Smart packets for active networks B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge 1999 IEEE Second Conference on Open Architectures and Network Programming …, 1999 | 343 | 1999 |
Survivable mobile wireless networks: issues, challenges, and research directions JPG Sterbenz, R Krishnan, RR Hain, AW Jackson, D Levin, ... Proceedings of the 1st ACM workshop on Wireless security, 31-40, 2002 | 228 | 2002 |
Smart packets: applying active networks to network management B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge ACM Transactions on Computer Systems (TOCS) 18 (1), 67-88, 2000 | 187 | 2000 |
Decoy Routing: Toward Unblockable Internet Communication. J Karlin, D Ellard, AW Jackson, CE Jones, G Lauer, D Mankins, ... FOCI, 2011 | 177 | 2011 |
Commentaries on" Active Networking and end-to-end arguments" TM Chen, AW Jackson IEEE Network 12 (3), 66-71, 1998 | 141 | 1998 |
IPv6 router alert option C Partridge, A Jackson | 132 | 1999 |
Using signal processing to analyze wireless data traffic C Partridge, D Cousins, AW Jackson, R Krishnan, T Saxena, WT Strayer Proceedings of the 1st ACM workshop on Wireless security, 67-76, 2002 | 107 | 2002 |
Domain based internet security policy management J Zao, L Sanchez, M Condell, C Lynn, M Fredette, P Helinek, P Krishnan, ... Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 63 | 2000 |
Active network monitoring and control: the SENCOMM architecture and implementation AW Jackson, JPG Sterbenz, MN Condell, RR Hain Proceedings DARPA Active Networks Conference and Exposition, 379-393, 2002 | 59 | 2002 |
Rebound: Decoy routing on asymmetric routes via error messages D Ellard, C Jones, V Manfredi, WT Strayer, B Thapa, M Van Welie, ... 2015 IEEE 40th Conference on Local Computer Networks (LCN), 91-99, 2015 | 39 | 2015 |
SLINGbot: A system for live investigation of next generation botnets AW Jackson, D Lapsley, C Jones, M Zatko, C Golubitsky, WT Strayer 2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009 | 38 | 2009 |
Active And Programmable Networks [Guest Editorial] TM Chen, AW Jackson IEEE Network 12 (3), 10-11, 1998 | 32 | 1998 |
Systems and methods for detecting malicious insiders using event models WT Strayer, C Partridge, AW Jackson, SH Polit US Patent App. 13/181,204, 2013 | 29 | 2013 |
A topological analysis of monitor placement AW Jackson, W Milliken, CA Santivánez, M Condell, WT Strayer Sixth IEEE International Symposium on Network Computing and Applications …, 2007 | 26 | 2007 |
Destination address control to limit unauthorized communications DJ Ellard, AW Jackson, CE Jones, JF Karlin, VU Manfredi, DP Mankins, ... US Patent 9,237,027, 2016 | 25 | 2016 |
Highball: a high speed, reserved-access, wide area network DL Mills, CG Boncelet, JG Elias, PA Schragger, AW Jackson | 25 | 1990 |
ANEP: Active network encapsulation protocol DS Alexander, B Braden, CA Gunter, AW Jackson, AD Keromytis, ... Active Networks Group, Request for Comments, http://www. cis. upenn. edu …, 1977 | 19 | 1977 |
Digital network processor-based multi-protocol flow control WC Milliken, AW Jackson US Patent 7,095,753, 2006 | 18 | 2006 |
Understanding encrypted networks through signal and systems analysis of traffic timing D Cousins, C Partridge, K Bongiovanni, AW Jackson, R Krishnan, ... Proc. 2003 IEEE Aerospace Conference, 2003 | 18 | 2003 |
Ternary content addressable memory embedded in a central processing unit WC Milliken, C Partridge, AW Jackson US Patent 7,543,077, 2009 | 17 | 2009 |