H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 6,923 94 World Ranking 6796 National Ranking 3241

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

Douglas S. Reeves focuses on Intrusion detection system, Computer security, Watermark, Quality of service and Focus. His work in the fields of Anomaly-based intrusion detection system overlaps with other areas such as Telnet. His Quality of service study necessitates a more in-depth grasp of Computer network.

The various areas that Douglas S. Reeves examines in his Computer network study include Distributed algorithm and Communication complexity. His work deals with themes such as Event and Data mining, which intersect with Focus. His Intrusion prevention system and Alert correlation study in the realm of Data mining connects with subjects such as Correlation.

His most cited work include:

  • Constructing attack scenarios through correlation of intrusion alerts (456 citations)
  • Evaluation of multicast routing algorithms for real-time communication on high-speed networks (314 citations)
  • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays (252 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer network, Computer security, Distributed computing, Quality of service and Intrusion detection system. His Computer network research is multidisciplinary, incorporating perspectives in Technical report and Cryptography. The concepts of his Computer security study are interwoven with issues in The Internet, BitTorrent and Tracing.

His research in Distributed computing intersects with topics in Link-state routing protocol, Static routing and Routing protocol. His Quality of service research includes themes of Distributed algorithm, Routing and Bandwidth. His work on Anomaly-based intrusion detection system as part of general Intrusion detection system study is frequently connected to Matching, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.

He most often published in these fields:

  • Computer network (41.88%)
  • Computer security (31.62%)
  • Distributed computing (23.08%)

What were the highlights of his more recent work (between 2009-2020)?

  • Computer security (31.62%)
  • Malware (11.11%)
  • Computer network (41.88%)

In recent papers he was focusing on the following fields of study:

His primary areas of study are Computer security, Malware, Computer network, Distributed computing and BitTorrent. His Anonymity study in the realm of Computer security interacts with subjects such as DNS spoofing. His Malware study combines topics in areas such as Theoretical computer science, System call and Cluster analysis.

His study of Bandwidth is a part of Computer network. Within one scientific family, Douglas S. Reeves focuses on topics pertaining to Resource allocation under Distributed computing, and may sometimes address concerns connected to Cryptography. Douglas S. Reeves interconnects Intrusion detection system and Hacker in the investigation of issues within Cryptovirology.

Between 2009 and 2020, his most popular works were:

  • Fast malware classification by automated behavioral graph matching (126 citations)
  • Deriving common malware behavior through graph clustering (61 citations)
  • EASEAndroid: automatic policy analysis and refinement for security enhanced android via large-scale semi-supervised learning (33 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Operating system

The scientist’s investigation covers issues in Computer security, Malware, Theoretical computer science, System call and Clustering coefficient. Borrowing concepts from Winnowing, he weaves in ideas under Computer security. His Malware research incorporates elements of Machine learning, Cluster analysis, Artificial intelligence and Virtualization.

His studies deal with areas such as Classification methods, Software, The Internet and False positive rate as well as Virtualization. His study in Theoretical computer science is interdisciplinary in nature, drawing from both Algorithm, Upper and lower bounds, Encryption and Robustness. His System call research incorporates themes from Cryptovirology, Scalability, Intrusion detection system and Hacker.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Constructing attack scenarios through correlation of intrusion alerts

Peng Ning;Yun Cui;Douglas S. Reeves.
computer and communications security (2002)

782 Citations

Evaluation of multicast routing algorithms for real-time communication on high-speed networks

H.F. Salama;D.S. Reeves;Y. Viniotis.
IEEE Journal on Selected Areas in Communications (1997)

578 Citations

Real-time communication in packet-switched networks

C.M. Aras;J.F. Kurose;D.S. Reeves;H. Schulzrinne.
Proceedings of the IEEE (1994)

427 Citations

Techniques and tools for analyzing intrusion alerts

Peng Ning;Yun Cui;Douglas S. Reeves;Dingbang Xu.
ACM Transactions on Information and System Security (2004)

384 Citations

Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays

Xinyuan Wang;Douglas S. Reeves.
computer and communications security (2003)

346 Citations

Analyzing intensive intrusion alerts via correlation

Peng Ning;Yun Cui;Douglas S. Reeves.
recent advances in intrusion detection (2002)

251 Citations

A distributed algorithm for delay-constrained unicast routing

H.F. Salama;D.S. Reeves;Y. Viniotis.
international conference on computer communications (1997)

242 Citations

Fast malware classification by automated behavioral graph matching

Younghee Park;Douglas Reeves;Vikram Mulukutla;Balaji Sundaravel.
cyber security and information intelligence research workshop (2010)

220 Citations

Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones

Xinyuan Wang;Douglas S. Reeves;Shyhtsun Felix Wu.
european symposium on research in computer security (2002)

215 Citations

A distributed algorithm for delay-constrained unicast routing

Douglas S. Reeves;Hussein F. Salama.
IEEE ACM Transactions on Networking (2000)

212 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Douglas S. Reeves

Christian Scheideler

Christian Scheideler

University of Paderborn

Publications: 33

Kang G. Shin

Kang G. Shin

University of Michigan–Ann Arbor

Publications: 23

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 23

Xinwen Fu

Xinwen Fu

University of Massachusetts Lowell

Publications: 22

Saurabh Bagchi

Saurabh Bagchi

Purdue University West Lafayette

Publications: 18

Wei Zhao

Wei Zhao

Shenzhen Institutes of Advanced Technology

Publications: 18

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 18

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 15

Wei Yu

Wei Yu

Towson University

Publications: 15

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 15

Peng Ning

Peng Ning

Google (United States)

Publications: 15

Ali A. Ghorbani

Ali A. Ghorbani

University of New Brunswick

Publications: 14

Lang Tong

Lang Tong

Cornell University

Publications: 13

Nikita Borisov

Nikita Borisov

University of Illinois at Urbana-Champaign

Publications: 12

Marwan Krunz

Marwan Krunz

University of Arizona

Publications: 12

Hossam S. Hassanein

Hossam S. Hassanein

Queen's University

Publications: 11

Something went wrong. Please try again later.