Follow
Douglas H Summerville
Douglas H Summerville
Binghamton University, State University of New York
Verified email at binghamton.edu
Title
Cited by
Cited by
Year
Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices
DH Summerville, KM Zach, Y Chen
IEEE International Performance Computing and Communications Conference, 2015
1792015
A survey on the application of FPGAs for network infrastructure security
H Chen, Y Chen, DH Summerville
IEEE Communications Surveys & Tutorials 13 (4), 541-561, 2010
962010
Enhancing cloud storage security against roll-back attacks with a new fair multi-party non-repudiation protocol
J Feng, Y Chen, D Summerville, WS Ku, Z Su
2011 IEEE Consumer Communications and Networking Conference (CCNC), 521-522, 2011
572011
Fast DDP-based ciphers: from hardware to software
ND Goots, NA Moklovyan, PA Moldovyanu, DH Summerville
2003 46th Midwest Symposium on Circuits and Systems 2, 770-773, 2003
362003
A fair multi-party non-repudiation scheme for storage clouds
J Feng, Y Chen, DH Summerville
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
292011
Prevention of information attacks by run-time detection of self-replication in computer codes
V Skormin, A Volynkin, D Summerville, J Moronski
Journal of Computer Security 15 (2), 273-302, 2007
242007
Detecting Malicious Codes by the Presence of Their “Gene of Self-replication”
VA Skormin, DH Summerville, JS Moronski
Computer Network Security: Second International Workshop on Mathematical …, 2003
232003
A programmable dynamic interconnection network router with hidden refresh
JG Delgado-Frias, J Nyathi, DH Summerville
IEEE Transactions on Circuits and Systems I: Fundamental Theory and …, 1998
221998
Detection of anomalous network packets using lightweight stateless payload inspection
N Nwanze, D Summerville
2008 33rd IEEE Conference on Local Computer Networks (LCN), 911-918, 2008
212008
On Software Implementation of Fast DDP-based Ciphers.
NA Moldovyan, PA Moldovyanu, DH Summerville
Int. J. Netw. Secur. 4 (1), 81-89, 2007
192007
Two-stage decomposition of SNORT rules towards efficient hardware implementation
H Chen, DH Summerville, Y Chen
2009 7th International Workshop on Design of Reliable Communication Networks …, 2009
172009
Run-Time detection of malicious self-replication in binary executables
V Skormin, A Volynkin, D Summerville, J Moronski
Journal of Computer Security 15 (2), 273-301, 2007
172007
Evaluation of run-time detection of self-replication in binary executable malware
Volynkin, Skormin, Summerville, Moronski
2006 IEEE Information Assurance Workshop, 184-191, 2006
142006
An optimized reconfigurable power spectral density converter for real-time shrew DDoS attacks detection
H Chen, T Gaska, Y Chen, D Summerville
Computers \& Electrical Engineering 39 (2), 295-308, 2013
132013
Wireless networks security and cipher design based on data-dependent operations: Classification of the FPGA suitable controlled elements
N Moldovyan, A Moldovyan, M Eremeev, D Summerville
Proceedings of the CCCT 4, 123-128, 2004
132004
EEO: An efficient MDS-like RAID-6 code for parallel implementation
J Feng, Y Chen, D Summerville
2010 IEEE Sarnoff Symposium, 1-5, 2010
122010
A VLSI interconnection network router using a D-CAM with hidden refresh
JG Delgado-Frias, J Nyathi, CL Miller, DH Summerville
Proceedings of the Sixth Great Lakes Symposium on VLSI, 246-251, 1996
121996
Embedded Systems Interfacing for Engineers using the Freescale HCS08 Microcontroller II: Digital and Analog Hardware Interfacing
DH Summerville
Synthesis Lectures on Digital Circuits and Systems 4 (1), 1-139, 2009
112009
Associative ternary cache for IP routing
JJ Rooney, JG Delgado-Frias, DH Summerville
IEE Proceedings-Computers and Digital Techniques 151 (6), 409-416, 2004
112004
Anomalous packet identification for network intrusion detection
DH Summerville, N Nwanze, VA Skormin
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
112004
The system can't perform the operation now. Try again later.
Articles 1–20