Follow
Stephen Neville
Stephen Neville
Verified email at uvic.ca
Title
Cited by
Cited by
Year
Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis
YO Yazir, C Matthews, R Farahbod, S Neville, A Guitouni, S Ganti, ...
2010 IEEE 3rd International Conference on Cloud Computing, 91-98, 2010
3472010
System for regulating wireless device operations in wireless networks
B Chow, H MacDonald, D Yarish, T Darcie, S Neville, AS Kroeker
US Patent 9,451,451, 2016
1122016
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software …, 2008
942008
Verification of secret key generation from UWB channel observations
MG Madiseh, S He, ML McGuire, SW Neville, X Dong
2009 IEEE International Conference on Communications, 1-5, 2009
722009
Secret key generation and agreement in UWB communication channels
MG Madiseh, ML McGuire, SS Neville, L Cai, M Horie
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
702008
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
Computer Security-ESORICS 2008: 13th European Symposium on Research in …, 2008
662008
Consumers' sentiment analysis of popular phone brands and operating system preference using Twitter data: A feasibility study
D Arora, KF Li, SW Neville
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
602015
Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation
MG Madiseh, SW Neville, ML McGuire
IEEE Transactions on Information Forensics and Security 7 (4), 1278-1287, 2012
592012
Maitland: Lighter-weight vm introspection to support cyber-security in the cloud
C Benninger, SW Neville, YO Yazir, C Matthews, Y Coady
2012 IEEE Fifth International Conference on Cloud Computing, 471-478, 2012
572012
Secure protocol for transactions
SW Neville, M Horie
US Patent 8,768,854, 2014
492014
Secret key extraction in ultra wideband channels for unsynchronized radios
MG Madiseh, ML McGuire, SW Neville, AAB Shirazi
6th Annual Communication Networks and Services Research Conference (cnsr …, 2008
472008
Wavelet denoising of coarsely quantized signals
S Neville, N Dimopoulos
IEEE Transactions on Instrumentation and Measurement 55 (3), 892-901, 2006
372006
Optimising sybil attacks against P2P-based botnets
CR Davis, JM Fernandez, S Neville
2009 4th International Conference on Malicious and Unwanted Software …, 2009
342009
System and method for evaluating wireless device and/or wireless network performance
BS Chow, HBB Macdonald, DD Yarish, AS Kroeker, SW Neville, ...
US Patent 10,827,371, 2020
302020
DockerSim: Full-stack simulation of container-based Software-as-a-Service (SaaS) cloud deployments and environments
Z Nikdel, B Gao, SW Neville
2017 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2017
292017
STARS: A framework for statistically rigorous simulation-based network research
E Millman, D Arora, SW Neville
2011 IEEE Workshops of International Conference on Advanced Information …, 2011
272011
The rational for developing larger-scale 1000+ machine emulation-based research test beds
SW Neville, KF Li
2009 International Conference on Advanced Information Networking and …, 2009
172009
Method and system of controlling spam
SW Neville, M Horie
US Patent 9,137,138, 2015
152015
Efficiently achieving full three-way non-repudiation in consumer-level ecommerce and M-Commerce transactions
SW Neville, M Horie
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
132011
Time correlation analysis of secret key generation via uwb channels
MG Madiseh, SW Neville, ML McGuire
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
132010
The system can't perform the operation now. Try again later.
Articles 1–20