default search action
William Yurcik
- > Home > Persons > William Yurcik
Publications
- 2008
- [c74]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. ARES 2008: 237-244 - [c73]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. Financial Cryptography 2008: 323-324 - [c72]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
The SCRUB security data sharing infrastructure. NOMS 2008: 630-644 - [c71]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. NOMS 2008: 991-994 - [e6]Spyros Antonatos, Michele Bezzi, Elisa Boschi, Brian Trammell, William Yurcik:
Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-301-3 [contents] - 2007
- [j11]William Yurcik, Ramona Su Thompson, Michael B. Twidale, Esa M. Rantanen:
If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. Interactions 14(1): 12-14 (2007) - [c69]Ramona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey:
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. CHI 2007: 1205 - [c68]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. SecureComm 2007: 49-56 - [i13]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs. CoRR abs/0710.3979 (2007) - 2006
- [c67]Matthew Smith, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik:
Security Issues in On-Demand Grid and Cluster Computing. CCGRID 2006: 24 - [c66]Nadir Kiyanclar, Gregory A. Koenig, William Yurcik:
Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing. CCGRID 2006: 28 - [c65]Dmitry Mogilevsky, Gregory A. Koenig, William Yurcik:
Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters. CCGRID 2006: 30 - [c64]Charis Ermopoulos, William Yurcik:
NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. CLUSTER 2006 - [c63]Jason Hester, William Yurcik, Roy H. Campbell:
An implementation-independent threat model for group communications. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410M - [c62]Zahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell:
Multiple design patterns for voice over IP (VoIP) security. IPCCC 2006 - [c61]Adam J. Slagell, Rafael Bonilla, William Yurcik:
A survey of PKI components and scalability issues. IPCCC 2006 - [c60]Suvda Myagmar, William Yurcik:
Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection Standards. ISSSE 2006 - [c59]Xiaoxin Yin, William Yurcik, Adam J. Slagell:
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. SEC 2006: 284-295 - [c58]Jianqing Zhang, Nikita Borisov, William Yurcik:
Outsourcing Security Analysis with Anonymized Logs. SecureComm 2006: 1-9 - [c57]Ragib Hasan, William Yurcik:
A statistical analysis of disclosed storage security breaches. StorageSS 2006: 1-8 - [e4]William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh:
3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-549-5 [contents] - [i11]Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam J. Slagell:
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting. CoRR abs/cs/0601079 (2006) - [i10]Gregory Pluta, Larry Brumbaugh, William Yurcik:
Using SMART for Customized Monitoring of Windows Services. CoRR abs/cs/0603114 (2006) - [i9]Charis Ermopoulos, William Yurcik:
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security). CoRR abs/cs/0606089 (2006) - [i8]William Yurcik, Cristina L. Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan:
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs. CoRR abs/cs/0607111 (2006) - 2005
- [j10]Jun Wang, William Yurcik, Yaling Yang, Jason Hester:
Multiring techniques for scalable battlespace group communications. IEEE Commun. Mag. 43(11): 124-133 (2005) - [j9]Ian MacInnes, Yifan Li, William Yurcik:
Reputation and Dispute in eBay Transactions. Int. J. Electron. Commer. 10(1): 27-54 (2005) - [c54]Makan Pourzandi, David Gordon, William Yurcik, Gregory A. Koenig:
Clusters and security: distributed security for distributed systems. CCGRID 2005: 96-104 - [c53]William Yurcik, Chao Liu:
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. CCGRID 2005: 111-120 - [c52]Gregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik:
Cluster security with NVisionCC: process monitoring by leveraging emergent properties. CCGRID 2005: 121-132 - [c51]Adam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik:
Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. CCGRID 2005: 146-151 - [c50]Cristina L. Abad, Indranil Gupta, William Yurcik:
Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. ICDCS Workshops 2005: 5-11 - [c49]Ragib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, Roy H. Campbell:
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. ITCC (2) 2005: 205-213 - [c48]Xiaoxin Yin, William Yurcik, Adam J. Slagell:
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. IWIA 2005: 141-153 - [c47]Zahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, Roy H. Campbell:
A First Step Towards Call Survivability in Cellular Networks. LCN 2005: 501-502 - [c45]Zahid Anwar, Jalal Al-Muhtadi, William Yurcik, Roy H. Campbell:
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment. MobiQuitous 2005: 192-201 - [c44]Joseph A. Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, William Yurcik:
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. MSST 2005: 329-340 - [c43]Paul Stanton, William Yurcik, Larry Brumbaugh:
Protecting multimedia data in storage: a survey of techniques emphasizing encryption. Storage and Retrieval Methods and Applications for Multimedia 2005: 18-29 - [c42]Elizabeth Haubert, Joseph A. Tucek, Larry Brumbaugh, William Yurcik:
Tamper-resistant storage techniques for multimedia systems. Storage and Retrieval Methods and Applications for Multimedia 2005: 30-40 - [c41]Ragib Hasan, Joseph A. Tucek, Paul Stanton, William Yurcik, Larry Brumbaugh, Jeff Rosendale, Roelof Boonstra:
The techniques and challenges of immutable storage with applications in multimedia. Storage and Retrieval Methods and Applications for Multimedia 2005: 41-52 - [c40]Ragib Hasan, William Yurcik, Suvda Myagmar:
The evolution of storage service providers: techniques and challenges to outsourcing storage. StorageSS 2005: 1-8 - [c39]Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik:
Toward a threat model for storage systems. StorageSS 2005: 94-102 - [c38]Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North:
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. VizSEC 2005: 9 - [c37]Larry Brumbaugh, William Yurcik:
The 'Little Man Storage' model. WCAE@ISCA 2005: 6 - [c35]Wen Ding, William Yurcik, Xiaoxin Yin:
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. WINE 2005: 947-958 - [e3]Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou:
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-233-X [contents] - [e2]Kwan-Liu Ma, Stephen C. North, William Yurcik:
2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005. IEEE Computer Society 2005, ISBN 0-7803-9477-1 [contents] - [i6]Wen Ding, William Yurcik:
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market. CoRR abs/cs/0506038 (2005) - [i5]Zahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indranil Gupta, Roy H. Campbell:
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut. CoRR abs/cs/0509095 (2005) - [i4]Dmitry Mogilevsky, Adam J. Lee, William Yurcik:
Defining a Comprehensive Threat Model for High Performance Computational Clusters. CoRR abs/cs/0510046 (2005) - 2004
- [c32]Xiaoxin Yin, William Yurcik, Yifan Li, Kiran Lakkaraju, Cristina L. Abad:
VisFlowConnect: providing security situational awareness by visualizing network traffic flows. IPCCC 2004: 601-607 - [c31]Gregory Pluta, Larry Brumbaugh, William Yurcik:
BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments. LCN 2004: 394-395 - [c30]William Yurcik, Xin Meng, Gregory A. Koenig:
A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept. LCN 2004: 427-428 - [c29]Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph A. Tucek:
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. LISA 2004: 177-186 - [c27]Kiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee:
NVisionIP: an interactive network flow visualization tool for security. SMC (3) 2004: 2675-2680 - [c26]Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju:
VisFlowConnect: netflow visualizations of link relationships for security situational awareness. VizSEC 2004: 26-34 - [c25]Kiran Lakkaraju, William Yurcik, Adam J. Lee:
NVisionIP: netflow visualizations of system state for security situational awareness. VizSEC 2004: 65-72 - [c24]William Yurcik, Xin Meng, Nadir Kiyanclar:
NVisionCC: a visualization framework for high performance cluster security. VizSEC 2004: 133-137 - [i3]Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik:
A Distributed Economics-based Infrastructure for Utility Computing. CoRR abs/cs/0412121 (2004) - [i2]Adam J. Slagell, William Yurcik:
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization. CoRR cs.CR/0409005 (2004) - 2003
- [c23]Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe:
Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-264 - 2001
- [c14]Alexander Gubin, William Yurcik, Larry Brumbaugh:
Network Management Visualization with PingTV. LCN 2001: 62-63 - [c13]Mary Grzywa, Ajit Dharmik, William Yurcik, Larry Brumbaugh:
Application-Level Survivable Software: rFTP Proof-of-Concept . LCN 2001: 203-204 - [c12]William Yurcik, Larry Brumbaugh:
A web-based little man computer simulator. SIGCSE 2001: 204-208 - [c11]Alexander Gubin, William Yurcik, Larry Brumbaugh:
PingTV: A Case Study in Visual Network Monitoring. IEEE Visualization 2001: 421-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint