Douglas Jacobson

According to our database1, Douglas Jacobson authored at least 26 papers between 1987 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 2011, "For contributions to information assurance education and practice".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing Environments.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

2021
T-PKI for Anonymous Attestation in TPM.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

ARA: A Wireless Living Lab Vision for Smart and Connected Rural Communities.
Proceedings of the WiNTECH'21: Proceedings of the 15th ACM Workshop on Wireless Network Testbeds, 2021

DECA: DoD Enterprise Cloud Architecture Concept for Cloud-Based Cross Domain Solutions.
Proceedings of the AICCC 2021: 4th Artificial Intelligence and Cloud Computing Conference, Kyoto, Japan, December 17, 2021

2020
Editorial: Special issue on security and privacy in smart cyber-physical systems.
Comput. Secur., 2020

BitemporalDB: A Bitemporal Database in the Cloud for Financial Services Data.
Proceedings of the IEEE International Conference on Smart Cloud, 2020

2019
Special Issue on Security and Privacy in Smart Cyber-physical Systems.
Comput. Secur., 2019

Design and Implementation of a Cyber Physical Testbed for Security Training.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

Computational Challenges and Opportunities in Financial Services.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Forensic Analysis of Cloud Virtual Environments.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2014
Utilizing Structural Equation Modeling and Social Cognitive Career Theory to Identify Factors in Choice of IT as a Major.
ACM Trans. Comput. Educ., 2014

2013
The Insecurity of Cloud Utility Models.
IT Prof., 2013

This IS child's play Creating a "playground" (computer network testbed) for high school students to learn, practice, and compete in cyber defense competitions.
Proceedings of the IEEE Frontiers in Education Conference, 2013

When a testbed does more than testing: The Internet-Scale Event Attack and Generation Environment (ISEAGE) - providing learning and synthesizing experiences for cyber security students.
Proceedings of the IEEE Frontiers in Education Conference, 2013

Engineer of 2020 outcomes and the student experience.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
Workshop: Teaching computer security literacy to the masses: A practical approach.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Security across the curriculum and beyond.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Attribution of Fraudulent Resource Consumption in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Modeling web usage profiles of cloud services for utility cost analysis.
Proceedings of the Winter Simulation Conference 2011, 2011

Detecting fraudulent use of cloud resources.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
IT-Adventures: A Program to Spark IT Interest in High School Students Using Inquiry-Based Learning With Cyber Defense, Game Design, and Robotics.
IEEE Trans. Educ., 2010

2007
Security and performance analysis of a secure clustering protocol for sensor networks.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Optimal configuration of a secure clustering protocol for sensor networks.
Proceedings of the ISCA 20th International Conference on Parallel and Distributed Computing Systems, 2007

1990
Bounding Delay on a Multifarious Token Ring Network.
Commun. ACM, 1990

1988
A prioritized reservation protocol for fiber optic ring local area computer networks.
Proceedings of the 13th Conference on Local Computer Networks, 1988

1987
A master/slave monitor measurement technique for an operating ethernet network.
IEEE Netw., 1987


  Loading...