Follow
Stephen Neville
Stephen Neville
Verified email at uvic.ca
Title
Cited by
Cited by
Year
Dynamic resource allocation in computing clouds using distributed multiple criteria decision analysis
YO Yazir, C Matthews, R Farahbod, S Neville, A Guitouni, S Ganti, ...
2010 IEEE 3rd International Conference on Cloud Computing, 91-98, 2010
3342010
System for regulating wireless device operations in wireless networks
B Chow, H MacDonald, D Yarish, T Darcie, S Neville, AS Kroeker
US Patent 9,451,451, 2016
972016
Sybil attacks as a mitigation strategy against the storm botnet
CR Davis, JM Fernandez, S Neville, J McHugh
2008 3rd International Conference on Malicious and Unwanted Software†…, 2008
842008
Structured peer-to-peer overlay networks: Ideal botnets command and control infrastructures?
CR Davis, S Neville, JM Fernandez, JM Robert, J McHugh
European Symposium on Research in Computer Security, 461-480, 2008
642008
Secret key generation and agreement in UWB communication channels
MG Madiseh, ML McGuire, SS Neville, L Cai, M Horie
IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008
622008
Verification of secret key generation from UWB channel observations
MG Madiseh, S He, ML McGuire, SW Neville, X Dong
2009 IEEE International Conference on Communications, 1-5, 2009
542009
Maitland: Lighter-weight vm introspection to support cyber-security in the cloud
C Benninger, SW Neville, YO Yazir, C Matthews, Y Coady
2012 IEEE Fifth International Conference on Cloud Computing, 471-478, 2012
522012
Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation
MG Madiseh, SW Neville, ML McGuire
IEEE Transactions on Information Forensics and Security 7 (4), 1278-1287, 2012
472012
Secret key extraction in ultra wideband channels for unsynchronized radios
MG Madiseh, ML McGuire, SW Neville, AAB Shirazi
6th Annual Communication Networks and Services Research Conference (cnsr†…, 2008
452008
Consumers' sentiment analysis of popular phone brands and operating system preference using Twitter data: A feasibility study
D Arora, KF Li, SW Neville
2015 IEEE 29th International Conference on Advanced Information Networking†…, 2015
412015
Wavelet denoising of coarsely quantized signals
S Neville, N Dimopoulos
IEEE Transactions on Instrumentation and Measurement 55 (3), 892-901, 2006
372006
Secure protocol for transactions
SW Neville, M Horie
US Patent 8,768,854, 2014
352014
Optimising sybil attacks against P2P-based botnets
CR Davis, JM Fernandez, S Neville
2009 4th International Conference on Malicious and Unwanted Software†…, 2009
332009
STARS: A framework for statistically rigorous simulation-based network research
E Millman, D Arora, SW Neville
2011 IEEE Workshops of International Conference on Advanced Information†…, 2011
262011
Dockersim: Full-stack simulation of container-based software-as-a-service (saas) cloud deployments and environments
Z Nikdel, B Gao, SW Neville
2017 IEEE Pacific Rim Conference on Communications, Computers and Signal†…, 2017
142017
The rational for developing larger-scale 1000+ machine emulation-based research test beds
SW Neville, KF Li
2009 International Conference on Advanced Information Networking and†…, 2009
142009
Assessing the performance of AODV, DYMO, and OLSR routing protocols in the context of larger-scale denser MANETs
D Arora, E Millman, SW Neville
Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers†…, 2011
122011
Time correlation analysis of secret key generation via uwb channels
MG Madiseh, SW Neville, ML McGuire
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
122010
System and method for evaluating wireless device and/or wireless network performance
BS Chow, HBB Macdonald, DD Yarish, AS Kroeker, SW Neville, ...
US Patent 10,827,371, 2020
112020
Assessing the expected performance of the olsr routing protocol for denser urban core ad hoc network deployments
D Arora, E Millman, SW Neville
2012 IEEE 26th International Conference on Advanced Information Networking†…, 2012
112012
The system can't perform the operation now. Try again later.
Articles 1–20