default search action
William Yurcik
Person information
- affiliation: University of Illinois, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2008
- [c74]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. ARES 2008: 237-244 - [c73]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. Financial Cryptography 2008: 323-324 - [c72]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
The SCRUB security data sharing infrastructure. NOMS 2008: 630-644 - [c71]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. NOMS 2008: 991-994 - [c70]Robert G. Cole, George F. Riley, Derya Cansever, William Yurcik:
Stochastic Process Models for Packet/Analytic-Based Network Simulations. PADS 2008: 72-79 - [e6]Spyros Antonatos, Michele Bezzi, Elisa Boschi, Brian Trammell, William Yurcik:
Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-301-3 [contents] - [e5]Yongdae Kim, William Yurcik:
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008. ACM 2008, ISBN 978-1-60558-299-3 [contents] - 2007
- [j11]William Yurcik, Ramona Su Thompson, Michael B. Twidale, Esa M. Rantanen:
If you can't beat 'em, join 'em: combining text and visual interfaces for security-system administration. Interactions 14(1): 12-14 (2007) - [c69]Ramona Su Thompson, Esa M. Rantanen, William Yurcik, Brian P. Bailey:
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection. CHI 2007: 1205 - [c68]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs. SecureComm 2007: 49-56 - [i13]William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham:
Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs. CoRR abs/0710.3979 (2007) - 2006
- [c67]Matthew Smith, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik:
Security Issues in On-Demand Grid and Cluster Computing. CCGRID 2006: 24 - [c66]Nadir Kiyanclar, Gregory A. Koenig, William Yurcik:
Maestro-VC: A Paravirtualized Execution Environment for Secure On-Demand Cluster Computing. CCGRID 2006: 28 - [c65]Dmitry Mogilevsky, Gregory A. Koenig, William Yurcik:
Byzantine Anomaly Testing for Charm++: Providing Fault Tolerance and Survivability for Charm++ Empowered Clusters. CCGRID 2006: 30 - [c64]Charis Ermopoulos, William Yurcik:
NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters. CLUSTER 2006 - [c63]Jason Hester, William Yurcik, Roy H. Campbell:
An implementation-independent threat model for group communications. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410M - [c62]Zahid Anwar, William Yurcik, Ralph E. Johnson, Munawar Hafiz, Roy H. Campbell:
Multiple design patterns for voice over IP (VoIP) security. IPCCC 2006 - [c61]Adam J. Slagell, Rafael Bonilla, William Yurcik:
A survey of PKI components and scalability issues. IPCCC 2006 - [c60]Suvda Myagmar, William Yurcik:
Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection Standards. ISSSE 2006 - [c59]Xiaoxin Yin, William Yurcik, Adam J. Slagell:
VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. SEC 2006: 284-295 - [c58]Jianqing Zhang, Nikita Borisov, William Yurcik:
Outsourcing Security Analysis with Anonymized Logs. SecureComm 2006: 1-9 - [c57]Ragib Hasan, William Yurcik:
A statistical analysis of disclosed storage security breaches. StorageSS 2006: 1-8 - [c56]William Yurcik:
Tool update: visflowconnect-IP with advanced filtering from usability testing. VizSEC 2006: 63-64 - [c55]William Yurcik:
Tool update: NVisionIP improvements (difference view, sparklines, and shapes). VizSEC 2006: 65-66 - [e4]William Yurcik, Stefan Axelsson, Kiran Lakkaraju, Soon Tee Teoh:
3rd International Workshop on Visualization for Computer Security, VizSEC 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-549-5 [contents] - [i12]Ruperto P. Majuca, William Yurcik, Jay P. Kesan:
The Evolution of Cyberinsurance. CoRR abs/cs/0601020 (2006) - [i11]Katherine Luo, Yifan Li, Charis Ermopoulos, William Yurcik, Adam J. Slagell:
SCRUB-PA: A Multi-Level Multi-Dimensional Anonymization Tool for Process Accounting. CoRR abs/cs/0601079 (2006) - [i10]Gregory Pluta, Larry Brumbaugh, William Yurcik:
Using SMART for Customized Monitoring of Windows Services. CoRR abs/cs/0603114 (2006) - [i9]Charis Ermopoulos, William Yurcik:
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security). CoRR abs/cs/0606089 (2006) - [i8]William Yurcik, Cristina L. Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan:
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs. CoRR abs/cs/0607111 (2006) - [i7]Aashish Sharma, William Yurcik:
Security Assessment of E-Tax Filing Websites. CoRR abs/cs/0608034 (2006) - 2005
- [j10]Jun Wang, William Yurcik, Yaling Yang, Jason Hester:
Multiring techniques for scalable battlespace group communications. IEEE Commun. Mag. 43(11): 124-133 (2005) - [j9]Ian MacInnes, Yifan Li, William Yurcik:
Reputation and Dispute in eBay Transactions. Int. J. Electron. Commer. 10(1): 27-54 (2005) - [c54]Makan Pourzandi, David Gordon, William Yurcik, Gregory A. Koenig:
Clusters and security: distributed security for distributed systems. CCGRID 2005: 96-104 - [c53]William Yurcik, Chao Liu:
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. CCGRID 2005: 111-120 - [c52]Gregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik:
Cluster security with NVisionCC: process monitoring by leveraging emergent properties. CCGRID 2005: 121-132 - [c51]Adam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik:
Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. CCGRID 2005: 146-151 - [c50]Cristina L. Abad, Indranil Gupta, William Yurcik:
Adding Confidentiality to Application-Level Multicast by Leveraging the Multicast Overlay. ICDCS Workshops 2005: 5-11 - [c49]Ragib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, Roy H. Campbell:
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems. ITCC (2) 2005: 205-213 - [c48]Xiaoxin Yin, William Yurcik, Adam J. Slagell:
The Design of VisFlowConnect-IP: A Link Analysis System for IP Security Situational Awareness. IWIA 2005: 141-153 - [c47]Zahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, Roy H. Campbell:
A First Step Towards Call Survivability in Cellular Networks. LCN 2005: 501-502 - [c46]William Yurcik:
Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite. LISA 2005: 169-176 - [c45]Zahid Anwar, Jalal Al-Muhtadi, William Yurcik, Roy H. Campbell:
Plethora: A Framework for Converting Generic Applications to Run in a Ubiquitous Environment. MobiQuitous 2005: 192-201 - [c44]Joseph A. Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, William Yurcik:
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions. MSST 2005: 329-340 - [c43]Paul Stanton, William Yurcik, Larry Brumbaugh:
Protecting multimedia data in storage: a survey of techniques emphasizing encryption. Storage and Retrieval Methods and Applications for Multimedia 2005: 18-29 - [c42]Elizabeth Haubert, Joseph A. Tucek, Larry Brumbaugh, William Yurcik:
Tamper-resistant storage techniques for multimedia systems. Storage and Retrieval Methods and Applications for Multimedia 2005: 30-40 - [c41]Ragib Hasan, Joseph A. Tucek, Paul Stanton, William Yurcik, Larry Brumbaugh, Jeff Rosendale, Roelof Boonstra:
The techniques and challenges of immutable storage with applications in multimedia. Storage and Retrieval Methods and Applications for Multimedia 2005: 41-52 - [c40]Ragib Hasan, William Yurcik, Suvda Myagmar:
The evolution of storage service providers: techniques and challenges to outsourcing storage. StorageSS 2005: 1-8 - [c39]Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik:
Toward a threat model for storage systems. StorageSS 2005: 94-102 - [c38]Kiran Lakkaraju, Ratna Bearavolu, Adam J. Slagell, William Yurcik, Stephen C. North:
Closing-the-Loop in NVisionIP: Integrating Discovery and Search in Security Visualizations. VizSEC 2005: 9 - [c37]Larry Brumbaugh, William Yurcik:
The 'Little Man Storage' model. WCAE@ISCA 2005: 6 - [c36]Jay P. Kesan, Ruperto P. Majuca, William Yurcik:
Cyber-insurance As A Market-Based Solution To The Problem Of Cybersecurity. WEIS 2005 - [c35]Wen Ding, William Yurcik, Xiaoxin Yin:
Outsourcing Internet Security: Economic Analysis of Incentives for Managed Security Service Providers. WINE 2005: 947-958 - [e3]Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou:
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-233-X [contents] - [e2]Kwan-Liu Ma, Stephen C. North, William Yurcik:
2nd IEEE Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005. IEEE Computer Society 2005, ISBN 0-7803-9477-1 [contents] - [i6]Wen Ding, William Yurcik:
A Game Theoretic Economics Framework to understanding Information Security Oursourcing Market. CoRR abs/cs/0506038 (2005) - [i5]Zahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indranil Gupta, Roy H. Campbell:
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut. CoRR abs/cs/0509095 (2005) - [i4]Dmitry Mogilevsky, Adam J. Lee, William Yurcik:
Defining a Comprehensive Threat Model for High Performance Computational Clusters. CoRR abs/cs/0510046 (2005) - 2004
- [c34]William Yurcik:
Visualization Tools for Security Administrators. Financial Cryptography 2004: 112-113 - [c33]Aashish Sharma, William Yurcik:
An E-Tax Internet Filing System Incorporating Security and Usability Best Practices - Prototype Implementation of the Best Practices Identified in Government and Commercial E-Tax Filing Websites in the USA for Tax Season of 2003. ICETE (2) 2004: 257-262 - [c32]Xiaoxin Yin, William Yurcik, Yifan Li, Kiran Lakkaraju, Cristina L. Abad:
VisFlowConnect: providing security situational awareness by visualizing network traffic flows. IPCCC 2004: 601-607 - [c31]Gregory Pluta, Larry Brumbaugh, William Yurcik:
BEASTS: An Enterprise Management Tool for Providing Information Survivability in Dynamic Heterogeneous Networked Environments. LCN 2004: 394-395 - [c30]William Yurcik, Xin Meng, Gregory A. Koenig:
A Cluster Process Monitoring Tool for Intrusion Detection: Proof-of-Concept. LCN 2004: 427-428 - [c29]Gregory Pluta, Larry Brumbaugh, William Yurcik, Joseph A. Tucek:
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments. LISA 2004: 177-186 - [c28]Ahmed Sobeih, William Yurcik, Jennifer C. Hou:
VRing: A Case for Building Application-Layer Multicast Rings (Rather Than Trees). MASCOTS 2004: 437-446 - [c27]Kiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee:
NVisionIP: an interactive network flow visualization tool for security. SMC (3) 2004: 2675-2680 - [c26]Xiaoxin Yin, William Yurcik, Michael Treaster, Yifan Li, Kiran Lakkaraju:
VisFlowConnect: netflow visualizations of link relationships for security situational awareness. VizSEC 2004: 26-34 - [c25]Kiran Lakkaraju, William Yurcik, Adam J. Lee:
NVisionIP: netflow visualizations of system state for security situational awareness. VizSEC 2004: 65-72 - [c24]William Yurcik, Xin Meng, Nadir Kiyanclar:
NVisionCC: a visualization framework for high performance cluster security. VizSEC 2004: 133-137 - [e1]Carla E. Brodley, Philip Chan, Richard Lippmann, William Yurcik:
1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-974-8 [contents] - [i3]Michael Treaster, Nadir Kiyanclar, Gregory A. Koenig, William Yurcik:
A Distributed Economics-based Infrastructure for Utility Computing. CoRR abs/cs/0412121 (2004) - [i2]Adam J. Slagell, William Yurcik:
Sharing Computer Network Logs for Security and Privacy: A Motivation for New Methodologies of Anonymization. CoRR cs.CR/0409005 (2004) - 2003
- [j8]Carlos Iván Chesñevar, Maria Laura Cobo, William Yurcik:
Using theoretical computer simulators for formal languages and automata theory. ACM SIGCSE Bull. 35(2): 33-37 (2003) - [c23]Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe:
Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-264 - 2002
- [j7]William Yurcik:
Special issue on specialized computer architecture simulators that see the present and may hold the future. ACM J. Educ. Resour. Comput. 2(1): 1-3 (2002) - [j6]William Yurcik, David Doss:
Software technology issues for a US National Missile Defense System. IEEE Technol. Soc. Mag. 21(2): 36-46 (2002) - [c22]Bryan Smith, William Yurcik, David Doss:
Ethical hacking: the security justification redux. ISTAS 2002: 374-379 - [c21]Vikas Jayaswal, William Yurcik, David Doss:
Internet hack back: counter attacks as self-defense or vigilantism? ISTAS 2002: 380-386 - [c20]Brian Scottberg, William Yurcik, David Doss:
Internet honeypots: protection or entrapment? ISTAS 2002: 387-391 - [c19]William Yurcik:
Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept. LCN 2002: 134-135 - [c18]Gregory S. Wolffe, William Yurcik, Hugh Osborne, Mark A. Holliday:
Teaching computer organization/architecture with limited resources using simulators. SIGCSE 2002: 176-180 - [c17]Shirley Crossley, Hugh Osborne, William Yurcik:
How computers really work: a children's guide. WCAE 2002: 14 - [c16]Hugh Osborne, Shirley Crossley, Jirí Mencák, William Yurcik:
PECTOPAH: promoting education in computer technology using an open-ended pedagogically adaptable hierarchy. WCAE 2002: 19 - [c15]William Yurcik, Edward F. Gehringer:
A survey of web resources for teaching computer architecture. WCAE 2002: 23 - 2001
- [j5]William Yurcik:
Editorial. ACM J. Educ. Resour. Comput. 1(4): 1-3 (2001) - [j4]Cecile Yehezkel, William Yurcik, Murray Pearson, Dean Armstrong:
Three simulator tools for teaching computer architecture: Little Man computer, and RTLSim. ACM J. Educ. Resour. Comput. 1(4): 60-80 (2001) - [j3]Lillian (Boots) Cassel, Mark A. Holliday, Deepak Kumar, John Impagliazzo, Kevin Bolding, Murray Pearson, Jim Davies, Gregory S. Wolffe, William Yurcik:
Distributed expertise for teaching computer organization & architecture. ACM SIGCSE Bull. 33(2): 111-126 (2001) - [j2]William Yurcik:
The Simulation Education Homepage. Simul. 76(4): 202-206 (2001) - [j1]William Yurcik, David Doss:
Achieving Fault-Tolerant Software with Rejuvenation and Reconfiguration. IEEE Softw. 18(4): 48-52 (2001) - [c14]Alexander Gubin, William Yurcik, Larry Brumbaugh:
Network Management Visualization with PingTV. LCN 2001: 62-63 - [c13]Mary Grzywa, Ajit Dharmik, William Yurcik, Larry Brumbaugh:
Application-Level Survivable Software: rFTP Proof-of-Concept . LCN 2001: 203-204 - [c12]William Yurcik, Larry Brumbaugh:
A web-based little man computer simulator. SIGCSE 2001: 204-208 - [c11]Alexander Gubin, William Yurcik, Larry Brumbaugh:
PingTV: A Case Study in Visual Network Monitoring. IEEE Visualization 2001: 421-424 - [c10]William Yurcik, Hugh Osborne:
A crowd of little man computers: visual computer simulator teaching tools. WSC 2001: 1632-1639 - [i1]William Yurcik, David Doss:
Internet Attacks: A Policy Framework for Rules of Engagement. CoRR cs.CY/0109078 (2001) - 2000
- [c9]William Yurcik, David Tipper:
Providing guaranteed assurance to connection-oriented group communications using disjoint routing. HASE 2000: 197-198 - [c8]Samuel Patton, Bryan Smith, David Doss, William Yurcik:
A layered framework strategy for deploying high assurance VPNs. HASE 2000: 199-202 - [c7]Samuel Patton, David Doss, William Yurcik:
Distributed Weakness in Virtual Private Networks. LCN 2000: 96-97 - [c6]Samuel Patton, David Doss, William Yurcik:
Open Source Versus Commercial Firewalls: Functional Comparison. LCN 2000: 223-224 - [c5]Samuel Patton, Bryan Smith, David Doss, William Yurcik:
A Virtual Private Network Deployment Framework. LCN 2000: 225-226 - [c4]William Yurcik, David Tipper, Deep Medhi:
The use of hop-limits to provide survivable ATM group communications. Networked Group Communication 2000: 131-140 - [c3]William Yurcik, David Tipper:
A survivability framework for connection-oriented group communications. PRDC 2000: 53-58
1990 – 1999
- 1999
- [c2]William Yurcik:
Survivable ATM Group Communications Using Disjoint Meshes, Trees, and Rings. Networked Group Communication 1999: 235-243 - 1998
- [c1]William Yurcik:
Providing ATM Multipoint Survivability Via Disjoint VC Mesh Backup Groups. ICCCN 1998: 129-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint