Follow
Alden Jackson
Title
Cited by
Cited by
Year
Smart packets for active networks
B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge
1999 IEEE Second Conference on Open Architectures and Network Programming …, 1999
3371999
Survivable mobile wireless networks: issues, challenges, and research directions
JPG Sterbenz, R Krishnan, RR Hain, AW Jackson, D Levin, ...
Proceedings of the 1st ACM workshop on Wireless security, 31-40, 2002
2292002
Smart packets: applying active networks to network management
B Schwartz, AW Jackson, WT Strayer, W Zhou, RD Rockwell, C Partridge
ACM Transactions on Computer Systems (TOCS) 18 (1), 67-88, 2000
1852000
Decoy Routing: Toward Unblockable Internet Communication.
J Karlin, D Ellard, AW Jackson, CE Jones, G Lauer, D Mankins, ...
FOCI, 2011
1672011
Commentaries on" Active Networking and end-to-end arguments"
TM Chen, AW Jackson
IEEE Network 12 (3), 66-71, 1998
1471998
IPv6 router alert option
C Partridge, A Jackson
1241999
Using signal processing to analyze wireless data traffic
C Partridge, D Cousins, AW Jackson, R Krishnan, T Saxena, WT Strayer
Proceedings of the 1st ACM workshop on Wireless security, 67-76, 2002
1042002
Active network monitoring and control: the SENCOMM architecture and implementation
AW Jackson, JPG Sterbenz, MN Condell, RR Hain
Proceedings DARPA Active Networks Conference and Exposition, 379-393, 2002
602002
Domain based internet security policy management
J Zao, L Sanchez, M Condell, C Lynn, M Fredette, P Helinek, P Krishnan, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
602000
Rebound: Decoy routing on asymmetric routes via error messages
D Ellard, C Jones, V Manfredi, WT Strayer, B Thapa, M Van Welie, ...
2015 IEEE 40th Conference on Local Computer Networks (LCN), 91-99, 2015
382015
SLINGbot: A system for live investigation of next generation botnets
AW Jackson, D Lapsley, C Jones, M Zatko, C Golubitsky, WT Strayer
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
372009
Active And Programmable Networks [Guest Editorial]
TM Chen, AW Jackson
IEEE Network 12 (3), 10-11, 1998
331998
Systems and methods for detecting malicious insiders using event models
WT Strayer, C Partridge, AW Jackson, SH Polit
US Patent App. 13/181,204, 2013
252013
A topological analysis of monitor placement
AW Jackson, W Milliken, CA Santivánez, M Condell, WT Strayer
Sixth IEEE International Symposium on Network Computing and Applications …, 2007
252007
Highball: a high speed, reserved-access, wide area network
DL Mills, CG Boncelet, JG Elias, PA Schragger, AW Jackson
251990
Destination address control to limit unauthorized communications
DJ Ellard, AW Jackson, CE Jones, JF Karlin, VU Manfredi, DP Mankins, ...
US Patent 9,237,027, 2016
202016
ANEP: Active network encapsulation protocol
DS Alexander, B Braden, CA Gunter, AW Jackson, AD Keromytis, ...
Active Networks Group, Request for Comments, http://www. cis. upenn. edu …, 1977
191977
Digital network processor-based multi-protocol flow control
WC Milliken, AW Jackson
US Patent 7,095,753, 2006
182006
Ternary content addressable memory embedded in a central processing unit
WC Milliken, C Partridge, AW Jackson
US Patent 7,543,077, 2009
172009
Understanding encrypted networks through signal and systems analysis of traffic timing
D Cousins, C Partridge, K Bongiovanni, AW Jackson, R Krishnan, ...
Proc. 2003 IEEE Aerospace Conference, 2003
162003
The system can't perform the operation now. Try again later.
Articles 1–20