default search action
Brian Neil Levine
Person information
- affiliation: University of Massachusetts Amherst, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c75]Prasanna Lakkur Subramanyam, Mohit Iyyer, Brian Neil Levine:
Triage of Messages and Conversations in a Large-Scale Child Victimization Corpus. WWW 2024: 4544-4554 - 2020
- [c74]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet. CCS 2020: 1497-1512 - [c73]Keen Sung, Jianyi Huang, Mark D. Corner, Brian Neil Levine:
Re-identification of mobile devices using real-time bidding advertising networks. MobiCom 2020: 48:1-48:13 - [c72]George Bissias, Brian Neil Levine:
Bobtail: Improved Blockchain Security with Low-Variance Mining. NDSS 2020 - [c71]Keen Sung, Brian Neil Levine, Mariya Zheleva:
Protecting location privacy from untrusted wireless service providers. WISEC 2020: 266-277 - [i10]Keen Sung, Brian Neil Levine, Mariya Zheleva:
ZipPhone: Protecting user location privacy from cellular service providers. CoRR abs/2002.04731 (2020) - [i9]George Bissias, Rainer Böhme, David Thibodeau, Brian Neil Levine:
Pricing Security in Proof-of-Work Systems. CoRR abs/2012.03706 (2020)
2010 – 2019
- 2019
- [j21]Keen Sung, Joydeep Biswas, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore:
Server-Side Traffic Analysis Reveals Mobile Location Information over the Internet. IEEE Trans. Mob. Comput. 18(6): 1407-1418 (2019) - [c70]George Bissias, David Thibodeau, Brian Neil Levine:
Bonded Mining: Difficulty Adjustment by Miner Commitment. DPM/CBT@ESORICS 2019: 372-390 - [c69]A. Pinar Ozisik, Gavin Andresen, Brian Neil Levine, Darren Tapp, George Bissias, Sunny Katkuri:
Graphene: efficient interactive set reconciliation applied to blockchain propagation. SIGCOMM 2019: 303-317 - [i8]George Bissias, Brian Neil Levine, David Thibodeau:
Bonded Mining: Difficulty Adjustment by Miner Commitment. CoRR abs/1907.00302 (2019) - [i7]George Bissias, Brian Neil Levine, David Thibodeau:
Greedy but Cautious: Conditions for Miner Convergence to Resource Allocation Equilibrium. CoRR abs/1907.09883 (2019) - 2018
- [c68]George Bissias, Brian Neil Levine, David Thibodeau:
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies. DPM/CBT@ESORICS 2018: 155-172 - [c67]Mark D. Corner, Brian Neil Levine:
MicroMobile: Leveraging Mobile Advertising for Large-Scale Experimentation. MobiSys 2018: 310-322 - [r2]Brian Neil Levine, Gerome Miklau:
Auditing and Forensic Analysis. Encyclopedia of Database Systems (2nd ed.) 2018 - [i6]George Bissias, Brian Neil Levine, David Thibodeau:
Using Economic Risk to Model Miner Hash Rate Allocation in Cryptocurrencies. CoRR abs/1806.07189 (2018) - 2017
- [j20]George Bissias, Brian Neil Levine, Marc Liberatore, Swagatika Prusty:
Forensic Identification of Anonymous Sources in OneSwarm. IEEE Trans. Dependable Secur. Comput. 14(6): 620-632 (2017) - [c66]A. Pinar Ozisik, Gavin Andresen, George Bissias, Amir Houmansadr, Brian Neil Levine:
Graphene: A New Protocol for Block Propagation Using Set Reconciliation. DPM/CBT@ESORICS 2017: 420-428 - [c65]Mark D. Corner, Brian Neil Levine, Omar Ismail, Angela Upreti:
Advertising-based Measurement: A Platform of 7 Billion Mobile Devices. MobiCom 2017: 435-447 - [c64]George Bissias, Brian Neil Levine, Nikunj Kapadia:
Market-based Security for Distributed Applications. NSPW 2017: 19-34 - [c63]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
Statistical Detection of Downloaders in Freenet. IWPE@SP 2017: 25-32 - [i5]George Dean Bissias, Brian Neil Levine, Nikunj Kapadia:
Securing the Assets of Decentralized Applications using Financial Derivatives (DRAFT). CoRR abs/1701.03945 (2017) - [i4]A. Pinar Ozisik, Brian Neil Levine:
An Explanation of Nakamoto's Analysis of Double-spend Attacks. CoRR abs/1701.03977 (2017) - [i3]A. Pinar Ozisik, George Bissias, Brian Neil Levine:
Estimation of Miner Hash Rates and Consensus on Blockchains (draft). CoRR abs/1707.00082 (2017) - [i2]George Bissias, Brian Neil Levine:
Bobtail: A Proof-of-Work Target that Minimizes Blockchain Mining Variance (Draft). CoRR abs/1709.08750 (2017) - 2016
- [i1]George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen, Amir Houmansadr:
An Analysis of Attacks on Blockchain Consensus. CoRR abs/1610.07985 (2016) - 2015
- [c62]Robert J. Walls, Yuriy Brun, Marc Liberatore, Brian Neil Levine:
Discovering specification violations in networked software systems. ISSRE 2015: 496-506 - 2014
- [j19]Marc Liberatore, Brian Neil Levine, Clay Shields, Brian Lynn:
Efficient Tagging of Remote Peers during Child Pornography Investigations. IEEE Trans. Dependable Secur. Comput. 11(5): 425-439 (2014) - [c61]Saksham Varma, Robert J. Walls, Brian Lynn, Brian Neil Levine:
Efficient Smart Phone Forensics Based on Relevance Feedback. SPSM@CCS 2014: 81-91 - [c60]George Dean Bissias, A. Pinar Ozisik, Brian Neil Levine, Marc Liberatore:
Sybil-Resistant Mixing for Bitcoin. WPES 2014: 149-158 - 2013
- [c59]Sookhyun Yang, Jim Kurose, Brian Neil Levine:
Disambiguation of residential wired and wireless access in a forensic setting. INFOCOM 2013: 360-364 - [c58]Hamed Soroush, Keen Sung, Erik G. Learned-Miller, Brian Neil Levine, Marc Liberatore:
Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet. Privacy Enhancing Technologies 2013: 103-122 - [c57]Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls, Jeannie R. Albrecht, Emmanuel Cecchet, Brian Neil Levine, Marc Liberatore, Brian Lynn, Janis Wolak:
Measurement and analysis of child pornography trafficking on P2P networks. WWW 2013: 631-642 - 2012
- [c56]Robert J. Walls, Shane S. Clark, Brian Neil Levine:
Functional Privacy or Why Cookies Are Better with Milk. HotSec 2012 - 2011
- [j18]N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew K. Wright:
Economic incentives for protecting digital rights online. Electron. Commer. Res. Appl. 10(5): 553-564 (2011) - [j17]Marc Liberatore, Bikas Gurung, Brian Neil Levine, Matthew K. Wright:
Empirical tests of anonymous voice over IP. J. Netw. Comput. Appl. 34(1): 341-350 (2011) - [j16]Hamed Soroush, Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine, Brian Lynn:
A retrospective look at the UMass DOME mobile testbed. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(4): 2-15 (2011) - [c55]Swagatika Prusty, Brian Neil Levine, Marc Liberatore:
Forensic investigation of the OneSwarm anonymous filesharing system. CCS 2011: 201-214 - [c54]Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Brian Neil Levine, Mark D. Corner, Landon P. Cox:
Concurrent Wi-Fi for mobile users: analysis and measurements. CoNEXT 2011: 4 - [c53]Hamed Soroush, Peter Gilbert, Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine, Landon P. Cox:
Spider: improving mobile networking with concurrent wi-fi connections. SIGCOMM 2011: 402-403 - [c52]Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine:
Forensic Triage for Mobile Phones with DEC0DE. USENIX Security Symposium 2011 - [c51]Robert J. Walls, Brian Neil Levine, Marc Liberatore, Clay Shields:
Effective Digital Forensics Research Is Investigator-Centric. HotSec 2011 - [c50]Jim Partan, Jim Kurose, Brian Neil Levine, James C. Preisig:
Low spreading loss in underwater acoustic networks reduces RTS/CTS effectiveness. WUWNet 2011: 5 - [e2]Parmesh Ramanathan, Thyaga Nandagopal, Brian Neil Levine:
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MOBICOM 2011, Las Vegas, Nevada, USA, September 19-23, 2011. ACM 2011, ISBN 978-1-4503-0492-4 [contents] - 2010
- [j15]Marc Liberatore, Robert Erdely, Thomas Kerle, Brian Neil Levine, Clay Shields:
Forensic investigation of peer-to-peer file sharing networks. Digit. Investig. 7(Supplement): S95-S103 (2010) - [j14]Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine:
Design and field experimentation of an energy-efficient architecture for DTN throwboxes. IEEE/ACM Trans. Netw. 18(2): 554-567 (2010) - [j13]Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:
Replication routing in DTNs: a resource allocation approach. IEEE/ACM Trans. Netw. 18(2): 596-609 (2010) - [c49]John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine:
Reverse engineering for mobile systems forensics with Ares. Insider Threats@CCS 2010: 21-28 - [c48]Marc Liberatore, Brian Neil Levine, Clay Shields:
Strengthening forensic investigations of child pornography on P2P networks. CoNEXT 2010: 19 - [c47]George Dean Bissias, Brian Neil Levine, Ramesh K. Sitaraman:
Assessing the vulnerability of replicated network services. CoNEXT 2010: 24
2000 – 2009
- 2009
- [j12]Brian Neil Levine, Marc Liberatore:
DEX: Digital evidence provenance supporting reproducibility and comparison. Digit. Investig. 6(Supplement): S48-S56 (2009) - [c46]Hamed Soroush, Nilanjan Banerjee, Aruna Balasubramanian, Mark D. Corner, Brian Neil Levine, Brian Lynn:
DOME: a diverse outdoor mobile testbed. HotPlanet@MobiSys 2009: 2 - [r1]Brian Neil Levine, Gerome Miklau:
Auditing and Forensic Analysis. Encyclopedia of Database Systems 2009: 172-176 - 2008
- [j11]Brendan Burns, Oliver Brock, Brian Neil Levine:
MORA routing and capacity building in disruption-tolerant networks. Ad Hoc Networks 6(4): 600-620 (2008) - [j10]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Passive-Logging Attacks Against Anonymous Communications Systems. ACM Trans. Inf. Syst. Secur. 11(2): 3:1-3:34 (2008) - [c45]N. Boris Margolin, Brian Neil Levine:
Quantifying Resistance to the Sybil Attack. Financial Cryptography 2008: 1-15 - [c44]Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:
Enhancing interactive web applications in hybrid networks. MobiCom 2008: 70-80 - [c43]Nilanjan Banerjee, Mark D. Corner, Donald F. Towsley, Brian Neil Levine:
Relays, base stations, and meshes: enhancing mobile networks with infrastructure. MobiCom 2008: 81-91 - [c42]Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, John Zahorjan:
Interactive wifi connectivity for moving vehicles. SIGCOMM 2008: 427-438 - 2007
- [j9]Nathaniel E. Baughman, Marc Liberatore, Brian Neil Levine:
Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15(1): 1-13 (2007) - [c41]Gerome Miklau, Brian Neil Levine, Patrick Stahlberg:
Securing history: Privacy and accountability in database systems. CIDR 2007: 387-396 - [c40]N. Boris Margolin, Brian Neil Levine:
Informant: Detecting Sybils Using Incentives. Financial Cryptography 2007: 192-207 - [c39]Nilanjan Banerjee, Mark D. Corner, Brian Neil Levine:
An Energy-Efficient Architecture for DTN Throwboxes. INFOCOM 2007: 776-784 - [c38]Aruna Balasubramanian, Yun Zhou, W. Bruce Croft, Brian Neil Levine, Arun Venkataramani:
Web search from a bus. Challenged Networks 2007: 59-66 - [c37]Xiaolan Zhang, Jim Kurose, Brian Neil Levine, Donald F. Towsley, Honggang Zhang:
Study of a bus-based disruption-tolerant network: mobility modeling and impact on routing. MobiCom 2007: 195-206 - [c36]John Burgess, George Dean Bissias, Mark D. Corner, Brian Neil Levine:
Surviving attacks on disruption-tolerant networks without authentication. MobiHoc 2007: 61-70 - [c35]Aruna Balasubramanian, Brian Neil Levine, Arun Venkataramani:
DTN routing as a resource allocation problem. SIGCOMM 2007: 373-384 - [c34]George Dean Bissias, Brian Neil Levine, Arnold L. Rosenberg:
Bounding damage from link destruction, with application to the internet. SIGMETRICS 2007: 367-368 - [c33]Patrick Stahlberg, Gerome Miklau, Brian Neil Levine:
Threats to privacy in the forensic analysis of database systems. SIGMOD Conference 2007: 91-102 - 2006
- [j8]Brian Neil Levine, Clay Shields:
Internet security. Comput. Commun. 29(3): 279 (2006) - [c32]Marc Liberatore, Brian Neil Levine:
Inferring the source of encrypted HTTP connections. CCS 2006: 255-263 - [c31]Marc Liberatore, Brian Neil Levine, Chadi Barakat:
Maximizing transfer opportunities in bluetooth DTNs. CoNEXT 2006: 3 - [c30]Brendan Burns, Oliver Brock, Brian Neil Levine:
Autonomous Enhancement of Disruption Tolerant Networks. ICRA 2006: 2105-2110 - [c29]John Burgess, Brian Gallagher, David D. Jensen, Brian Neil Levine:
MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. INFOCOM 2006 - [c28]Wenrui Zhao, Yang Chen, Mostafa H. Ammar, Mark D. Corner, Brian Neil Levine, Ellen W. Zegura:
Capacity Enhancement using Throwboxes in DTNs. MASS 2006: 31-40 - [c27]Jim Partan, Jim Kurose, Brian Neil Levine:
A survey of practical issues in underwater networks. Underwater Networks 2006: 17-24 - [c26]Chris Piro, Clay Shields, Brian Neil Levine:
Detecting the Sybil Attack in Mobile Ad hoc Networks. SecureComm 2006: 1-11 - [e1]Brian Neil Levine, Mark Claypool:
Network and Operating System Support for Digital Audio and Video, 16th International Workshop, NOSSDAV 2006, Newport, Rhode Island, USA, November 22-23, 2006, Proceedings. ACM 2006, ISBN 1-59593-285-2 [contents] - 2005
- [j7]Kimaya Sanzgiri, D. LaFlamme, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer:
Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun. 23(3): 598-610 (2005) - [c25]Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg:
On the cost-ineffectiveness of redundancy in commercial P2P computing. CCS 2005: 280-288 - [c24]Brendan Burns, Oliver Brock, Brian Neil Levine:
MV routing and capacity building in disruption tolerant networks. INFOCOM 2005: 398-408 - [c23]Andrew S. Fast, David D. Jensen, Brian Neil Levine:
Creating social networks to improve peer-to-peer networking. KDD 2005: 568-573 - [c22]Aaron St. John, Brian Neil Levine:
Supporting P2P gaming when players have heterogeneous resources. NOSSDAV 2005: 1-6 - [c21]George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine:
Privacy Vulnerabilities in Encrypted HTTP Streams. Privacy Enhancing Technologies 2005: 1-11 - 2004
- [j6]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4): 489-522 (2004) - [c20]Haizheng Zhang, W. Bruce Croft, Brian Neil Levine, Victor R. Lesser:
A Multi-Agent Approach for Peer-to-Peer Based Information Retrieval System. AAMAS 2004: 456-463 - [c19]N. Boris Margolin, Matthew K. Wright, Brian Neil Levine:
Analysis of an incentives-based secrets protection system. Digital Rights Management Workshop 2004: 22-30 - [c18]Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 - [c17]Jacky Chu, Kevin Labonte, Brian Neil Levine:
An evaluation of chord using traces of peer-to-peer file sharing. SIGMETRICS 2004: 432-433 - 2003
- [j5]Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves:
Organizing multicast receivers deterministically by packet-loss correlation. Multim. Syst. 9(1): 3-14 (2003) - [c16]Katrina M. Hanna, Brian Neil Levine, R. Manmatha:
Mobile Distributed Information Retrieval for Highly-Partitioned Networks. ICNP 2003: 38- - [c15]Daniel S. Bernstein, Zhengzhu Feng, Brian Neil Levine, Shlomo Zilberstein:
Adaptive Peer Selection. IPTPS 2003: 237-246 - [c14]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Defending Anonymous Communications Against Passive Logging Attack. S&P 2003: 28-41 - 2002
- [j4]Brian Neil Levine, Clay Shields:
Hordes: a Multicast-Based Protocol for Anonymity. J. Comput. Secur. 10(3): 213-240 (2002) - [j3]Don Towsley, Christophe Diot, Brian Neil Levine, Luigi Rizzo:
Guest editorial - network support for multicast communications. IEEE J. Sel. Areas Commun. 20(8): 1441-1443 (2002) - [c13]Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer:
A Secure Routing Protocol for Ad Hoc Networks. ICNP 2002: 78-89 - [c12]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
An Analysis of the Degradation of Anonymous Protocols. NDSS 2002: 1-12 - 2001
- [c11]V. Scarlata, Brian Neil Levine, Clay Shields:
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. ICNP 2001: 272-280 - [c10]Katrina M. Hanna, Nandini Natarajan, Brian Neil Levine:
Evaluation of a Novel Two-Step Server Selection Metric. ICNP 2001: 290-300 - [c9]Nathaniel E. Baughman, Brian Neil Levine:
Cheat-proof Playout for Centralized and Distributed Online Games. INFOCOM 2001: 104-113 - [c8]James A. Davis, Andrew H. Fagg, Brian Neil Levine:
Wearable Computers as Packet Transport Mechanisms in Highly-Partitioned Ad-Hoc Networks. ISWC 2001: 141-148 - 2000
- [j2]Christophe Diot, Brian Neil Levine, J. Bryan Lyles, H. Kassem, D. Balensiefen:
Deployment issues for the IP multicast service and architecture. IEEE Netw. 14(1): 78-88 (2000) - [c7]Clay Shields, Brian Neil Levine:
A protocol for anonymous communication over the Internet. CCS 2000: 33-42 - [c6]Brian Neil Levine, Jon Crowcroft, Christophe Diot, J. J. Garcia-Luna-Aceves, James F. Kurose:
Consideration of Receiver Interest for IP Multicast Delivery. INFOCOM 2000: 470-479 - [c5]Joerg Walz, Brian Neil Levine:
A hierarchical multicast monitoring scheme. Networked Group Communication 2000: 105-116
1990 – 1999
- 1998
- [j1]Brian Neil Levine, J. J. Garcia-Luna-Aceves:
A Comparison of Reliable Multicast Protocols. Multim. Syst. 6(5): 334-348 (1998) - [c4]Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-Aceves:
Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. ACM Multimedia 1998: 201-210 - 1997
- [c3]Brian Neil Levine, J. J. Garcia-Luna-Aceves:
Improving Internet multicast with routing labels. ICNP 1997: 241-250 - 1996
- [c2]Brian Neil Levine, J. J. Garcia-Luna-Aceves:
A Comparison of Known Classes of Reliable Multicast Protocols. ICNP 1996: 112- - [c1]Brian Neil Levine, David B. Lavo, J. J. Garcia-Luna-Aceves:
The Case for Reliable Concurrent Multicasting Using Shared Ack Trees. ACM Multimedia 1996: 365-376