Michael Donald Bailey

20042019
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 3 Similar Profiles
Internet Engineering & Materials Science
Ecosystems Engineering & Materials Science
Network protocols Engineering & Materials Science
Internet protocols Engineering & Materials Science
Scanning Engineering & Materials Science
Packers Engineering & Materials Science
Communication Engineering & Materials Science
Malware Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2004 2019

Emerging threats in internet of things voice services

Kumar, D., Paccagnella, R., Murley, P., Hennenfent, E., Mason, J., Bates, A. M. & Bailey, M. D., Jul 1 2019, In : IEEE Security and Privacy. 17, 4, p. 18-24 7 p., 8718807.

Research output: Contribution to journalArticle

Speech recognition
threat
Engines
Internet
interpretation

Outguard: Detecting in-browser covert cryptocurrency mining in the wild

Kharraz, A., Lever, C., Borisov, N., Ma, Z., Mason, J., Antonakakis, M., Murley, P., Miller, A. E. & Bailey, M. D., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 840-852 13 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Web browsers
Paint
Ecosystems
Electronic money

Measuring ethereum network peers

Kim, S. K., Mason, J., Ma, Z., Miller, A. E., Murali, S. & Bailey, M. D., Oct 31 2018, IMC 2018 - Proceedings of the Internet Measurement Conference. Association for Computing Machinery, p. 91-104 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical distribution
Peer to peer networks
Ecosystems
Semantics
Electronic money

Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control

Liu, Z., Jin, H., Hu, Y-C. & Bailey, M. D., Aug 2018, In : IEEE/ACM Transactions on Networking. 26, 4, p. 1948-1961 14 p., 8418343.

Research output: Contribution to journalArticle

Traffic control
Internet
Testbeds
Computer hardware
Industry

SoK: 'Plug & Pray' Today-Understanding USB Insecurity in Versions 1 Through C

Tian, J., Scaife, N., Kumar, D., Bailey, M. D., Bates, A. M. & Butler, K., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 1032-1047 16 p. 8418652. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Specifications
Defects
Taxonomies
Authentication