default search action
Craig A. Shue
Person information
- affiliation: Worcester Polytechnic Institute, Worcester, MA, USA
- affiliation: Oak Ridge National Laboratory, Oak Ridge, TN, USA
- affiliation: Indiana University, Bloomington, IN, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c44]Yunsen Lei, Julian P. Lanson, Craig A. Shue, Timothy W. Wood:
Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities. DIMVA 2023: 177-197 - [c43]Shuwen Liu, Joseph P. Petitti, Yunsen Lei, Yu Liu, Craig A. Shue:
By Your Command: Extracting the User Actions that Create Network Flows in Android. NoF 2023: 118-122 - [c42]Shuwen Liu, Yu Liu, Craig A. Shue:
Inspecting Traffic in Residential Networks with Opportunistically Outsourced Middleboxes. NOMS 2023: 1-7 - [c41]Adam Beauchaine, Craig A. Shue:
Toward a (Secure) Path of Least Resistance: An Examination of Usability Challenges in Secure Sandbox Systems. TPS-ISA 2023: 240-246 - 2022
- [c40]Matthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue:
Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems. ICICS 2022: 184-200 - [c39]Zorigtbaatar Chuluundorj, Shuwen Liu, Craig A. Shue:
Generating Stateful Policies for IoT Device Security with Cross-Device Sensors. NoF 2022: 1-9 - [c38]Matthew A. Puentes, Yunsen Lei, Noëlle Rakotondravony, Lane T. Harrison, Craig A. Shue:
Visualizing Web Application Execution Logs to Improve Software Security Defect Localization. SANER 2022: 1183-1190 - 2021
- [c37]Yu Liu, Craig A. Shue:
Avoiding VPN Bottlenecks: Exploring Network-Level Client Identity Validation Options. QSHINE 2021: 280-300 - [c36]Zorigtbaatar Chuluundorj, Curtis R. Taylor, Robert J. Walls, Craig A. Shue:
Can the User Help? Leveraging User Actions for Network Profiling. SDS 2021: 1-8 - 2020
- [c35]Yu Liu, Craig A. Shue:
Beyond the VPN: Practical Client Identity in an Internet with Widespread IP Address Sharing. LCN 2020: 425-428 - [c34]Yunsen Lei, Julian P. Lanson, Remy M. Kaldawy, Jeffrey Estrada, Craig A. Shue:
Can Host-Based SDNs Rival the Traffic Engineering Abilities of Switch-Based SDNs? NOF 2020: 91-99 - [c33]Yu Liu, Craig A. Shue:
Community Cleanup: Incentivizing Network Hygiene via Distributed Attack Reporting. NOMS 2020: 1-9
2010 – 2019
- 2019
- [c32]Robert J. Walls, Nicholas F. Brown, Thomas Le Baron, Craig A. Shue, Hamed Okhravi, Bryan C. Ward:
Control-Flow Integrity for Real-Time Embedded Systems. ECRTS 2019: 2:1-2:24 - [c31]Yu Liu, Curtis R. Taylor, Craig A. Shue:
Authenticating Endpoints and Vetting Connections in Residential Networks. ICNC 2019: 136-140 - [c30]Yu Liu, Matthew R. Squires, Curtis R. Taylor, Robert J. Walls, Craig A. Shue:
Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks. SecureComm (2) 2019: 26-46 - [c29]Yunsen Lei, Craig A. Shue:
Detecting Root-Level Endpoint Sensor Compromises with Correlated Activity. SecureComm (2) 2019: 273-286 - 2017
- [j7]Douglas C. MacFarland, Craig A. Shue, Andrew J. Kalafut:
The best bang for the byte: Characterizing the potential of DNS amplification attacks. Comput. Networks 116: 12-21 (2017) - [c28]Mohamed E. Najd, Craig A. Shue:
DeepContext: An OpenFlow-Compatible, Host-Based SDN for Enterprise Networks. LCN 2017: 112-119 - [c27]Curtis R. Taylor, Tian Guo, Craig A. Shue, Mohamed E. Najd:
On the feasibility of cloud-based SDN controllers for residential networks. NFV-SDN 2017: 1-6 - 2016
- [c26]Curtis R. Taylor, Craig A. Shue:
Validating security protocols with cloud-based middleboxes. CNS 2016: 261-269 - [c25]Curtis R. Taylor, Craig A. Shue, Mohamed E. Najd:
Whole home proxies: Bringing enterprise-grade security to residential networks. ICC 2016: 1-6 - [c24]Curtis R. Taylor, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue:
Contextual, flow-based access control with scalable host-based SDN techniques. INFOCOM 2016: 1-9 - 2015
- [c23]Marc Green, Douglas C. MacFarland, Doran R. Smestad, Craig A. Shue:
Characterizing Network-Based Moving Target Defenses. MTD@CCS 2015: 31-35 - [c22]Douglas C. MacFarland, Craig A. Shue:
The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking. MTD@CCS 2015: 37-41 - [c21]Douglas C. MacFarland, Craig A. Shue, Andrew J. Kalafut:
Characterizing Optimal DNS Amplification Attacks and Effective Mitigation. PAM 2015: 15-27 - 2014
- [c20]Daniel J. Robertson, Craig A. Shue, Krishna K. Venkatasubramanian, Curtis R. Taylor:
Bandwidth aggregation in allied WiFi routers. GLOBECOM Workshops 2014: 254-258 - [c19]Curtis R. Taylor, Krishna K. Venkatasubramanian, Craig A. Shue:
Understanding the security of interoperable medical devices using attack graphs. HiCoNS 2014: 31-40 - [c18]Ryan A. Danas, Douglas T. Lally, Nathaniel W. Miller, John S. Synnott, Craig A. Shue, Hassan Ghasemzadeh, Krishna Kumar Venkatasubramanian:
Designing user-specific plug-n-play into body area networks. MobileHealth@MobiHoc 2014: 13-18 - [c17]Russell Toris, Craig A. Shue, Sonia Chernova:
Message authentication codes for secure remote non-native client connections to ROS enabled robots. TePRA 2014: 1-6 - 2013
- [j6]Craig A. Shue, Andrew J. Kalafut:
Resolvers Revealed: Characterizing DNS Resolvers and their Clients. ACM Trans. Internet Techn. 12(4): 14:1-14:17 (2013) - [c16]David N. Muchene, Klevis Luli, Craig A. Shue:
Reporting Insider Threats via Covert Channels. IEEE Symposium on Security and Privacy Workshops 2013: 68-71 - [c15]Craig A. Shue, Nathanael Paul, Curtis R. Taylor:
From an IP Address to a Street Address: Using Wireless Signals to Locate a Target. WOOT 2013 - 2012
- [j5]Craig A. Shue, Andrew J. Kalafut, Mark Allman, Curtis R. Taylor:
On building inexpensive network capabilities. Comput. Commun. Rev. 42(2): 72-79 (2012) - [j4]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
Abnormally Malicious Autonomous Systems and Their Internet Connectivity. IEEE/ACM Trans. Netw. 20(1): 220-230 (2012) - [c14]Érik Archambault, Craig A. Shue:
Understanding new anonymity networks from a user's perspective. CCS 2012: 995-997 - 2011
- [j3]Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta:
Touring DNS Open Houses for Trends and Configurations. IEEE/ACM Trans. Netw. 19(6): 1666-1675 (2011) - [c13]Aaron Mishtal, Craig A. Shue, Stephen Kelley:
A system for intelligent substitution of named entities with applications to the automatic generation of honey tokens. CSIIRW 2011: 43 - [c12]Curtis R. Taylor, Craig A. Shue:
Implementing a "moving target" system to protect servers. CSIIRW 2011: 81 - [c11]Craig A. Shue, Brent Lagesse:
Embracing the cloud for better cyber security. PerCom Workshops 2011: 245-250 - 2010
- [j2]Craig A. Shue, Minaxi Gupta:
An Internet without the Internet protocol. Comput. Networks 54(18): 3232-3245 (2010) - [c10]Stan L. Bowie, Brenda S. Lenard, Craig A. Shue:
Towards an empirical measure for assessing public attitudes regarding government cybercrime countermeasures. CSIIRW 2010: 31 - [c9]Craig A. Shue, Minaxi Gupta:
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity. HICSS 2010: 1-10 - [c8]Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta:
Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems. INFOCOM 2010: 326-330 - [e1]Ehab Al-Shaer, Brent Lagesse, Craig A. Shue:
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0092-6 [contents]
2000 – 2009
- 2009
- [c7]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
A Unified Approach to Intra-domain Security. CSE (3) 2009: 219-224 - [c6]Craig A. Shue, Minaxi Gupta:
Sensitive Data Requests: Do Sites Ask Correctly? ICC 2009: 1-5 - 2008
- [j1]Craig A. Shue, Minaxi Gupta, Matthew P. Davy:
Packet forwarding with source verification. Comput. Networks 52(8): 1567-1582 (2008) - [c5]Andrew J. Kalafut, Craig A. Shue, Minaxi Gupta:
Understanding implications of DNS zone provisioning. Internet Measurement Conference 2008: 211-216 - [c4]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
Exploitable Redirects on the Web: Identification, Prevalence, and Defense. WOOT 2008 - 2007
- [c3]Craig A. Shue, Minaxi Gupta, Steven A. Myers:
IPSec: Performance Analysis and Enhancements. ICC 2007: 1527-1532 - [c2]Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
The web is smaller than it seems. Internet Measurement Conference 2007: 123-128 - 2006
- [c1]Jonathan W. Mills, Matt Parker, Bryce Himebaugh, Craig A. Shue, Brian Kopecky, Chris Weilemann:
"Empty space" computes: the evolution of an unconventional supercomputer. Conf. Computing Frontiers 2006: 115-126
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint