Остановите войну!
for scientists:
default search action
Joseph G. Tront
- > Home > Persons > Joseph G. Tront
Publications
- 2018
- [j12]Kimberly Zeitz, Michael Cantrell, Randy C. Marchany, Joseph G. Tront:
Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things. IEEE Wirel. Commun. Lett. 7(4): 578-581 (2018) - [c60]Mark E. DeYoung, Philip Kobezak, David R. Raymond, Randy C. Marchany, Joseph G. Tront:
Privacy Preserving Network Security Data Analytics: Architectures and System Design. HICSS 2018: 1-9 - [c59]Philip Kobezak, Randy C. Marchany, David R. Raymond, Joseph G. Tront:
Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks. HICSS 2018: 1-10 - 2017
- [c57]Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. HOST 2017: 165 - [c56]Kimberly Zeitz, Michael Cantrell, Randy C. Marchany, Joseph G. Tront:
Designing a Micro-Moving Target IPv6 Defense for the Internet of Things. IoTDI 2017: 179-184 - [c55]Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet. MILCOM 2017: 551-556 - 2016
- [j11]Dileep Basam, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities. J. Electr. Comput. Eng. 2016: 5212314:1-5212314:13 (2016) - [j10]Kimberly Zeitz, Randy C. Marchany, Joseph G. Tront:
Speed isn?t Enough: Usability and Adoption of an Optimized Alert Notification System. IEEE Technol. Soc. Mag. 35(1): 47-55 (2016) - [c53]Franki Yeung, Peter Cho, Christopher Morrell, Randy C. Marchany, Joseph G. Tront:
Modeling network based moving target defense impacts through simulation in Ns-3. MILCOM 2016: 746-751 - 2015
- [c52]Christopher Morrell, Reese Moore, Randy C. Marchany, Joseph G. Tront:
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses. MTD@CCS 2015: 77-84 - [c51]Dileep Basam, Randy C. Marchany, Joseph G. Tront:
Attention: moving target defense networks, how well are you moving?. Conf. Computing Frontiers 2015: 54:1-54:8 - [c49]Reese Moore, Christopher Morrell, Randy C. Marchany, Joseph G. Tront:
Utilizing the BitTorrent DHT for blind rendezvous and information exchange. MILCOM 2015: 1560-1565 - 2014
- [c47]Matthew Sherburne, Randy C. Marchany, Joseph G. Tront:
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. CISR 2014: 37-40 - [c44]Kimberly Zeitz, Randy C. Marchany, Joseph G. Tront:
Designing an Optimized Alert System Based on Geospatial Location Data. HICSS 2014: 4159-4168 - [c43]Christopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Scaling IPv6 address bindings in support of a moving target defense. ICITST 2014: 440-445 - 2013
- [c42]Owen Hardman, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
Optimizing a network layer moving target defense for specific system architectures. ANCS 2013: 117-118 - [c41]Reese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
Using transport layer multihoming to enhance network layer moving target defenses. CSIIRW 2013: 53 - 2012
- [j9]Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront:
The Blind Man's Bluff Approach to Security Using IPv6. IEEE Secur. Priv. 10(4): 35-43 (2012) - [c39]Stephen Groat, Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront:
Using an IPv6 moving target defense to protect the Smart Grid. ISGT 2012: 1-7 - [c37]Brittany Clore, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
Validating a custom IPv6 security application using OPNET modeler. MILCOM 2012: 1-6 - [c36]Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront:
Leveraging Cognitive Principles to Improve Security Visualization. NDT (2) 2012: 262-276 - [c35]Stephen Groat, Joseph G. Tront, Randy C. Marchany:
Advancing the defense in depth model. SoSE 2012: 285-290 - 2011
- [c34]Matthew Dunlop, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
The Good, the Bad, the IPv6. CNSR 2011: 77-84 - [c29]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
IPv6: Nowhere to Run, Nowhere to Hide. HICSS 2011: 1-10 - [c28]William Urbanski, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
Cover-VT: Converged Security Visualization Tool. Integrated Network Management 2011: 714-717 - [c27]Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront:
MT6D: A Moving Target IPv6 Defense. MILCOM 2011: 1321-1326 - [c26]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
What DHCPv6 says about you. WorldCIS 2011: 146-151 - 2010
- [c25]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
The privacy implications of stateless IPv6 addressing. CSIIRW 2010: 52 - [c24]Benjamin R. Moyers, John Paul Dunning, Randolph Marchany, Joseph G. Tront:
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices. HICSS 2010: 1-9 - 2009
- [c23]Theresa M. Nelson, Timothy Buennemeyer, Randy C. Marchany, Joseph G. Tront:
Simulating the Deployment of Battery-Sensing Intrusion Protection Systems. HICSS 2009: 1-9 - 2008
- [c21]Timothy Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John Paul Dunning, Randy C. Marchany, Joseph G. Tront:
Mobile Device Profiling and Intrusion Detection Using Smart Batteries. HICSS 2008: 296 - 2007
- [c20]Joseph G. Tront, Randy C. Marchany:
Internet Security: Intrusion Detection and Prevention in Mobile Systems. HICSS 2007: 162 - [c19]Timothy Buennemeyer, Faiz Munshi, Randy C. Marchany, Joseph G. Tront:
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection. HICSS 2007: 163 - 2006
- [c18]Timothy Buennemeyer, Randolph Marchany, Joseph G. Tront:
Ubiquitous Security: Privacy versus Protection. PSC 2006: 71-77 - 2004
- [c15]Joseph G. Tront, Randy C. Marchany:
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction. HICSS 2004 - 2003
- [c13]Joseph G. Tront, Randy C. Marchany:
CANDI: A System for Classifying the Security Risks in Network Appliances. HICSS 2003: 204 - 2002
- [c11]Randy C. Marchany, Joseph G. Tront:
Minitrack Introduction. HICSS 2002: 192 - [c10]Randy C. Marchany, Joseph G. Tront:
E-commerce Security Issues. HICSS 2002: 193 - 1992
- [c3]Randy C. Marchany, Joseph G. Tront:
A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer. ICMC 1992
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-25 22:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint