2014 - ACM Senior Member
2014 - Fellow of Alfred P. Sloan Foundation
His primary areas of investigation include Computer security, Denial-of-service attack, The Internet, Cellular network and Computer network. In the field of Computer security, his study on Malware and Encryption overlaps with subjects such as Architecture. In general Encryption study, his work on Cryptosystem often relates to the realm of False positive paradox, thereby connecting several areas of interest.
In his study, which falls under the umbrella issue of Denial-of-service attack, Resource management is strongly linked to Cable modem. His The Internet research integrates issues from Telecommunications, Radio access network, Mobile device and Public land mobile network. His research in Computer network is mostly focused on Provisioning.
Patrick Traynor mainly focuses on Computer security, Computer network, Cryptography, Internet privacy and The Internet. The various areas that he examines in his Computer security study include Cellular network and Denial-of-service attack. His Computer network research is multidisciplinary, incorporating perspectives in Adversary, Voice over IP and Mobile device.
His Cryptography research focuses on Protocol and how it relates to Outsourcing. His Internet privacy study combines topics from a wide range of disciplines, such as Web application, Mobile payment and Network security. Patrick Traynor works mostly in the field of The Internet, limiting it down to topics relating to Wireless and, in certain cases, Transmission.
The scientist’s investigation covers issues in Computer security, Speech recognition, Speaker recognition, Protocol and Cryptography. The Computer security study combines topics in areas such as Payment card, Payment and Deprecation. His Speech recognition study also includes fields such as
His Protocol research is classified as research in Computer network. His study on Cryptography also encompasses disciplines like
Computer security, Protocol, Payment, Authentication and Cryptography are his primary areas of study. His studies in Computer security integrate themes in fields like Handshake and Payment card. His Protocol research is included under the broader classification of Computer network.
Much of his study explores Computer network relationship to The Internet. Patrick Traynor has researched Authentication in several fields, including Computer hardware, Microphone, Hash function, Usability and Voice command device. His Cryptography research incorporates elements of Scheme, Instructions per second, Oracle and Guard.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Secure attribute-based systems
Matthew Pirretti;Patrick Traynor;Patrick Mcdaniel;Brent Waters.
Journal of Computer Security (2010)
Secure attribute-based systems
Matthew Pirretti;Patrick Traynor;Patrick Mcdaniel;Brent Waters.
Journal of Computer Security (2010)
Secure attribute-based systems
Matthew Pirretti;Patrick Traynor;Patrick McDaniel;Brent Waters.
computer and communications security (2006)
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Nolen Scaife;Henry Carter;Patrick Traynor;Kevin R. B. Butler.
international conference on distributed computing systems (2016)
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Nolen Scaife;Henry Carter;Patrick Traynor;Kevin R. B. Butler.
international conference on distributed computing systems (2016)
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Patrick Traynor;Michael Lin;Machigar Ongtang;Vikhyath Rao.
computer and communications security (2009)
Exploiting open functionality in SMS-capable cellular networks
William Enck;Patrick Traynor;Patrick McDaniel;Thomas La Porta.
computer and communications security (2005)
Exploiting open functionality in SMS-capable cellular networks
William Enck;Patrick Traynor;Patrick McDaniel;Thomas La Porta.
computer and communications security (2005)
MAST: triage for market-scale mobile malware analysis
Saurabh Chakradeo;Bradley Reaves;Patrick Traynor;William Enck.
wireless network security (2013)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Florida
Pennsylvania State University
North Carolina State University
Pennsylvania State University
Georgia Institute of Technology
Pennsylvania State University
Pennsylvania State University
Georgia Institute of Technology
Technical University of Darmstadt
Carleton University
Technical University of Munich
University of Western Ontario
Anello Photonics
National Institutes of Natural Sciences
University of Notre Dame
University of Amsterdam
National Autonomous University of Mexico
University of Alberta
Oregon State University
Forschungszentrum Jülich
University of Michigan–Ann Arbor
Federal University of Toulouse Midi-Pyrénées
Concordia University
Queens College, CUNY
University of Padua
University of Edinburgh