default search action
W. Douglas Maughan
Person information
- affiliation: US Department of Homeland Security, Washington D.C., USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Chaitanya K. Baru, Lara Campbell, Aurali Dade, Pradeep Fulay, Alexander Loewi, Douglas Maughan, Ibrahim Mohedas, Linda K. Molnar, Michael Pozmantier, Michael Reksulak, Shelby Smith, Nicole Tehrani:
The NSF Convergence Accelerator Program. AI Mag. 43(1): 6-16 (2022)
2010 – 2019
- 2015
- [j5]Douglas Maughan, David M. Balenson, Ulf Lindqvist, Zachary Tudor:
Government-Funded R&D to Drive Cybersecurity Technologies. IT Prof. 17(4): 62-65 (2015) - 2013
- [j4]Douglas Maughan, David M. Balenson, Ulf Lindqvist, Zachary Tudor:
Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice. IEEE Secur. Priv. 11(2): 14-23 (2013) - 2012
- [j3]Michael D. Bailey, David Dittrich, Erin Kenneally, Douglas Maughan:
The Menlo Report. IEEE Secur. Priv. 10(2): 71-75 (2012) - 2011
- [c11]Charlotte Scheper, Susanna Cantor, Douglas Maughan:
PREDICT: a trusted framework for sharing data for cyber security research. BADGERS@EuroSys 2011: 105-106 - [c10]Doug Maughan:
Federal R&D landscape and DHS S&T overview. CSIIRW 2011: 4 - 2010
- [j2]W. Douglas Maughan:
The need for a national cybersecurity research and development agenda. Commun. ACM 53(2): 29-31 (2010) - [c9]Erin Kenneally, Michael D. Bailey, Douglas Maughan:
A Framework for Understanding and Applying Ethical Principles in Network and Security Research. Financial Cryptography Workshops 2010: 240-246 - [c8]W. Douglas Maughan:
Crossing the "Valley of Death": Transitioning Research into Commercial Products - A Personal Perspective. IEEE Symposium on Security and Privacy 2010: 21-26
2000 – 2009
- 2009
- [c7]Doug Maughan:
National cyber security research assessment and roadmap. CSIIRW 2009: 6 - [c6]Doug Maughan, George Hull, Salvatore J. Stolfo, Robert J. Stratton III:
Keynote panel. CSIIRW 2009: 10 - [c5]Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:
Securing network access in wireless sensor networks. WISEC 2009: 261-268 - 2007
- [j1]Amy Friedlander, Allison Mankin, W. Douglas Maughan, Stephen D. Crocker:
DNSSEC: a protocol toward securing the internet infrastructure. Commun. ACM 50(6): 44-50 (2007) - [e3]Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang:
Malware Detection. Advances in Information Security 27, Springer 2007, ISBN 978-0-387-32720-4 [contents] - 2005
- [c4]W. Douglas Maughan:
Homeland security: cyber security R&D initiatives. CCS 2005: 1 - 2003
- [e2]W. Douglas Maughan, Adrian Perrig:
Proceedings of the 2003 ACM Workshop on Wireless Security, San Diego, CA, USA, September 19, 2003. ACM 2003, ISBN 1-58113-769-9 [contents] - 2002
- [e1]W. Douglas Maughan, Nitin H. Vaidya:
Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, GA, USA, September 28, 2002. ACM 2002, ISBN 1-58113-585-8 [contents]
1990 – 1999
- 1998
- [i1]Douglas Maughan, Mark Schertler, Mark Schneider, Jeff Turner:
Internet Security Association and Key Management Protocol (ISAKMP). RFC 2408: 1-86 (1998) - 1996
- [c3]W. Douglas Maughan:
Working Group Report on Internet/Intranet Security. WETICE 1996: 129-132 - 1995
- [c2]W. Douglas Maughan, Amy B. Reiss, Mark Schertler:
Security associations: building blocks for secure communications. ISCC 1995: 157-163 - 1992
- [c1]W. Douglas Maughan:
Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP. ACSAC 1992: 193-201
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint