default search action
Joseph G. Tront
Person information
- affiliation: Virginia Tech, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j12]Kimberly Zeitz, Michael Cantrell, Randy C. Marchany, Joseph G. Tront:
Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things. IEEE Wirel. Commun. Lett. 7(4): 578-581 (2018) - [c60]Mark E. DeYoung, Philip Kobezak, David R. Raymond, Randy C. Marchany, Joseph G. Tront:
Privacy Preserving Network Security Data Analytics: Architectures and System Design. HICSS 2018: 1-9 - [c59]Philip Kobezak, Randy C. Marchany, David R. Raymond, Joseph G. Tront:
Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks. HICSS 2018: 1-10 - 2017
- [c58]Brendan Mattina, Franki Yeung, Alex Hsu, Dale Savoy, Joseph G. Tront, David R. Raymond:
MARCS: mobile augmented reality for cybersecurity. CISRC 2017: 10:1-10:4 - [c57]Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet. HOST 2017: 165 - [c56]Kimberly Zeitz, Michael Cantrell, Randy C. Marchany, Joseph G. Tront:
Designing a Micro-Moving Target IPv6 Defense for the Internet of Things. IoTDI 2017: 179-184 - [c55]Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet. MILCOM 2017: 551-556 - [c54]Mark E. DeYoung, Mohammed Salman, Himanshu Bedi, David R. Raymond, Joseph G. Tront:
Spark on the ARC: Big data analytics frameworks on HPC clusters. PEARC 2017: 34:1-34:6 - 2016
- [j11]Dileep Basam, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities. J. Electr. Comput. Eng. 2016: 5212314:1-5212314:13 (2016) - [j10]Kimberly Zeitz, Randy C. Marchany, Joseph G. Tront:
Speed isn?t Enough: Usability and Adoption of an Optimized Alert Notification System. IEEE Technol. Soc. Mag. 35(1): 47-55 (2016) - [c53]Franki Yeung, Peter Cho, Christopher Morrell, Randy C. Marchany, Joseph G. Tront:
Modeling network based moving target defense impacts through simulation in Ns-3. MILCOM 2016: 746-751 - 2015
- [c52]Christopher Morrell, Reese Moore, Randy C. Marchany, Joseph G. Tront:
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses. MTD@CCS 2015: 77-84 - [c51]Dileep Basam, Randy C. Marchany, Joseph G. Tront:
Attention: moving target defense networks, how well are you moving?. Conf. Computing Frontiers 2015: 54:1-54:8 - [c50]Joseph G. Tront, Jane C. Prey:
Tablet PCs and slate devices can improve active learning classroom experiences. ICL 2015: 1216 - [c49]Reese Moore, Christopher Morrell, Randy C. Marchany, Joseph G. Tront:
Utilizing the BitTorrent DHT for blind rendezvous and information exchange. MILCOM 2015: 1560-1565 - [c48]Lisa J. K. Durbeck, Joseph G. Tront, Nicholas J. Macias:
Energy efficiency of Zipf traffic distributions within Facebook's data center fabric architecture. PATMOS 2015: 152-160 - 2014
- [c47]Matthew Sherburne, Randy C. Marchany, Joseph G. Tront:
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid. CISR 2014: 37-40 - [c46]Flora P. McMartin, Sarah Giersch, Joseph G. Tront, Joshua Morrill:
Learning from the Best: How award-winning courseware has impacted engineering education. FIE 2014: 1-8 - [c45]Joseph G. Tront, Flora P. McMartin:
Developing and evaluating active learning classroom experiences with tablet PCs and slate devices: Half-day tutorial. FIE 2014: 1-2 - [c44]Kimberly Zeitz, Randy C. Marchany, Joseph G. Tront:
Designing an Optimized Alert System Based on Geospatial Location Data. HICSS 2014: 4159-4168 - [c43]Christopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Scaling IPv6 address bindings in support of a moving target defense. ICITST 2014: 440-445 - 2013
- [c42]Owen Hardman, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
Optimizing a network layer moving target defense for specific system architectures. ANCS 2013: 117-118 - [c41]Reese Moore, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
Using transport layer multihoming to enhance network layer moving target defenses. CSIIRW 2013: 53 - 2012
- [j9]Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront:
The Blind Man's Bluff Approach to Security Using IPv6. IEEE Secur. Priv. 10(4): 35-43 (2012) - [c40]John Cristy, Joseph G. Tront:
Developing a plug-in tool to make OneNote an e-textbook. TOPI@ICSE 2012: 84-85 - [c39]Stephen Groat, Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront:
Using an IPv6 moving target defense to protect the Smart Grid. ISGT 2012: 1-7 - [c38]Flora P. McMartin, Sarah Giersch, Joseph G. Tront, Wesley Shumar:
A tale of two studies: is dissemination working? JCDL 2012: 47-50 - [c37]Brittany Clore, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
Validating a custom IPv6 security application using OPNET modeler. MILCOM 2012: 1-6 - [c36]Matthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront:
Leveraging Cognitive Principles to Improve Security Visualization. NDT (2) 2012: 262-276 - [c35]Stephen Groat, Joseph G. Tront, Randy C. Marchany:
Advancing the defense in depth model. SoSE 2012: 285-290 - 2011
- [c34]Matthew Dunlop, Stephen Groat, Randy C. Marchany, Joseph G. Tront:
The Good, the Bad, the IPv6. CNSR 2011: 77-84 - [c33]Catherine T. Amelink, Nicole P. Sanderlin, Elizabeth Tront, Joseph G. Tront:
Work in progress - The process of evaluating the impact of an international experience on students' global engineering skills. FIE 2011: 1 - [c32]Joseph G. Tront:
Workshop - Developing active learning classroom exercises for use with Tablet PCs. FIE 2011: 1 - [c31]Joseph G. Tront, Flora P. McMartin, Alice M. Agogino:
Mini workshop - How to improve teaching and learning: Selecting, implementing and evaluating digital resources in the Engineering Pathway. FIE 2011: 1 - [c30]Joseph G. Tront, Flora P. McMartin, Brandon Muramatsu:
Work in progress - Improving the dissemination of CCLI (TUES) educational innovations. FIE 2011: S4 - [c29]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
IPv6: Nowhere to Run, Nowhere to Hide. HICSS 2011: 1-10 - [c28]William Urbanski, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
Cover-VT: Converged Security Visualization Tool. Integrated Network Management 2011: 714-717 - [c27]Matthew Dunlop, Stephen Groat, William Urbanski, Randy C. Marchany, Joseph G. Tront:
MT6D: A Moving Target IPv6 Defense. MILCOM 2011: 1321-1326 - [c26]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
What DHCPv6 says about you. WorldCIS 2011: 146-151 - 2010
- [c25]Stephen Groat, Matthew Dunlop, Randy C. Marchany, Joseph G. Tront:
The privacy implications of stateless IPv6 addressing. CSIIRW 2010: 52 - [c24]Benjamin R. Moyers, John Paul Dunning, Randolph Marchany, Joseph G. Tront:
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices. HICSS 2010: 1-9
2000 – 2009
- 2009
- [c23]Theresa M. Nelson, Timothy Buennemeyer, Randy C. Marchany, Joseph G. Tront:
Simulating the Deployment of Battery-Sensing Intrusion Protection Systems. HICSS 2009: 1-9 - [c22]Samantha Chandrasekar, Joseph G. Tront, Jane C. Prey:
WriteOn1.0: a tablet PC-based tool for effective classroom instruction. ITiCSE 2009: 323-327 - 2008
- [c21]Timothy Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John Paul Dunning, Randy C. Marchany, Joseph G. Tront:
Mobile Device Profiling and Intrusion Detection Using Smart Batteries. HICSS 2008: 296 - 2007
- [j8]Joseph G. Tront:
Facilitating Pedagogical Practices through a Large-Scale Tablet PC Deployment. Computer 40(9): 62-68 (2007) - [c20]Joseph G. Tront, Randy C. Marchany:
Internet Security: Intrusion Detection and Prevention in Mobile Systems. HICSS 2007: 162 - [c19]Timothy Buennemeyer, Faiz Munshi, Randy C. Marchany, Joseph G. Tront:
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection. HICSS 2007: 163 - 2006
- [c18]Timothy Buennemeyer, Randolph Marchany, Joseph G. Tront:
Ubiquitous Security: Privacy versus Protection. PSC 2006: 71-77 - [c17]Anil Bazaz, James D. Arthur, Joseph G. Tront:
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. DASC 2006: 95-102 - [c16]Joseph G. Tront, Vinod Eligeti, Jane C. Prey:
WriteOn: a tool for classroom presentations on tablet PCs. ITiCSE 2006: 352 - 2004
- [c15]Joseph G. Tront, Randy C. Marchany:
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction. HICSS 2004 - [c14]Xia Teng, Brandon Muramatsu, Jianwei Zhang, Joseph G. Tront, Flora P. McMartin, Alice M. Agogino:
Implementation Issues on the Quality Evaluation ofWeb-Based Courses and Digital Learning Resources. ICWL 2004: 379-385 - 2003
- [c13]Joseph G. Tront, Randy C. Marchany:
CANDI: A System for Classifying the Security Risks in Network Appliances. HICSS 2003: 204 - [c12]Visvanathan Subramanian, Joseph G. Tront, Charles W. Bostian, Scott F. Midkiff:
Design and Implementation of a Configurable Platform for Embedded Communication Systems. IPDPS 2003: 189 - 2002
- [c11]Randy C. Marchany, Joseph G. Tront:
Minitrack Introduction. HICSS 2002: 192 - [c10]Randy C. Marchany, Joseph G. Tront:
E-commerce Security Issues. HICSS 2002: 193 - 2001
- [c9]Joseph G. Tront:
Synchronized Streaming Media in VLSI Education. MSE 2001: 75-76
1990 – 1999
- 1999
- [c8]Thomas H. Drayer, Joseph G. Tront, Richard W. Conners, Philip A. Araman:
A Development System for Creating Real-time Machine Vision Hardware using Field Programmable Gate Arrays. HICSS 1999 - 1996
- [j7]Christopher A. Ryan, Joseph G. Tront:
FX: a fast approximate fault simulator for the switch-level using VHDL. IEEE Trans. Very Large Scale Integr. Syst. 4(3): 336-345 (1996) - 1995
- [j6]Christopher A. Ryan, Joseph G. Tront:
Parallel Switch-Level Fault Simulation Performance Modeling using VHDL. Simul. 64(5): 308-319 (1995) - [c7]Thomas H. Drayer, Joseph G. Tront, William E. King IV, Richard W. Conners:
MORRPH: a modular and reprogrammable real-time processing hardware. FCCM 1995: 11-19 - 1994
- [j5]Inderpreet Bhasin, Joseph G. Tront:
Block-Level Logic Extraction from CMOS VLSI Layouts. VLSI Design 1(3): 243-259 (1994) - [c6]Christopher A. Ryan, Joseph G. Tront:
VHDL switch level fault simulation. EURO-DAC 1994: 650-655 - 1993
- [c5]Christopher A. Ryan, Joseph G. Tront:
Parallel switch level fault simulation algorithm/complexity verification using compiled code VHDL. RSP 1993: 100-105 - [c4]Christopher A. Ryan, Joseph G. Tront:
On parallel switch level fault simulation. VTS 1993: 341-347 - 1992
- [c3]Randy C. Marchany, Joseph G. Tront:
A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer. ICMC 1992 - 1991
- [j4]Kwanghyun Kim, Joseph G. Tront, Dong Sam Ha:
BIDES: A BIST design expert system. J. Electron. Test. 2(2): 165-179 (1991)
1980 – 1989
- 1988
- [j3]Kwanghyun Kim, Dong Sam Ha, Joseph G. Tront:
On using signature registers as pseudorandom pattern generators in built-in self-testing. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 7(8): 919-928 (1988) - [c2]Kwanghyun Kim, Joseph G. Tront, Dong Sam Ha:
Automatic Insertion of BIST Hardware Using VHDL. DAC 1988: 9-15 - 1986
- [c1]John C. McKeeman, Joseph G. Tront, Matthew Kabrisky:
Design and construction of a multiplexed electrode for monitoring evoked responses in cerebral cortex. ICASSP 1986: 1813-1816 - 1985
- [j2]Jeanette Tyler McCall, Joseph G. Tront, F. Gail Gray, Robert M. Haralick, William M. McCormack:
Parallel Computer Architectures and Problem Solving Strategies for the Consistent Labeling Problem. IEEE Trans. Computers 34(11): 973-980 (1985)
1970 – 1979
- 1979
- [j1]Joseph G. Tront, Donald D. Givone:
A Design for Multiple-Valued Logic Gates Based on MESFET's. IEEE Trans. Computers 28(11): 854-862 (1979)
Coauthor Index
aka: Randolph Marchany
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 23:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint