Segui
Alden Jackson
Titolo
Citata da
Citata da
Anno
Smart packets for active networks
B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge
1999 IEEE Second Conference on Open Architectures and Network Programming …, 1999
3411999
Survivable mobile wireless networks: issues, challenges, and research directions
JPG Sterbenz, R Krishnan, RR Hain, AW Jackson, D Levin, ...
Proceedings of the 1st ACM workshop on Wireless security, 31-40, 2002
2302002
Smart packets: applying active networks to network management
B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge
ACM Transactions on Computer Systems (TOCS) 18 (1), 67-88, 2000
1882000
Decoy Routing: Toward Unblockable Internet Communication.
J Karlin, D Ellard, AW Jackson, CE Jones, G Lauer, D Mankins, ...
FOCI, 2011
1712011
Commentaries on" Active Networking and end-to-end arguments"
TM Chen, AW Jackson
IEEE Network 12 (3), 66-71, 1998
1411998
IPv6 router alert option
C Partridge, A Jackson
1301999
Using signal processing to analyze wireless data traffic
C Partridge, D Cousins, AW Jackson, R Krishnan, T Saxena, WT Strayer
Proceedings of the 1st ACM workshop on Wireless security, 67-76, 2002
1062002
Domain based internet security policy management
J Zao, L Sanchez, M Condell, C Lynn, M Fredette, P Helinek, P Krishnan, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
642000
Active network monitoring and control: the SENCOMM architecture and implementation
AW Jackson, JPG Sterbenz, MN Condell, RR Hain
Proceedings DARPA Active Networks Conference and Exposition, 379-393, 2002
572002
Rebound: Decoy routing on asymmetric routes via error messages
D Ellard, C Jones, V Manfredi, WT Strayer, B Thapa, M Van Welie, ...
2015 IEEE 40th Conference on Local Computer Networks (LCN), 91-99, 2015
382015
SLINGbot: A system for live investigation of next generation botnets
AW Jackson, D Lapsley, C Jones, M Zatko, C Golubitsky, WT Strayer
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
372009
Active And Programmable Networks [Guest Editorial]
TM Chen, AW Jackson
IEEE Network 12 (3), 10-11, 1998
311998
Systems and methods for detecting malicious insiders using event models
WT Strayer, C Partridge, AW Jackson, SH Polit
US Patent App. 13/181,204, 2013
272013
A topological analysis of monitor placement
AW Jackson, W Milliken, CA Santivánez, M Condell, WT Strayer
Sixth IEEE International Symposium on Network Computing and Applications …, 2007
262007
Highball: a high speed, reserved-access, wide area network
DL Mills, CG Boncelet, JG Elias, PA Schragger, AW Jackson
241990
Destination address control to limit unauthorized communications
DJ Ellard, AW Jackson, CE Jones, JF Karlin, VU Manfredi, DP Mankins, ...
US Patent 9,237,027, 2016
232016
ANEP: Active network encapsulation protocol
DS Alexander, B Braden, CA Gunter, AW Jackson, AD Keromytis, ...
Active Networks Group, Request for Comments, http://www. cis. upenn. edu …, 1977
201977
Digital network processor-based multi-protocol flow control
WC Milliken, AW Jackson
US Patent 7,095,753, 2006
182006
Ternary content addressable memory embedded in a central processing unit
WC Milliken, C Partridge, AW Jackson
US Patent 7,543,077, 2009
172009
Understanding encrypted networks through signal and systems analysis of traffic timing
D Cousins, C Partridge, K Bongiovanni, AW Jackson, R Krishnan, ...
Proc. 2003 IEEE Aerospace Conference, 2003
172003
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20