default search action
Randy C. Marchany
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Sahil Dudani, Ibrahim Baggili, David R. Raymond, Randolph Marchany:
The current state of cryptocurrency forensics. Forensic Sci. Int. Digit. Investig. 46: 301576 (2023)
2010 – 2019
- 2018
- [j7]Kimberly Zeitz, Michael Cantrell, Randy C. Marchany, Joseph G. Tront:
Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things. IEEE Wirel. Commun. Lett. 7(4): 578-581 (2018) - [c40]Mark E. DeYoung, Philip Kobezak, David R. Raymond, Randy C. Marchany, Joseph G. Tront:
Privacy Preserving Network Security Data Analytics: Architectures and System Design. HICSS 2018: 1-9 - [c39]Philip Kobezak, Randy C. Marchany, David R. Raymond, Joseph G. Tront:
Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks. HICSS 2018: 1-10 - 2017
- [c38]Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. HOST 2017: 165 - [c37]Kimberly Zeitz, Michael Cantrell, Randy C. Marchany, Joseph G. Tront:
Designing a Micro-Moving Target IPv6 Defense for the Internet of Things. IoTDI 2017: 179-184 - [c36]Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet. MILCOM 2017: 551-556 - 2016
- [j6]Dileep Basam, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities. J. Electr. Comput. Eng. 2016: 5212314:1-5212314:13 (2016) - [j5]Kimberly Zeitz, Randy C. Marchany, Joseph G. Tront:
Speed isn?t Enough: Usability and Adoption of an Optimized Alert Notification System. IEEE Technol. Soc. Mag. 35(1): 47-55 (2016) - [c35]Kayla M. Straub, Avik Sengupta, Joseph M. Ernst, Robert W. McGwier, Merrick Watchorn, Richard Tilley, Randolph Marchany:
Malware propagation in fully connected networks: A netflow-based analysis. MILCOM 2016: 497-502 - [c34]Franki Yeung, Peter Cho, Christopher Morrell, Randy C. Marchany, Joseph G. Tront:
Modeling network based moving target defense impacts through simulation in Ns-3. MILCOM 2016: 746-751 - 2015
- [c33]Christopher Morrell, Reese Moore, Randy C. Marchany, Joseph G. Tront:
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses. MTD@CCS 2015: 77-84 - [c32]Dileep Basam, Randy C. Marchany, Joseph G. Tront:
Attention: moving target defense networks, how well are you moving?. Conf. Computing Frontiers 2015: 54:1-54:8 - [c31]Reese Moore, Christopher Morrell, Randy C. Marchany, Joseph G. Tront:
Utilizing the BitTorrent DHT for blind rendezvous and information exchange. MILCOM 2015: 1560-1565 - 2014
- [c30]Matthew Sherburne, Randy C. Marchany, Joseph G. Tront:
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. CISR 2014: 37-40 - [c29]Kimberly Zeitz, Randy C. Marchany, Joseph G. Tront:
Designing an Optimized Alert System Based on Geospatial Location Data. HICSS 2014: 4159-4168 - [c28]Christopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Scaling IPv6 address bindings in support of a moving target defense. ICITST 2014: 440-445 - 2013
- [c27]Owen Hardman, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
Optimizing a network layer moving target defense for specific system architectures. ANCS 2013: 117-118 - [c26]Reese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
Using transport layer multihoming to enhance network layer moving target defenses. CSIIRW 2013: 53 - 2012
- [j4]Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront:
The Blind Man's Bluff Approach to Security Using IPv6. IEEE Secur. Priv. 10(4): 35-43 (2012) - [c25]Yong Cao, Reese Moore, Peng Mi, Alex Endert, Chris North, Randy C. Marchany:
Dynamic analysis of large datasets with animated and correlated views: VAST 2012 Mini Challenge # award: Honorable mention for good use of coordinated displays. IEEE VAST 2012: 283-284 - [c24]Stephen Groat, Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront:
Using an IPv6 moving target defense to protect the Smart Grid. ISGT 2012: 1-7 - [c23]Brittany Clore, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
Validating a custom IPv6 security application using OPNET modeler. MILCOM 2012: 1-6 - [c22]Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront:
Leveraging Cognitive Principles to Improve Security Visualization. NDT (2) 2012: 262-276 - [c21]Stephen Groat, Joseph G. Tront, Randy C. Marchany:
Advancing the defense in depth model. SoSE 2012: 285-290 - 2011
- [c20]Matthew Dunlop, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
The Good, the Bad, the IPv6. CNSR 2011: 77-84 - [c19]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
IPv6: Nowhere to Run, Nowhere to Hide. HICSS 2011: 1-10 - [c18]William Urbanski, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
Cover-VT: Converged Security Visualization Tool. Integrated Network Management 2011: 714-717 - [c17]Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront:
MT6D: A Moving Target IPv6 Defense. MILCOM 2011: 1321-1326 - [c16]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
What DHCPv6 says about you. WorldCIS 2011: 146-151 - 2010
- [c15]David Shelly, Matthew Dunlop, Randy C. Marchany, Peter Sforza:
Using geographic information systems for enhanced network security visualization. COM.Geo 2010 - [c14]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
The privacy implications of stateless IPv6 addressing. CSIIRW 2010: 52 - [c13]Benjamin R. Moyers, John Paul Dunning, Randolph Marchany, Joseph G. Tront:
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices. HICSS 2010: 1-9
2000 – 2009
- 2009
- [j3]David R. Raymond, Randy C. Marchany, Michael I. Brownfield, Scott F. Midkiff:
Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Trans. Veh. Technol. 58(1): 367-380 (2009) - [c12]Theresa M. Nelson, Timothy Buennemeyer, Randy C. Marchany, Joseph G. Tront:
Simulating the Deployment of Battery-Sensing Intrusion Protection Systems. HICSS 2009: 1-9 - 2008
- [c11]Timothy Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John Paul Dunning, Randy C. Marchany, Joseph G. Tront:
Mobile Device Profiling and Intrusion Detection Using Smart Batteries. HICSS 2008: 296 - 2007
- [j2]Ruiliang Chen, Jung-Min Park, Randolph Marchany:
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. IEEE Trans. Parallel Distributed Syst. 18(5): 577-588 (2007) - [c10]Joseph G. Tront, Randy C. Marchany:
Internet Security: Intrusion Detection and Prevention in Mobile Systems. HICSS 2007: 162 - [c9]Timothy Buennemeyer, Faiz Munshi, Randy C. Marchany, Joseph G. Tront:
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection. HICSS 2007: 163 - 2006
- [j1]Grant A. Jacoby, Randy C. Marchany, Nathaniel J. Davis IV:
Using Battery Constraints within Mobile Hosts to Improve Network Security. IEEE Secur. Priv. 4(5): 40-49 (2006) - [c8]Timothy Buennemeyer, Randolph Marchany, Joseph G. Tront:
Ubiquitous Security: Privacy versus Protection. PSC 2006: 71-77 - [c7]Ruiliang Chen, Jung-Min Park, Randolph Marchany:
RIM: Router Interface Marking for IP Traceback. GLOBECOM 2006 - 2004
- [c6]Anil Bazaz, James D. Arthur, Randy C. Marchany:
Reflections on Operating in Hostile Environments. HICSS 2004 - [c5]Joseph G. Tront, Randy C. Marchany:
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction. HICSS 2004 - 2003
- [c4]Joseph G. Tront, Randy C. Marchany:
CANDI: A System for Classifying the Security Risks in Network Appliances. HICSS 2003: 204 - 2002
- [c3]Randy C. Marchany, Joseph G. Tront:
Minitrack Introduction. HICSS 2002: 192 - [c2]Randy C. Marchany, Joseph G. Tront:
E-commerce Security Issues. HICSS 2002: 193
1990 – 1999
- 1992
- [c1]Randy C. Marchany, Joseph G. Tront:
A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer. ICMC 1992
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint