Alden Jackson
Alden Jackson
Northeastern University
Adresă de e-mail confirmată pe northeastern.edu
Citat de
Citat de
Smart packets for active networks
B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge
1999 IEEE Second Conference on Open Architectures and Network Programming …, 1999
Survivable mobile wireless networks: issues, challenges, and research directions
JPG Sterbenz, R Krishnan, RR Hain, AW Jackson, D Levin, ...
Proceedings of the 1st ACM workshop on Wireless security, 31-40, 2002
Smart packets: applying active networks to network management
B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge
ACM Transactions on Computer Systems (TOCS) 18 (1), 67-88, 2000
Decoy Routing: Toward Unblockable Internet Communication.
J Karlin, D Ellard, AW Jackson, CE Jones, G Lauer, D Mankins, ...
FOCI, 2011
Commentaries on" Active Networking and end-to-end arguments"
TM Chen, AW Jackson
IEEE Network 12 (3), 66-71, 1998
IPv6 router alert option
C Partridge, A Jackson
Using signal processing to analyze wireless data traffic
C Partridge, D Cousins, AW Jackson, R Krishnan, T Saxena, WT Strayer
Proceedings of the 1st ACM workshop on Wireless security, 67-76, 2002
Domain based internet security policy management
J Zao, L Sanchez, M Condell, C Lynn, M Fredette, P Helinek, P Krishnan, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
Active network monitoring and control: the SENCOMM architecture and implementation
AW Jackson, JPG Sterbenz, MN Condell, RR Hain
Proceedings DARPA Active Networks Conference and Exposition, 379-393, 2002
Rebound: Decoy routing on asymmetric routes via error messages
D Ellard, C Jones, V Manfredi, WT Strayer, B Thapa, M Van Welie, ...
2015 IEEE 40th Conference on Local Computer Networks (LCN), 91-99, 2015
SLINGbot: A system for live investigation of next generation botnets
AW Jackson, D Lapsley, C Jones, M Zatko, C Golubitsky, WT Strayer
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
Active And Programmable Networks [Guest Editorial]
TM Chen, AW Jackson
IEEE Network 12 (3), 10-11, 1998
Systems and methods for detecting malicious insiders using event models
WT Strayer, C Partridge, AW Jackson, SH Polit
US Patent App. 13/181,204, 2013
A topological analysis of monitor placement
AW Jackson, W Milliken, CA Santivánez, M Condell, WT Strayer
Sixth IEEE International Symposium on Network Computing and Applications …, 2007
Highball: a high speed, reserved-access, wide area network
DL Mills, CG Boncelet, JG Elias, PA Schragger, AW Jackson
Destination address control to limit unauthorized communications
DJ Ellard, AW Jackson, CE Jones, JF Karlin, VU Manfredi, DP Mankins, ...
US Patent 9,237,027, 2016
ANEP: Active network encapsulation protocol
DS Alexander, B Braden, CA Gunter, AW Jackson, AD Keromytis, ...
Active Networks Group, Request for Comments, http://www. cis. upenn. edu …, 1977
Digital network processor-based multi-protocol flow control
WC Milliken, AW Jackson
US Patent 7,095,753, 2006
Ternary content addressable memory embedded in a central processing unit
WC Milliken, C Partridge, AW Jackson
US Patent 7,543,077, 2009
Understanding encrypted networks through signal and systems analysis of traffic timing
D Cousins, C Partridge, K Bongiovanni, AW Jackson, R Krishnan, ...
Proc. 2003 IEEE Aerospace Conference, 2003
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20