Publications

Export 14 results:
Author Title [ Type(Desc)] Year
Filters: Author is Thompson, Mark  [Clear All Filters]
Conference Paper
J. Vempati, Dantu, R., Badruddoja, S., and Thompson, M., Adaptive and Predictive SDN Control During DDoS Attacks, in 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), 2020.PDF icon Adaptive_and_Predictive_SDN_Control_During_DDoS_Attacks.pdf (1.5 MB)
A. Muttavarapu, Dantu, R., and Thompson, M., Distributed Ledger for Spammers' Resume, in 2019 IEEE Conference on Communications and Network Security (CNS), 2019.PDF icon Digital_Ledger_Spammer_Resume.pdf (774.1 KB)
J. Vempati, Thompson, M., and Dantu, R., Feedback Control for Resiliency in Face of an Attack, in Proceedings of the 12th Annual Conference on Cyber and Information Security Research, New York, NY, USA, 2017.PDF icon Feedback_Control_Resiliency_Face_Attack.pdf (1.02 MB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Making Smart Contracts Predict and Scale, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Making_Smart_Contracts_Predict_and_Scale.pdf (1.4 MB)
S. Badruddoja, Dantu, R., He, Y., Upadhayay, K., and Thompson, M., Making Smart Contracts Smarter, in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia, 2021.PDF icon Making_Smart_Contracts_Smarter.pdf (998.18 KB)
S. Thiyagaraja, Dantu, R., Shrestha, P., Thompson, M., and Smith, C., Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices, in 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2017.PDF icon Optimized_Secured_Transmission_Retrieval_Vital_Signs_Remote_Devices.pdf (348.53 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)
J. Germain, Dantu, R., Thompson, M., and Dockendorf, M., Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation, in 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), 2022.PDF icon Quantum_Networks_Reset-and-Reuse_can_be_a_Game-changer_for_Entanglement_via_Distillation.pdf (1.03 MB)
J. Germain, Dantu, R., and Thompson, M., Qubit Reset and Refresh: A Gamechanger for Random Number Generation, in Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY ), 2022.PDF icon Qubit Reset and Refresh: A Gamechanger for Random Number Generation.pdf (1.08 MB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Smarter Contracts to Predict using Deep-Learning Algorithms, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Smarter_Contracts_to_Predict_using_Deep-Learning_Algorithms.pdf (1.01 MB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Trusted AI with Blockchain to Empower Metaverse, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Trusted_AI_with_Blockchain_to_Empower_Metaverse.pdf (1.04 MB)
J. Vempati, Dantu, R., and Thompson, M., Uninterrupted Video Surveillance in the Face of an Attack, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018.PDF icon Uninterrupted_Video_Surveillance_Attack.pdf (681.67 KB)