Follow
David Zage
David Zage
Intel Corporation
Verified email at cerias.net
Title
Cited by
Cited by
Year
A survey of attack and defense techniques for reputation systems
K Hoffman, D Zage, C Nita-Rotaru
ACM Computing Surveys (CSUR) 42 (1), 1-31, 2009
9092009
Autonomous vehicle system
H Moustafa, DD Salvi, S Jaber, D Iyer, MK Hazrati, P Agrawal, ...
US Patent App. 17/434,710, 2022
1372022
Steward: Scaling byzantine fault-tolerant replication to wide area networks
Y Amir, C Danilov, D Dolev, J Kirsch, J Lane, C Nita-Rotaru, J Olsen, ...
IEEE Transactions on Dependable and Secure Computing 7 (1), 80-93, 2008
1072008
Scaling byzantine fault-tolerant replication towide area networks
Y Amir, C Danilov, J Kirsch, J Lane, D Dolev, C Nita-Rotaru, J Olsen, ...
International Conference on Dependable Systems and Networks (DSN'06), 105-114, 2006
1002006
An architectural vision for a data-centric iot: Rethinking things, trust and clouds
EM Schooler, D Zage, J Sedayao, H Moustafa, A Brown, M Ambrosin
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
582017
Improving supply chain security using big data
D Zage, K Glass, R Colbaugh
2013 IEEE International Conference on Intelligence and Security Informatics …, 2013
542013
Autonomous vehicle system
H Moustafa, S Jaber, D Iyer, MK Hazrati, P Agrawal, N Aerrabotu, ...
US Patent App. 17/434,713, 2022
532022
Experimental comparison of peer-to-peer streaming overlays: An application perspective
J Seibert, D Zage, S Fahmy, C Nita-Rotaru
2008 33rd IEEE Conference on Local Computer Networks (LCN), 20-27, 2008
522008
Data management in an information-centric network
VS Somayazulu, EM Schooler, H Moustafa, AS Brown, R Vannithamby, ...
US Patent 10,356,197, 2019
482019
Addressing insider threat using “where you are” as fourth factor authentication
S Choi, D Zage
2012 IEEE International Carnahan Conference on Security Technology (ICCST …, 2012
422012
On the accuracy of decentralized virtual coordinate systems in adversarial networks
DJ Zage, C Nita-Rotaru
Proceedings of the 14th ACM conference on Computer and communications …, 2007
422007
Data management in an edge network
H Moustafa, EM Schooler, DJ Zage, JC Sedayao, DE Cohen, S Lee
US Patent 10,244,071, 2019
242019
A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
AA Walters, D Zage, CN Rotaru
IEEE/ACM Transactions on Networking 16 (6), 1434-1446, 2008
242008
Anti-persistence on persistent storage: History-independent sparse tables and dictionaries
MA Bender, JW Berry, R Johnson, TM Kroeger, S McCauley, CA Phillips, ...
Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2016
222016
Autonomous vehicle system
PJ Van Beek, DD Salvi, MK Hazrati, P Agrawal, D Iyer, S Jaber, ...
US Patent App. 17/434,721, 2022
212022
Applying game theory to analyze attacks and defenses in virtual coordinate systems
S Beckery, J Seibert, D Zage, C Nita-Rotaru, R Statey
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
202011
Mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks
AA Walters, D Zage, C Nita-Rotaru
Proceedings of the 2006 IEEE International Conference on Network Protocols …, 2006
202006
A Survey of attacks on Reputation Systems
K Hoffman, D Zage, C Nita-Rotaru
172007
On the accuracy of decentralized network coordinate systems in adversarial networks
D Zage, C Nita-Rotaru
Proc. CCS 7, 2007
142007
Utilizing linear subspaces to improve cloud security
D Zage, J Obert
IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012
112012
The system can't perform the operation now. Try again later.
Articles 1–20