


default search action
Thomas Moyer
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Maya Kapoor, Michael Napolitano, Jonathan Quance, Thomas Moyer, Siddharth Krishnan:
Detecting VoIP Data Streams: Approaches Using Hidden Representation Learning. AAAI 2023: 15519-15527 - [c22]Abdullah Al Farooq, Zac Taylor, Kyle Ruona, Thomas Moyer:
Defeasible-PROV: Conflict Resolution in Smart Building Devices. COMPSAC 2023: 1013-1014 - 2022
- [c21]Maya Kapoor, Joshua Melton, Michael Ridenhour, Thomas Moyer, Siddharth Krishnan:
Flurry: A Fast Framework for Provenance Graph Generation for Representation Learning. CIKM 2022: 4887-4891 - [c20]Maya Kapoor, Siddharth Krishnan, Thomas Moyer:
Deep Packet Inspection at Scale: Search Optimization Through Locality-Sensitive Hashing. NCA 2022: 97-105 - [i8]Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan:
Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning. CoRR abs/2203.02744 (2022) - 2021
- [c19]Abdullah Al Farooq, Thomas Moyer, Dewan Tanvir Ahmed:
OPD: Network Packet Distribution after Achieving Equilibrium to Mitigate DDOS Attack. COMPSAC 2021: 1369-1374 - [c18]Maya Kapoor, Joshua Melton, Michael Ridenhour, Siddharth Krishnan, Thomas Moyer:
PROV-GEM: Automated Provenance Analysis Framework using Graph Embeddings. ICMLA 2021: 1720-1727
2010 – 2019
- 2019
- [c17]Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant:
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems. IM 2019: 442-447 - [e1]Thomas Moyer, Sudeepa Roy:
11th International Workshop on Theory and Practice of Provenance, TaPP 2019, Philadelphia, PA, USA, June 3, 2019. USENIX Association 2019 [contents] - [i7]Abdullah Al Farooq, Jessica Marquard, Kripa George, Thomas Moyer:
Detecting Safety and Security Faults in PLC Systems with Data Provenance. CoRR abs/1911.06304 (2019) - 2018
- [c16]Thomas F. J.-M. Pasquier
, Xueyuan Han, Thomas Moyer, Adam Bates
, Olivier Hermant, David M. Eyers
, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CCS 2018: 1601-1616 - [c15]Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer:
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. NDSS 2018 - [c14]Warren Smith, Thomas Moyer, Charles Munson:
Curator: Provenance Management for Modern Distributed Systems. TaPP 2018 - [i6]Warren Smith, Thomas Moyer, Charles Munson:
Curator: Provenance Management for Modern Distributed Systems. CoRR abs/1806.02227 (2018) - [i5]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CoRR abs/1808.06049 (2018) - [i4]Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant:
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems. CoRR abs/1812.03966 (2018) - 2017
- [j6]Adam Bates
, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler
, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c13]Thomas F. J.-M. Pasquier
, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers
, Margo I. Seltzer, Jean Bacon:
Practical whole-system provenance capture. SoCC 2017: 405-418 - [c12]Mark Lemay, Wajih Ul Hassan, Thomas Moyer, Nabil Schear, Warren Smith:
Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security. TaPP 2017 - [c11]Adam Bates
, Wajih Ul Hassan, Kevin R. B. Butler
, Alin Dobra
, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Transparent Web Service Auditing via Network Provenance Functions. WWW 2017: 887-895 - [i3]Thomas F. J.-M. Pasquier, Xueyuan Han, Mark Goldstein, Thomas Moyer, David M. Eyers, Margo I. Seltzer, Jean Bacon:
Practical Whole-System Provenance Capture. CoRR abs/1711.05296 (2017) - 2016
- [j5]Thomas Moyer, Jonathan Stergiou, Garth Reese, James Luton, Najib Abboud:
Navy Enhanced Sierra Mechanics (NESM): Toolbox for Predicting Navy Shock and Damage. Comput. Sci. Eng. 18(6): 10-18 (2016) - [c10]Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd:
Bootstrapping and maintaining trust in the cloud. ACSAC 2016: 65-77 - [c9]Thomas Moyer, Vijay Gadepally:
High-throughput ingest of data provenance records into Accumulo. HPEC 2016: 1-6 - [c8]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates
, Kevin R. B. Butler
, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [i2]Thomas Moyer, Vijay Gadepally:
High-throughput Ingest of Provenance Records into Accumulo. CoRR abs/1608.03780 (2016) - [i1]Adam Bates, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Retrofitting Applications with Provenance-Based Security Monitoring. CoRR abs/1609.00266 (2016) - 2015
- [c7]Adam Bates, Kevin R. B. Butler, Thomas Moyer:
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. TaPP 2015 - [c6]Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:
Trustworthy Whole-System Provenance for the Linux Kernel. USENIX Security Symposium 2015: 319-334 - 2012
- [j4]Thomas Moyer, Kevin R. B. Butler
, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. IEEE Trans. Computers 61(5): 686-699 (2012) - [c5]Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:
Scalable Integrity-Guaranteed AJAX. APWeb 2012: 1-19 - 2011
- [j3]Joshua Schiffman, Thomas Moyer, Trent Jaeger, Patrick D. McDaniel:
Network-Based Root of Trust for Installation. IEEE Secur. Priv. 9(1): 40-48 (2011) - 2010
- [j2]Kevin R. B. Butler
, Stephen E. McLaughlin, Thomas Moyer, Patrick D. McDaniel:
New Security Architectures Based on Emerging Disk Functionality. IEEE Secur. Priv. 8(5): 34-41 (2010) - [c4]Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, Patrick D. McDaniel:
Seeding clouds with trust anchors. CCSW 2010: 43-46 - [c3]Boniface Hicks, Sandra Julieta Rueda
, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger:
An architecture for enforcing end-to-end access control over web applications. SACMAT 2010: 163-172
2000 – 2009
- 2009
- [j1]William Enck, Thomas Moyer, Patrick D. McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Yu-Wei Eric Sung, Sanjay G. Rao, William Aiello:
Configuration management at massive scale: system design and experience. IEEE J. Sel. Areas Commun. 27(3): 323-335 (2009) - [c2]Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick D. McDaniel:
Justifying Integrity Using a Virtual Machine Verifier. ACSAC 2009: 83-92 - [c1]Thomas Moyer, Kevin R. B. Butler
, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. ACSAC 2009: 95-104
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint