Henry L. Owen

According to our database1, Henry L. Owen authored at least 70 papers between 1993 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Advance reservation access control using software-defined networking and tokens.
Future Generation Comp. Syst., 2018

2017
Leveraging SDN and WebRTC for Rogue Access Point Security.
IEEE Trans. Network and Service Management, 2017

Advancing Software-Defined Networks: A Survey.
IEEE Access, 2017

2016
Security policy transition framework for Software Defined networks.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Ryuretic: A modular framework for Ryu.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Leveraging SDN to Improve the Security of DHCP.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

2015
IEEE 1609 Influenced Automatic Identification System (AIS).
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2013
Wireless sensor networks for rehabilitation applications: Challenges and opportunities.
J. Network and Computer Applications, 2013

2012
The effects of quality of service on vehicular network pseudonym distribution in congested urban environments.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012

Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

2010
Unified pseudonym distribution in VANETs.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

Forensic implications of Ext4.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
A Method for Historical Ext3 Inode to Filename Translation on Honeypots.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Cooperative Certificate Revocation List Distribution Methods in VANETs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
A pricing approach for bandwidth allocation in differentiated service networks.
Computers & OR, 2008

Visual Analysis of Program Flow Data with Data Propagation.
Proceedings of the Visualization for Computer Security, 5th International Workshop, 2008

2007
Communication Networks Adaptive measurement-based traffic engineering in small differentiated services domains.
European Transactions on Telecommunications, 2007

2006
Georgia tech information security center hands-on network security laboratory.
IEEE Trans. Education, 2006

Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.
IEEE Security & Privacy, 2006

Countering Security Information Overload through Alert and Packet Visualization.
IEEE Computer Graphics and Applications, 2006

2005
Traffic engineering based on local states in Internet protocol-based radio access networks.
Journal of Communications and Networks, 2005

Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 2005

Determining Differentiated Services Network Pricing Through Auctions.
Proceedings of the Networking, 2005

Securing Layer 2 in Local Area Networks.
Proceedings of the Networking, 2005

Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

2004
Dynamic resource scheduling (DRS): a multimedia QoS framework for W-CDMA.
Wireless Communications and Mobile Computing, 2004

Using Honeynets to Protect Large Enterprise Networks.
IEEE Security & Privacy, 2004

Wireless intrusion detection and response: a classic study using main-in-the-middle attack.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

HoneyStat: Local Worm Detection Using Honeypots.
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004

Towards an Approach for Automatically Repairing Compromised Network Systems.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

A comparison of auction and flat pricing for differentiated service networks.
Proceedings of IEEE International Conference on Communications, 2004

Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
Proceedings of the Computer Security, 2004

2003
University methodology for internetworking principles and design projects.
IEEE Trans. Education, 2003

Intrusion Detection Testing and Benchmarking Methodologies.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

Distributed bandwidth reservation by probing for available bandwidth.
Proceedings of the 11th IEEE International Conference on Networks, 2003

M-MPLS: Micromobility-enabled multiprotocol label switching.
Proceedings of IEEE International Conference on Communications, 2003

Wireless Intrusion Detection and Response.
Proceedings of the IEEE Systems, 2003

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
Proceedings of the IEEE Systems, 2003

A Cryptographic Protocol to Protect MPLS Labels.
Proceedings of the IEEE Systems, 2003

An auction pricing strategy for differentiated service networks.
Proceedings of the Global Telecommunications Conference, 2003

Probing available bandwidth in radio access networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Power Control Based QoS Provisioning for Multimedia in W-CDMA.
Wireless Networks, 2002

Traffic generation algorithm for sdh digital cross-connects.
European Transactions on Telecommunications, 2002

Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2.
Proceedings of the IASTED International Conference on Communications, 2002

2001
Intact versus fractional switching in SONET/SDH cross - connects.
European Transactions on Telecommunications, 2001

QoS support for UDP/TCP based networks.
Computer Communications, 2001

Packet-Size Based Queuing Algorithm for QoS Support.
Proceedings of the Networking, 2001

2000
Trellis-based soft-output adaptive equalization techniques for TDMA cellular systems.
IEEE Trans. Vehicular Technology, 2000

QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment.
Proceedings of the NETWORKING 2000, 2000

1999
The impact of mapping wander on the performance of SDH AU-4 and TU-3 uniform pointer processors.
Computer Networks, 1999

SDH Digital Cross-Connect Traffic Generation Algorithm.
Proceedings of the MASCOTS 1999, 1999

1998
SONET/SDH traffic generation models.
European Transactions on Telecommunications, 1998

Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate.
IPPS/SPDP Workshops, 1998

1997
The impact of mapping wander on the performance of SDH TU-11 and TU-l2 uniform pointer processors.
J. High Speed Networks, 1997

Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

1996
Effects of fixed frequency clock offsets in synchronous digital hierarchy networks.
European Transactions on Telecommunications, 1996

Ring-based bandwidth dimensioning in SDH networks.
Computer Communications, 1996

1995
Methodology and Results of Synchronous Digital Hierarchy Network Payload Jitter Simulation.
Simulation, 1995

Synchronous digital hierarchy byte pointer justification versus VC-12 payload bit justification effects.
European Transactions on Telecommunications, 1995

Simulation Model for Analysis of Synchronous Digital Hierarchy Network Payload Jitter.
Proceedings of the MASCOTS '95, 1995

1994
Synchronous Digital Hierarchy Network Pointer Simulation.
Computer Networks and ISDN Systems, 1994

Synchronous Digital Hierarchy Network Modeling.
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994

1993
Synchronous Digital Hierarchy Optical Metropolitan Network Ring Traffic Analysis.
European Transactions on Telecommunications, 1993

Synchronous Digital Hierarchy statistical simulation of pointer activity.
Computer Communications, 1993

VLSI Architecture for Switch-Level Simulation.
Proceedings of the MASCOTS '93, 1993


  Loading...