Follow
Craig A. Shue
Craig A. Shue
Professor and Department Head of Computer Science, Worcester Polytechnic Institute
Verified email at cs.wpi.edu - Homepage
Title
Cited by
Cited by
Year
The SDN shuffle: Creating a moving-target defense using host-based software-defined networking
DC MacFarland, CA Shue
Proceedings of the second ACM workshop on moving target defense, 37-41, 2015
1352015
Abnormally malicious autonomous systems and their internet connectivity
CA Shue, AJ Kalafut, M Gupta
IEEE/ACM Transactions on Networking 20 (1), 220-230, 2011
642011
Control-flow integrity for real-time embedded systems
RJ Walls, NF Brown, T Le Baron, CA Shue, H Okhravi, BC Ward
31st Euromicro Conference on Real-Time Systems (ECRTS 2019), 2019
532019
Characterizing network-based moving target defenses
M Green, DC MacFarland, DR Smestad, CA Shue
Proceedings of the Second ACM Workshop on Moving Target Defense, 31-35, 2015
512015
Analysis of IPSec overheads for VPN servers
C Shue, Y Shin, M Gupta, JY Choi
1st IEEE ICNP Workshop on Secure Network Protocols, 2005.(NPSec)., 25-30, 2005
502005
Characterizing optimal DNS amplification attacks and effective mitigation
DC MacFarland, CA Shue, AJ Kalafut
Passive and Active Measurement: 16th International Conference, PAM 2015, New …, 2015
482015
" Empty space" computes: the evolution of an unconventional supercomputer
JW Mills, M Parker, B Himebaugh, C Shue, B Kopecky, C Weilemann
Proceedings of the 3rd Conference on Computing Frontiers, 115-126, 2006
422006
Ipsec: Performance analysis and enhancements
CA Shue, M Gupta, SA Myers
2007 IEEE International Conference on Communications, 1527-1532, 2007
402007
The best bang for the byte: Characterizing the potential of DNS amplification attacks
DC MacFarland, CA Shue, AJ Kalafut
Computer Networks 116, 12-21, 2017
382017
Message authentication codes for secure remote non-native client connections to ros enabled robots
R Toris, C Shue, S Chernova
2014 IEEE International Conference on Technologies for Practical Robot …, 2014
382014
Malicious hubs: detecting abnormally malicious autonomous systems
AJ Kalafut, CA Shue, M Gupta
2010 Proceedings IEEE INFOCOM, 1-5, 2010
372010
Contextual, flow-based access control with scalable host-based SDN techniques
CR Taylor, DC MacFarland, DR Smestad, CA Shue
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
332016
Architecture for removable media USB-ARM
CA Shue, LM Lamb, NR Paul
US Patent 9,081,960, 2015
322015
On building inexpensive network capabilities
CA Shue, AJ Kalafut, M Allman, CR Taylor
ACM SIGCOMM Computer Communication Review 42 (2), 72-79, 2012
312012
Understanding implications of DNS zone provisioning
AJ Kalafut, CA Shue, M Gupta
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, 211-216, 2008
312008
The web is smaller than it seems
CA Shue, AJ Kalafut, M Gupta
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, 123-128, 2007
312007
Resolvers revealed: Characterizing DNS resolvers and their clients
CA Shue, AJ Kalafut
ACM Transactions on Internet Technology (TOIT) 12 (4), 1-17, 2013
272013
Understanding the security of interoperable medical devices using attack graphs
CR Taylor, K Venkatasubramanian, CA Shue
Proceedings of the 3rd international conference on High confidence networked …, 2014
262014
Automatic construction of anomaly detectors from graphical models
EM Ferragut, DM Darmon, CA Shue, S Kelley
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), 9-16, 2011
222011
Packet forwarding: Name-based vs. prefix-based
CA Shue, M Gupta
2007 IEEE Global Internet Symposium, 73-78, 2007
212007
The system can't perform the operation now. Try again later.
Articles 1–20