A layered approach to insider threat detection and proactive forensics P Bradford, N Hu Proceedings of the Twenty-First Annual Computer Security Applications …, 2005 | 51 | 2005 |
Towards proactive computer-system forensics PG Bradford, M Brown, J Perdue, B Self International Conference on Information Technology: Coding and Computing …, 2004 | 49 | 2004 |
Applying role based access control and genetic algorithms to insider threat detection N Hu, PG Bradford, J Liu Proceedings of the 44th annual Southeast regional conference, 790-791, 2006 | 39 | 2006 |
Single column discrepancy and dynamic max-mini optimizations for quickly finding the most parsimonious evolutionary trees PW Purdom, Jr, PG Bradford, K Tamura, S Kumar Bioinformatics 16 (2), 140-151, 2000 | 39 | 2000 |
Efficient matrix chain ordering in polylog time PG Bradford, GJE Rawlins, GE Shannon SIAM Journal on Computing 27 (2), 466-490, 1998 | 39* | 1998 |
Optimal prefix-free codes for unequal letter costs: Dynamic programming with the Monge property P Bradford, MJ Golin, LL Larmore, W Rytter Journal of Algorithms 42 (2), 277-303, 2002 | 36 | 2002 |
Matching nuts and bolts faster N Alon, PG Bradford, R Fleischer Information processing letters 59 (3), 123-127, 1996 | 35 | 1996 |
Implementing the TEA algorithm on sensors S Liu, OV Gavrylyako, PG Bradford Proceedings of the 42nd annual Southeast regional conference, 64-69, 2004 | 33 | 2004 |
Efficient Parallel Dynamic Programming PG Bradford Extended Abstract in the Proceedings of the 30thAllerton Conference on …, 1992 | 32 | 1992 |
A hierarchical anonymous routing scheme for mobile ad-hoc networks J Liu, X Hong, J Kong, Q Zheng, N Hu, PG Bradford MILCOM 2006-2006 IEEE Military Communications conference, 1-7, 2006 | 31 | 2006 |
Parallel dynamic programming PG Bradford Indiana University, 1995 | 29 | 1995 |
Deferred assignment scheduling in cluster-based servers V Ungureanu, B Melamed, M Katehakis, PG Bradford Cluster Computing 9, 57-65, 2006 | 27 | 2006 |
Protocol completion incentive problems in cryptographic Vickrey auctions PG Bradford, S Park, MH Rothkopf, H Park Electronic Commerce Research 8, 57-77, 2008 | 26 | 2008 |
Security for fixed sensor networks N Hu, RK Smith, PG Bradford Proceedings of the 42nd annual Southeast regional conference, 212-213, 2004 | 24 | 2004 |
Labeled shortest paths in digraphs with negative and positive edge weights PG Bradford, DA Thomas RAIRO-Theoretical Informatics and Applications 43 (3), 567-583, 2009 | 18 | 2009 |
A formalization of the Turing Test PG Bradford, M Wollowski ACM SIGART Bulletin 6 (4), 3-10, 1995 | 17 | 1995 |
Privacy‐preserving secure relative localization in vehicular networks L Tang, X Hong, PG Bradford Security and Communication Networks 1 (3), 195-204, 2008 | 15 | 2008 |
Foundations of security for hash chains in ad hoc networks PG Bradford, OV Gavrylyako Cluster Computing 8, 189-195, 2005 | 15 | 2005 |
Optimal prefix-free codes for unequal letter costs: dynamic programming with the monge property P Bradford, MJ Golin, LL Larmore, W Rytter European Symposium on Algorithms, 43-54, 1998 | 15 | 1998 |
Using digital chains of custody on constrained devices to verify evidence PG Bradford, DA Ray 2007 IEEE Intelligence and Security Informatics, 8-15, 2007 | 13 | 2007 |