadi, William Yurcik, Roy H. Campbell: Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment. MobiQuitous 2005: 192-201
43EERagib Hasan, William Yurcik, Suvda Myagmar: The evolution of storage service providers: techniques and challenges to outsourcing storage. StorageSS 2005: 1-8
42EERagib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik: Toward a threat model for storage systems. StorageSS 2005: 94-102
41EEKiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North: Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. VizSEC 2005: 9
40EEWen Ding, William Yurcik, Xiaoxin Yin: Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. WINE 2005: 947-958
39EEWen Ding, William Yurcik: A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market CoRR abs/cs/0506038: (2005)
38EEZahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indranil Gupta, Roy H. Campbell: Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut CoRR abs/cs/0509095: (2005)
37EEDmitry Mogilevsky, Adam J. Lee, William Yurcik: Defining a Comprehensive Threat Model for High Performance Computational Clusters CoRR abs/cs/0510046: (2005)
36 Carla E. Brodley, Philip Chan, Richard Lippman, William Yurcik: Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 29 October 2004, Washington DC, USA ACM 2004
35EEWilliam Yurcik: Visualization Tools for Security Administrators. Financial Cryptography 2004: 112-113
34 Aashish Sharma, William Yurcik: An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003. ICETE (2) 2004: 257-262
33EEGregory Pluta, Larry Brumbaugh, William Yurcik: BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments. LCN 2004: 394-395
32EEWilliam Yurcik, Xin Meng, Gregory A. Koenig: A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept. LCN 2004: 427-428
31EEGregory Pluta, Larry Brumbaugh, William Yurcik, Joseph Tucek: Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. LISA 2004: 177-186
30EEAhmed Sobeih, William Yurcik, Jennifer C. Hou: VRing: A Case for Building Application-Layer Multicast Rings (Rather Than Trees). MASCOTS 2004: 437-446
29EEKiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee: NVisionIP: an interactive network flow visualization tool for security. SMC (3) 2004: 2675-2680
28EEWilliam Yurcik, Xin Meng, Nadir Kiyanclar: NVisionCC: a visualization framework for high performance cluster security. VizSEC 2004: 133-137
27EEXiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju: VisFlowConnect: netflow visualizations of link relationships for security situational awareness. VizSEC 2004: 26-34
26EEKiran Lakkaraju, William Yurcik, Adam J. Lee: NVisionIP: netflow visualizations of system state for security situational awareness. VizSEC 2004: 65-72
25EEMichael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik: A Distributed Economics-based Infrastructure for Utility Computing CoRR abs/cs/0412121: (2004)
24EEAdam J. Slagell, William Yurcik: Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization CoRR cs.CR/0409005: (2004)
23EECristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe: Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-265
22EECarlos Iván Chesñevar, Maria Laura Cobo, William Yurcik: Using theoretical computer simulators for formal languages and automata theory. SIGCSE Bulletin 35(2): 33-37 (2003)
21EEWilliam Yurcik: Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept. LCN 2002: 134-135
20EEGregory S. Wolffe, William Yurcik, Hugh Osborne, Mark A. Holliday: Teaching computer organization/architecture with limited resources using simulators. SIGCSE 2002: 176-180
19 William Yurcik: Special issue on specialized computer architecture simulators that see the present and may hold the future. ACM Journal of Educational Resources in Computing 2(1): 1-3 (2002)
18EEAlexander Gubin, William Yurcik, Larry Brumbaugh: PingTV: A Case Study in Visual Network Monitoring. IEEE Visualization 2001
17EEMary Grzywa, Ajit Dharmik, William Yurcik, Larry Brumbaugh: Application-Level Survivable Software: rFTP Proof-of-Concept . LCN 2001: 203-205
16EEAlexander Gubin, William Yurcik, Larry Brumbaugh: Network Management Visualization with PingTV. LCN 2001: 62-65
15EEWilliam Yurcik, Larry Brumbaugh: A web-based little man computer simulator. SIGCSE 2001: 204-208
14EEWilliam Yurcik, Hugh Osborne: A crowd of little man computers: visual computer simulator teaching tools. Winter Simulation Conference 2001: 1632-1639
13 William Yurcik: Editorial. ACM Journal of Educational Resources in Computing 1(4): 1-3 (2001)
12 Cecile Yehezkel, William Yurcik, Murray Pearson, Dean Armstrong: Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim. ACM Journal of Educational Resources in Computing 1(4): 60-80 (2001)
11EEWilliam Yurcik, David Doss: Internet Attacks: A Policy Framework for Rules of Engagement CoRR cs.CY/0109078: (2001)
10EEWilliam Yurcik, David Doss: Achieving Fault-Tolerant Software with Rejuvenation and Reconfiguration. IEEE Software 18(4): 48-52 (2001)
9EELillian (Boots) Cassel, Mark A. Holliday, Deepak Kumar, John Impagliazzo, Kevin Bolding, Murray Pearson, Jim Davies, Gregory S. Wolffe, William Yurcik: Distributed expertise for teaching computer organization & architecture. SIGCSE Bulletin 33(2): 111-126 (2001)
8EEWilliam Yurcik: The Simulation Education Homepage. Simulation 76(4): 202-206 (2001)
7EESamuel Patton, David Doss, William Yurcik: Open Source Versus Commercial Firewalls: Functional Comparison. LCN 2000: 223-224
6EESamuel Patton, Bryan Smith, David Doss, William Yurcik: A Virtual Private Network Deployment Framework. LCN 2000: 225-
5EESamuel Patton, David Doss, William Yurcik: Distributed Weakness in Virtual Private Networks. LCN 2000: 96-
4 William Yurcik, David Tipper, Deep Medhi: The use of hop-limits to provide survivable ATM group communications. Networked Group Communication 2000: 131-140
3EEWilliam Yurcik, David Tipper: A survivability framework for connection-oriented group communications. PRDC 2000: 53-58
2 William Yurcik: Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings. Networked Group Communication 1999: 235-243
1EEWilliam Yurcik: Providing ATM Multipoint Survivability Via Disjoint VC Mesh Backup Groups. ICCCN 1998: 129-139

Coauthor Index

1Cristina Abad [23] [50] [58]
2Jalal Al-Muhtadi [44]
3Spyros Antonatos [83]
4Zahid Anwar [38] [44] [47] [49] [67]
5Dean Armstrong [12]
6Vijayalakshmi Atluri (Vijay Atluri) [56]
7Stefan Axelsson [73]
8Brian P. Bailey [76]
9Salman Baset [47]
10Ratna Bearavolu [29] [41]
11Michele Bezzi [83]
12Kevin Bolding [9]
13Rafael Bonilla [68]
14Elisa Boschi [83]
15Carla E. Brodley [36]
16Larry Brumbaugh [15] [16] [17] [18] [31] [33] [45] [49] [56] [60]
17Roy H. Campbell [38] [44] [47] [49] [67]
18Derya Cansever [77]
19Lillian N. Cassel (Lillian (Boots) Cassel) [9]
20Philip Chan [36]
21Carlos Iván Chesñevar [22]
22Maria Laura Cobo [22]
23Robert G. Cole [77]
24Jim Davies [9]
25Ajit Dharmik [17]
26Wen Ding [39] [40]
27David Doss [5] [6] [7] [10] [11]
28Michael Engel [72]
29Charis Ermopoulos [59] [61] [69]
30Bernd Freisleben [72]
31Thomas Friese [72]
32David Gordon [51]
33Mary Grzywa [17]
34Alexander Gubin [16] [18]
35Indranil Gupta [38] [50]
36Munawar Hafiz [67]
37Ragib Hasan [42] [43] [45] [49] [58] [65]
38Elizabeth Haubert [45]
39Greg Hellings [75] [78] [79] [80] [81]
40Mark A. Holliday [9] [20]
41Jennifer C. Hou (Chao-Ju Hou) [30]
42John Impagliazzo [9]
43Ralph E. Johnson [67]
44Jay P. Kesan [62]
45Latifur Khan [75] [78] [79] [80] [81]
46Yongdae Kim [82]
47Nadir Kiyanclar [25] [28] [53] [71]
48Gregory A. Koenig [25] [32] [51] [52] [53] [70] [71] [72]
49Deepak Kumar [9]
50Kiran Lakkaraju [26] [27] [29] [41] [73]
51Adam J. Lee [26] [29] [37] [42] [52] [53]
52Yifan Li [27] [61]
53Richard Lippman [36]
54Chao Liu [54]
55Katherine Luo [61]
56Kwan-Liu Ma [55]
57Ruperto P. Majuca [62]
58Deep Medhi (D. Medhi) [4]
59Xin Meng [28] [32] [52] [53]
60Dmitry Mogilevsky [37] [70]
61Suvda Myagmar [42] [43]
62Stephen C. North [41] [55]
63Hugh Osborne [14] [20]
64Vivek Pandey [38]
65Samuel Patton [5] [6] [7]
66Murray Pearson [9] [12]
67Gregory Pluta [31] [33] [60]
68Makan Pourzandi [51]
69Esa M. Rantanen [74] [76]
70George F. Riley [77]
71Kenneth E. Rowe [23]
72Moazzam Saleem [58]
73Pierangela Samarati [56]
74Henning Schulzrinne [47]
75Cigdem Sengul [23]
76Asim Shankar [38]
77Aashish Sharma [34] [57]
78Adam J. Slagell [24] [41] [48] [61] [66] [68]
79Bryan Smith [6]
80Matthew Smith [72]
81Ahmed Sobeih [30]
82Shyama Sridharan [58]
83Paul Stanton [45]
84Jed Taylor [23]
85Soon Tee Teoh [73]
86Ramona Su Thompson [74] [76]
87Bhavani M. Thuraisingham [75] [78] [79] [80] [81]
88David Tipper [3] [4]
89Brian Trammell [83]
90Michael Treaster [25] [27] [53]
91Joseph Tucek [31] [45]
92Michael Twidale (Michael B. Twidale) [74]
93Gregory S. Wolffe [9] [20]
94Clay Woolam [75] [78] [79] [80] [81]
95Cecile Yehezkel [12]
96Xiaoxin Yin [27] [40] [48] [66]
97Yuanyuan Zhou [23] [56]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)