default search action
Carl A. Gunter
Person information
- affiliation: University of Illinois, Urbana-Champaign, IL, USA
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c132]Berkay Kaplan, Israel J. Lopez-Toledo, Carl A. Gunter, Jingyu Qian:
A Tagging Solution to Discover IoT Devices in Apartments. ACSAC 2023: 205-215 - [c131]Xiaojun Xu, Hanzhang Wang, Alok Lal, Carl A. Gunter, Bo Li:
EDoG: Adversarial Edge Detection For Graph Neural Networks. SaTML 2023: 291-305 - [c130]Hsiao-Ying Huang, Soteris Demetriou, Muhammad Hassan, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Evaluating User Behavior in Smartphone Security: A Psychometric Perspective. SOUPS 2023: 509-524 - [c129]Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David M. Liebovitz, Gang Wang, Carl A. Gunter:
How to Cover up Anomalous Accesses to Electronic Health Records. USENIX Security Symposium 2023: 229-246 - [c128]Denise L. Anthony, Carl A. Gunter, Weijia He, Mounib Khanafer, Susan Landau, Ravindra Mangar, Nathan Reitinger:
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson. WPES@CCS 2023: 129-134 - 2022
- [i22]Berkay Kaplan, Jingyu Qian, Israel Lopez-Toledo, Carl A. Gunter:
A Tagging Solution to Discover IoT Devices in Apartments. CoRR abs/2210.06676 (2022) - [i21]Klara Nahrstedt, Naresh R. Shanbhag, Vikram S. Adve, Nancy M. Amato, Romit Roy Choudhury, Carl A. Gunter, Nam Sung Kim, Olgica Milenkovic, Sayan Mitra, Lav R. Varshney, Yurii Vlasov, Sarita V. Adve, Rashid Bashir, Andreas Cangellaris, James DiCarlo, Katie Driggs Campbell, Nick Feamster, Mattia Gazzola, Karrie Karahalios, Sanmi Koyejo, Paul G. Kwiat, Bo Li, Negar Mehr, Ravish Mehra, Andrew Miller, Daniela Rus, Alexander G. Schwing, Anshumali Shrivastava:
Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing. CoRR abs/2210.08974 (2022) - [i20]Xiaojun Xu, Yue Yu, Hanzhang Wang, Alok Lal, Carl A. Gunter, Bo Li:
EDoG: Adversarial Edge Detection For Graph Neural Networks. CoRR abs/2212.13607 (2022) - 2021
- [c127]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. NDSS 2021 - [c126]Yunhui Long, Boxin Wang, Zhuolin Yang, Bhavya Kailkhura, Aston Zhang, Carl A. Gunter, Bo Li:
G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators. NeurIPS 2021: 2965-2977 - [c125]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. SP 2021: 103-120 - [i19]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. CoRR abs/2102.05195 (2021) - [i18]George Gunter, Huichen Li, Avesta Hojjati, Matthew Nice, Matthew R. Bunting, Carl A. Gunter, Bo Li, Jonathan Sprinkle, Daniel B. Work:
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection. CoRR abs/2112.11986 (2021) - 2020
- [j37]Michael J. May, Kevin D. Lux, Carl A. Gunter:
WSEmail. Serv. Oriented Comput. Appl. 14(1): 5-17 (2020) - [c124]Yunhui Long, Le Xu, Carl A. Gunter:
A Hypothesis Testing Approach to Sharing Logs with Confidence. CODASPY 2020: 307-318 - [c123]Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. EuroS&P 2020: 521-534 - [c122]Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen:
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. NDSS 2020 - [c121]Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter:
See No Evil: Phishing for Permissions with False Transparency. USENIX Security Symposium 2020: 415-432 - [i17]Wayne P. Burleson, Kevin Fu, Denise L. Anthony, Jorge Guajardo, Carl A. Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanfar, Carl E. Landwehr, Susan Squires:
Grand Challenges for Embedded Security Research in a Connected World. CoRR abs/2005.06585 (2020) - [i16]Hsiao-Ying Huang, Soteris Demetriou, Rini Banerjee, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security. CoRR abs/2007.01721 (2020)
2010 – 2019
- 2019
- [c120]Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. CCS 2019: 1439-1453 - [c119]Avesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A. Gunter:
BEEER: distributed record and replay for medical devices in hospital operating rooms. HotSoS 2019: 1:1-1:10 - [i15]Yunhui Long, Suxin Lin, Zhuolin Yang, Carl A. Gunter, Bo Li:
Scalable Differentially Private Generative Student Model via PATE. CoRR abs/1906.09338 (2019) - [i14]Kevin D. Lux, Michael J. May, Carl A. Gunter:
WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services. CoRR abs/1908.02108 (2019) - [i13]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. CoRR abs/1910.03137 (2019) - 2018
- [j36]Varun Badrinath Krishna, Carl A. Gunter, William H. Sanders:
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud. IEEE J. Sel. Top. Signal Process. 12(4): 790-805 (2018) - [c118]Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov:
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. CCS 2018: 619-633 - [c117]Bo Chen, Klara Nahrstedt, Carl A. Gunter:
ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System. MobiQuitous 2018: 39-48 - [c116]Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter:
Resolving the Predicament of Android Custom Permissions. NDSS 2018 - [c115]Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter:
Fear and Logging in the Internet of Things. NDSS 2018 - [c114]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium 2018: 49-64 - [c113]Shubhra Kanti Karmaker Santu, Vincent Bindschaedler, ChengXiang Zhai, Carl A. Gunter:
NRF: A Naive Re-identification Framework. WPES@CCS 2018: 121-132 - [i12]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR abs/1801.08535 (2018) - [i11]Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
Understanding Membership Inferences on Well-Generalized Learning Models. CoRR abs/1802.04889 (2018) - [i10]Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl A. Gunter:
Distributed and Secure ML with Self-tallying Multi-party Aggregation. CoRR abs/1811.10296 (2018) - 2017
- [j35]Vincent Bindschaedler, Reza Shokri, Carl A. Gunter:
Plausible Deniability for Privacy-Preserving Data Synthesis. Proc. VLDB Endow. 10(5): 481-492 (2017) - [c112]Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter:
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. ACSAC 2017: 288-302 - [c111]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS 2017: 2421-2434 - [c110]Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov:
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. RAID 2017: 287-310 - [c109]Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. WISEC 2017: 122-133 - [i9]Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness. CoRR abs/1703.01537 (2017) - [i8]Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - [i7]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CoRR abs/1705.07289 (2017) - [i6]Vincent Bindschaedler, Reza Shokri, Carl A. Gunter:
Plausible Deniability for Privacy-Preserving Data Synthesis. CoRR abs/1708.07975 (2017) - [i5]Yunhui Long, Vincent Bindschaedler, Carl A. Gunter:
Towards Measuring Membership Privacy. CoRR abs/1712.09136 (2017) - 2016
- [j34]David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner:
Privacy and Security in Mobile Health: A Research Agenda. Computer 49(6): 22-30 (2016) - [c108]Güliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter:
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. CCS 2016: 104-115 - [c107]Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne Southall Winslett, Carl A. Gunter, William P. King:
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. CCS 2016: 883-894 - [c106]Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl A. Gunter:
Free for All! Assessing User Data Exposure to Advertising Libraries on Android. NDSS 2016 - [c105]Aston Zhang, Amit Goyal, Ricardo Baeza-Yates, Yi Chang, Jiawei Han, Carl A. Gunter, Hongbo Deng:
Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach. WWW 2016: 579-590 - 2015
- [j33]David Kotz, Kevin Fu, Carl A. Gunter, Aviel D. Rubin:
Security for mobile and cloud frontiers in healthcare. Commun. ACM 58(8): 21-23 (2015) - [j32]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. ACM Comput. Surv. 48(1): 6:1-6:44 (2015) - [j31]Charles P. Friedman, Joshua C. Rubin, Jeffrey S. Brown, Melinda Buntin, Milton Corn, Lynn Etheredge, Carl A. Gunter, Mark A. Musen, Richard Platt, William W. Stead, Kevin Sullivan, Douglas Van Houweling:
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System. J. Am. Medical Informatics Assoc. 22(1): 43-50 (2015) - [j30]You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl A. Gunter, Siddharth Gupta, Abel N. Kho, David M. Liebovitz, Jimeng Sun, Joshua C. Denny, Bradley A. Malin:
Building bridges across electronic health record systems through inferred phenotypic topics. J. Biomed. Informatics 55: 82-93 (2015) - [c104]You Chen, Wei Xie, Carl A. Gunter, David M. Liebovitz, Sanjay Mehrotra, He Zhang, Bradley A. Malin:
Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA 2015 - [c103]Xun Lu, Aston Zhang, Carl A. Gunter, Daniel Fabbri, David M. Liebovitz, Bradley A. Malin:
Discovering de facto diagnosis specialties. BCB 2015: 7-16 - [c102]Michael LeMay, Carl A. Gunter:
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. Logic, Rewriting, and Concurrency 2015: 404-426 - [c101]Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. NDSS 2015 - [c100]Aston Zhang, Amit Goyal, Weize Kong, Hongbo Deng, Anlei Dong, Yi Chang, Carl A. Gunter, Jiawei Han:
adaQAC: Adaptive Query Auto-Completion via Implicit Negative Feedback. SIGIR 2015: 143-152 - [i4]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. IACR Cryptol. ePrint Arch. 2015: 563 (2015) - 2014
- [c99]Dongjing He, Muhammad Naveed, Carl A. Gunter, Klara Nahrstedt:
Security Concerns in Android mHealth Apps. AMIA 2014 - [c98]Prateek Jindal, Dan Roth, Carl A. Gunter:
Joint inference for end-to-end coreference resolution for clinical notes. BCB 2014: 192-201 - [c97]Prateek Jindal, Carl A. Gunter, Dan Roth:
Detecting privacy-sensitive events in medical text. BCB 2014: 617-620 - [c96]Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick N. Lawlor, David M. Liebovitz, Bradley A. Malin:
Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. CCS 2014: 1182-1192 - [c95]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c94]Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c93]Aston Zhang, Xing Xie, Kevin Chen-Chuan Chang, Carl A. Gunter, Jiawei Han, XiaoFeng Wang:
Privacy Risk in Anonymized Heterogeneous Information Networks. EDBT 2014: 595-606 - [c92]Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A. Gunter:
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. NDSS 2014 - [c91]Carl A. Gunter:
Detecting Roles and Anomalies in Hospital Access Audit Logs. SafeConfig 2014: 1 - [c90]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IEEE Symposium on Security and Privacy 2014: 639-654 - [i3]Michael LeMay, Carl A. Gunter:
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. CoRR abs/1404.3465 (2014) - [i2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy and Security in the Genomic Era. CoRR abs/1405.1891 (2014) - [i1]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IACR Cryptol. ePrint Arch. 2014: 219 (2014) - 2013
- [j29]Denise L. Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andres Molina-Markham, Karen Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson:
Securing Information Technology in Healthcare. IEEE Secur. Priv. 11(6): 25-33 (2013) - [j28]He Zhang, Sanjay Mehrotra, David M. Liebovitz, Carl A. Gunter, Bradley A. Malin:
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits. ACM Trans. Manag. Inf. Syst. 4(4): 17:1-17:20 (2013) - [c89]Xiao-yong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt:
Identity, location, disease and more: inferring your secrets from android public resources. CCS 2013: 1017-1028 - [c88]Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz, Bradley A. Malin:
Modeling and detecting anomalous topic access. ISI 2013: 100-105 - [c87]Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Evolving role definitions through permission invocation patterns. SACMAT 2013: 37-48 - [c86]Eric Duffy, Steve Nyemba, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. HealthTech 2013 - 2012
- [j27]Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks. IEEE/ACM Trans. Netw. 20(3): 715-728 (2012) - [j26]Michael LeMay, Carl A. Gunter:
Cumulative Attestation Kernels for Embedded Systems. IEEE Trans. Smart Grid 3(2): 744-760 (2012) - [c85]Quanyan Zhu, Carl A. Gunter, Tamer Basar:
Tragedy of Anticommons in Digital Right Management of Medical Records. HealthSec 2012 - [e1]Carl A. Gunter, Zachary N. J. Peterson:
3rd USENIX Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012. USENIX Association 2012 [contents] - 2011
- [j25]Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. IEEE Secur. Priv. 9(5): 48-55 (2011) - [j24]Jianqing Zhang, Carl A. Gunter:
Application-aware secure multicast for power grid communications. Int. J. Secur. Networks 6(1): 40-52 (2011) - [j23]David C. Bergman, Dong (Kevin) Jin, Joshua Juen, Naoki Tanaka, Carl A. Gunter, Andrew K. Wright:
Nonintrusive Load-Shed Verification. IEEE Pervasive Comput. 10(1): 49-57 (2011) - [c84]Omid Fatemieh, Michael LeMay, Carl A. Gunter:
Reliable telemetry in white spaces using remote attestation. ACSAC 2011: 323-332 - [c83]Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi:
MyABDAC: compiling XACML policies for attribute-based database access control. CODASPY 2011: 97-108 - [c82]Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter:
Reconstructing Hash Reversal based Proof of Work Schemes. LEET 2011 - [c81]Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter:
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. NDSS 2011 - [c80]Md. Yusuf Sarwar Uddin, Ahmed Khurshid, Hee Dong Jung, Carl A. Gunter, Matthew Caesar, Tarek F. Abdelzaher:
Making DTNs robust against spoofing attacks with localized countermeasures. SECON 2011: 332-340 - [c79]Michael LeMay, Carl A. Gunter:
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor. TRUST 2011: 202-216 - [c78]Wen Zhang, Carl A. Gunter, David M. Liebovitz, Jian Tian:
Role Prediction Using Electronic Medical Record System Audits. HealthSec 2011 - 2010
- [j22]Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Based Messaging: Access Control and Confidentiality. ACM Trans. Inf. Syst. Secur. 13(4): 31:1-31:35 (2010) - [c77]Mohammad Maifi Hasan Khan, Hieu Khac Le, Michael LeMay, Paria Moinzadeh, Lili Wang, Yong Yang, Dong Kun Noh, Tarek F. Abdelzaher, Carl A. Gunter, Jiawei Han, Xin Jin:
Diagnostic powertracing for sensor node failure analysis. IPSN 2010: 117-128 - [c76]Fariba Khan, Carl A. Gunter:
Tiered Incentives for Integrity Based Queuing. NetEcon 2010: 8:1-8:7 - [c75]Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
EBAM: Experience-Based Access Management for Healthcare. HealthSec 2010
2000 – 2009
- 2009
- [j21]Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie:
Guest editorial network infrastructure configuration. IEEE J. Sel. Areas Commun. 27(3): 249-252 (2009) - [c74]Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett:
Implementing Reflective Access Control in SQL. DBSec 2009: 17-32 - [c73]Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer:
Model-Checking DoS Amplification for VoIP Session Initiation. ESORICS 2009: 390-405 - [c72]Michael LeMay, Carl A. Gunter:
Cumulative Attestation Kernels for Embedded Systems. ESORICS 2009: 655-670 - [c71]Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, Anh Nguyen:
Specifying and Analyzing Workflows for Automated Identification and Data Capture. HICSS 2009: 1-11 - [c70]Michael LeMay, Jason J. Haas, Carl A. Gunter:
Collaborative Recommender Systems for Building Automation. HICSS 2009: 1-10 - [c69]Michael J. May, Carl A. Gunter, Insup Lee, Steve Zdancewic:
Strong and Weak Policy Relations. POLICY 2009: 33-36 - [c68]Carl A. Gunter:
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. POLICY 2009: 114-117 - [c67]Kazuhiro Minami, Nikita Borisov, Carl A. Gunter:
Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12 - [c66]Alwyn Goodloe, Carl A. Gunter:
Completeness of discovery protocols. SafeConfig 2009: 29-36 - [c65]Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 - [c64]Alejandro Gutierrez, Apeksha Godiyal, Matt Stockton, Michael LeMay, Carl A. Gunter, Roy H. Campbell:
Sh@re: Negotiated Audit in Social Networks. SMC 2009: 74-79 - 2008
- [c63]Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo:
Using rhythmic nonces for puzzle-based DoS resistance. CSAW 2008: 51-58 - [c62]Lars E. Olson, Carl A. Gunter, P. Madhusudan:
A formal framework for reflective database access control policies. CCS 2008: 289-298 - [c61]Rohit Chadha, Carl A. Gunter, José Meseguer, Ravinder Shankesi, Mahesh Viswanathan:
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. FMOODS 2008: 39-58 - [c60]Michael LeMay, Rajesh Nelli, George Gross, Carl A. Gunter:
An Integrated Architecture for Demand Response Communications and Control. HICSS 2008: 174 - [c59]Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive SelectiveVerification. INFOCOM 2008: 529-537 - [c58]Musab AlTurki, José Meseguer, Carl A. Gunter:
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. SecReT@LICS/CSF 2008: 3-18 - 2007
- [j20]Ratul K. Guha, Carl A. Gunter, Saswati Sarkar:
Fair Coalitions for Power-Aware Routing in Wireless Networks. IEEE Trans. Mob. Comput. 6(2): 206-220 (2007) - [c57]Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila:
Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 - [c56]