Follow
Dan Fleck
Dan Fleck
Professor of Computer Science, George Mason University
Verified email at gmu.edu
Title
Cited by
Cited by
Year
Catch me if you can: A cloud-enabled DDoS defense
Q Jia, H Wang, D Fleck, F Li, A Stavrou, W Powell
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
1592014
A moving target DDoS defense mechanism
H Wang, Q Jia, D Fleck, W Powell, F Li, A Stavrou
Computer Communications 46, 10-21, 2014
1432014
Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users
R Murmuria, A Stavrou, D Barbará, D Fleck
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
932015
Strict virtual call integrity checking for c++ binaries
M Elsabagh, D Fleck, A Stavrou
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
342017
Detecting ROP with statistical learning of program characteristics
M Elsabagh, D Barbara, D Fleck, A Stavrou
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
312017
Pytrigger: A system to trigger & extract user-activated malware behavior
D Fleck, A Tokhtabayev, A Alarif, A Stavrou, T Nykodym
2013 International Conference on Availability, Reliability and Security, 92-101, 2013
312013
Microservices made attack-resilient using unsupervised service fissioning
AF Baarzi, G Kesidis, D Fleck, A Stavrou
Proceedings of the 13th European workshop on Systems Security, 31-36, 2020
192020
Affine invariant-based classification of inliers and outliers for image matching
D Fleck, Z Duric
Image Analysis and Recognition: 6th International Conference, ICIAR 2009 …, 2009
152009
Radmin: early detection of application-level resource exhaustion and starvation attacks
M Elsabagh, D Barbará, D Fleck, A Stavrou
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
142015
Practical and accurate runtime application protection against dos attacks
M Elsabagh, D Fleck, A Stavrou, M Kaplan, T Bowen
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
122017
On early detection of application-level resource exhaustion and starvation
M Elsabagh, D Barbará, D Fleck, A Stavrou
Journal of Systems and Software 137, 430-447, 2018
112018
Cloud-side shuffling defenses against ddos attacks on proxied multiserver systems
Y Shan, G Kesidis, D Fleck
Proceedings of the 2017 on Cloud Computing Security Workshop, 1-10, 2017
112017
Preliminary study of fission defenses against low-volume DoS attacks on proxied multiserver systems
Y Shan, G Kesidis, D Fleck, A Stavrou
2017 12th International Conference on Malicious and Unwanted Software …, 2017
112017
On the Move: Evading Distributed Denial-of-Service Attacks
A Stavrou, D Fleck, C Kolias
Computer 49 (03), 104-107, 2016
102016
Moving-target Defense against Botnet Reconnaissance and an Adversarial Coupon-Collection Model
D Fleck, A Stavrou, G Kesidis, N Nasiriani, Y Shan, T Konstantopoulos
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
72018
Using local affine invariants to improve image matching
D Fleck, Z Duric
2010 20th International Conference on Pattern Recognition, 1844-1847, 2010
62010
An adversarial coupon-collector model of asynchronous moving-target defense against botnet reconnaissance*
G Kesidis, Y Shan, D Fleck, A Stavrou, T Konstantopoulos
2018 13th International Conference on Malicious and Unwanted Software …, 2018
42018
A moving target and shuffle-decimation quarantine strategy to combat persistent DDoS attacks on a distributed, indirection server system in the cloud
G Kesidis, Y Shan, A Stavrou, D Fleck, T Konstantopoulos
CSE Dept, PSU, Technical Report CSE-16-012, 2016
42016
An evaluation of affine invariant-based classification for image matching
D Fleck, Z Duric
Advances in Visual Computing: 5th International Symposium, ISVC 2009, Las …, 2009
42009
Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems
Y Shan, G Kesidis, D Fleck, A Stavrou
arXiv preprint arXiv:1704.06794, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20