Henry L. Owen

Affiliations:
  • Georgia Tech


According to our database1, Henry L. Owen authored at least 75 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Orchestrating intercontinental advance reservations with software-defined exchanges.
Future Gener. Comput. Syst., 2019

Novel network services for supporting big data science research.
Future Gener. Comput. Syst., 2019

2018
Advance reservation access control using software-defined networking and tokens.
Future Gener. Comput. Syst., 2018

2017
A Security Policy Transition Framework for Software-Defined Networks.
Proceedings of the Guide to Security in SDN and NFV, 2017

Leveraging SDN and WebRTC for Rogue Access Point Security.
IEEE Trans. Netw. Serv. Manag., 2017

Advancing Software-Defined Networks: A Survey.
IEEE Access, 2017

2016
Security policy transition framework for Software Defined networks.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Ryuretic: A modular framework for Ryu.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Leveraging SDN to Improve the Security of DHCP.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

2015
IEEE 1609 Influenced Automatic Identification System (AIS).
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2013
Wireless sensor networks for rehabilitation applications: Challenges and opportunities.
J. Netw. Comput. Appl., 2013

2012
The effects of quality of service on vehicular network pseudonym distribution in congested urban environments.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012

Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

2010
Unified pseudonym distribution in VANETs.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Forensic implications of Ext4.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
A Method for Historical Ext3 Inode to Filename Translation on Honeypots.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Cooperative Certificate Revocation List Distribution Methods in VANETs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
A pricing approach for bandwidth allocation in differentiated service networks.
Comput. Oper. Res., 2008

Visual Analysis of Program Flow Data with Data Propagation.
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008

2007
Communication Networks Adaptive measurement-based traffic engineering in small differentiated services domains.
Eur. Trans. Telecommun., 2007

2006
Georgia tech information security center hands-on network security laboratory.
IEEE Trans. Educ., 2006

Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.
IEEE Secur. Priv., 2006

Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications, 2006

2005
Traffic engineering based on local states in Internet protocol-based radio access networks.
J. Commun. Networks, 2005

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005

Determining Differentiated Services Network Pricing Through Auctions.
Proceedings of the Networking, 2005

Securing Layer 2 in Local Area Networks.
Proceedings of the Networking, 2005

Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

2004
Dynamic resource scheduling (DRS): a multimedia QoS framework for W-CDMA.
Wirel. Commun. Mob. Comput., 2004

Using Honeynets to Protect Large Enterprise Networks.
IEEE Secur. Priv., 2004

Wireless intrusion detection and response: a classic study using main-in-the-middle attack.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

HoneyStat: Local Worm Detection Using Honeypots.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Towards an Approach for Automatically Repairing Compromised Network Systems.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

A comparison of auction and flat pricing for differentiated service networks.
Proceedings of IEEE International Conference on Communications, 2004

Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
Proceedings of the Computer Security, 2004

2003
University methodology for internetworking principles and design projects.
IEEE Trans. Educ., 2003

Intrusion Detection Testing and Benchmarking Methodologies.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

Distributed bandwidth reservation by probing for available bandwidth.
Proceedings of the 11th IEEE International Conference on Networks, 2003

M-MPLS: Micromobility-enabled multiprotocol label switching.
Proceedings of IEEE International Conference on Communications, 2003

Wireless Intrusion Detection and Response.
Proceedings of the IEEE Systems, 2003

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
Proceedings of the IEEE Systems, 2003

A Cryptographic Protocol to Protect MPLS Labels.
Proceedings of the IEEE Systems, 2003

An auction pricing strategy for differentiated service networks.
Proceedings of the Global Telecommunications Conference, 2003

Probing available bandwidth in radio access networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Power Control Based QoS Provisioning for Multimedia in W-CDMA.
Wirel. Networks, 2002

Traffic generation algorithm for sdh digital cross-connects.
Eur. Trans. Telecommun., 2002

Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2.
Proceedings of the IASTED International Conference on Communications, 2002

2001
Intact versus fractional switching in SONET/SDH cross - connects.
Eur. Trans. Telecommun., 2001

QoS support for UDP/TCP based networks.
Comput. Commun., 2001

Packet-Size Based Queuing Algorithm for QoS Support.
Proceedings of the Networking, 2001

2000
Trellis-based soft-output adaptive equalization techniques for TDMA cellular systems.
IEEE Trans. Veh. Technol., 2000

Dynamic resource scheduling schemes for W-CDMA systems.
IEEE Commun. Mag., 2000

QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment.
Proceedings of the NETWORKING 2000, 2000

1999
The impact of mapping wander on the performance of SDH AU-4 and TU-3 uniform pointer processors.
Comput. Networks, 1999

SDH Digital Cross-Connect Traffic Generation Algorithm.
Proceedings of the MASCOTS 1999, 1999

Dynamic resource scheduling for variable QoS traffic in W-CDMA.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
SONET/SDH traffic generation models.
Eur. Trans. Telecommun., 1998

Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate.
Proceedings of the Parallel and Distributed Processing, 10 IPPS/SPDP'98 Workshops Held in Conjunction with the 12th International Parallel Processing Symposium and 9th Symposium on Parallel and Distributed Processing, Orlando, Florida, USA, March 30, 1998

1997
The impact of mapping wander on the performance of SDH TU-11 and TU-l2 uniform pointer processors.
J. High Speed Networks, 1997

Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
Effects of fixed frequency clock offsets in synchronous digital hierarchy networks.
Eur. Trans. Telecommun., 1996

Ring-based bandwidth dimensioning in SDH networks.
Comput. Commun., 1996

1995
Methodology and Results of Synchronous Digital Hierarchy Network Payload Jitter Simulation.
Simul., 1995

Synchronous digital hierarchy byte pointer justification versus VC-12 payload bit justification effects.
Eur. Trans. Telecommun., 1995

Simulation Model for Analysis of Synchronous Digital Hierarchy Network Payload Jitter.
Proceedings of the MASCOTS '95, 1995

1994
Synchronous Digital Hierarchy Network Pointer Simulation.
Comput. Networks ISDN Syst., 1994

Synchronous Digital Hierarchy Network Modeling.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Synchronous Digital Hierarchy Optical Metropolitan Network Ring Traffic Analysis.
Eur. Trans. Telecommun., 1993

Synchronous Digital Hierarchy statistical simulation of pointer activity.
Comput. Commun., 1993

VLSI Architecture for Switch-Level Simulation.
Proceedings of the MASCOTS '93, 1993


  Loading...