Follow
Stephen Groat
Stephen Groat
DataDog
Verified email at datadoghq.com - Homepage
Title
Cited by
Cited by
Year
Goldphish: Using images for content-based phishing analysis
M Dunlop, S Groat, D Shelly
2010 Fifth international conference on internet monitoring and protection …, 2010
2222010
Mt6d: A moving target ipv6 defense
M Dunlop, S Groat, W Urbanski, R Marchany, J Tront
2011-MILCOM 2011 Military Communications Conference, 1321-1326, 2011
2172011
Visual biometric authentication supplemented with a time-based secondary authentication factor
R Moore, S Groat
US Patent App. 15/065,060, 2017
522017
Using an IPv6 moving target defense to protect the Smart Grid
S Groat, M Dunlop, W Urbanksi, R Marchany, J Tront
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-7, 2012
492012
Method and system for dynamically obscuring addresses in IPv6
SL Groat, MW Dunlop, WM Urbanski, RC Marchany, J Tront
US Patent 9,461,875, 2016
472016
The blind man's bluff approach to security using IPv6
M Dunlop, S Groat, W Urbanski, R Marchany, J Tront
IEEE Security & Privacy 10 (4), 35-43, 2012
382012
The privacy implications of stateless IPv6 addressing
S Groat, M Dunlop, R Marchany, J Tront
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
272010
Advancing the defense in depth model
S Groat, J Tront, R Marchany
2012 7th International Conference on System of Systems Engineering (SoSE …, 2012
262012
Implementing an IPv6 moving target defense on a live network
M Dunlop, S Groat, RC Marchany, JG Tront
Cyber-Physical Systems Virtual Organization, 2012
222012
What DHCPv6 says about you
S Groat, M Dunlop, R Marchany, J Tront
2011 World Congress on Internet Security (WorldCIS-2011), 146-151, 2011
172011
IPv6: nowhere to run, nowhere to hide
S Groat, M Dunlop, R Marchany, J Tront
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
172011
Using dynamic addressing for a moving target defense
S Groat, M Dunlop, R Marchany, J Tront
Proceedings of the 6th International Conference on Information Warfare and …, 2011
152011
Security and privacy produced by DHCP unique identifiers
J Tront, S Groat, M Dunlop, R Marchany
The 16th North-East Asia Symposium on Nano, Information Technology and …, 2011
132011
The good, the bad, the IPv6
M Dunlop, S Groat, R Marchany, J Tront
2011 Ninth Annual Communication Networks and Services Research Conference, 77-84, 2011
132011
Optimizing a network layer moving target defense for specific system architectures
O Hardman, S Groat, R Marchany, J Tront
Architectures for Networking and Communications Systems, 117-118, 2013
112013
IPv6: Now you see me, now you don’t
M Dunlop, S Groat, R Marchany, J Tront
International Conference on Networks (ICN), 18-23, 2011
82011
Securing static nodes in mobile-enabled systems using a network-layer moving target defense
S Groat, R Moore, R Marchany, J Tront
2013 1st International Workshop on the Engineering of Mobile-Enabled Systems …, 2013
42013
Using transport layer multihoming to enhance network layer moving target defenses
R Moore, S Groat, R Marchany, J Tront
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
22013
Privacy and Security in IPv6 Addressing
SL Groat
Virginia Tech, 2011
12011
Privacy and security of DHCP unique identifiers
S Groat, M Dunlop, R Marchany, J Tront
International Journal for Information Security Research 1 (4), 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–20