Author image not provided
 Alden W. Jackson

  Affiliation history
Bibliometrics: publication history
Average citations per article10.00
Citation Count120
Publication count12
Publication years1993-2015
Available for download4
Average downloads per article1,668.75
Downloads (cumulative)6,675
Downloads (12 Months)61
Downloads (6 Weeks)14
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


12 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 12 of 12
Sort by:

October 2015 LCN '15: Proceedings of the 2015 IEEE 40th Conference on Local Computer Networks (LCN 2015)
Publisher: IEEE Computer Society
Citation Count: 3

Decoy routing is a powerful circumvention mechanism intended to provide secure communications that cannot be monitored, detected, or disrupted by a third party who controls the user's network infrastructure. Current decoy routing protocols have weaknesses, however: they either make the unrealistic assumption that routes through the network are symmetric (i.e., ...

October 2009 MILCOM'09: Proceedings of the 28th IEEE conference on Military communications
Publisher: IEEE Press
Citation Count: 0

We describe the architecture of PHAROS (Petabit Highly-Agile Robust Optical System), developed under the DARPA CORONET program. PHAROS provides traffic engineering, resource management and signaling solutions for highly-agile, large-capacity core optical networks. PHAROS technology facilitates rapid configuration of network resources to address dynamic traffic needs in future global military and ...

March 2009 CATCH '09: Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
Publisher: IEEE Computer Society
Citation Count: 5

There is an urgent need for a pro-active approach to botnet detection and mitigation that will enable computer network defenders to characterize emerging and future botnet threats and design effective defense techniques before these threats materialize. To this end, we have developed a System for Live Investigation of Next Generation ...
Keywords: Next Generation Botnets, SLINGbot

October 2007 LCN '07: Proceedings of the 32nd IEEE Conference on Local Computer Networks
Publisher: IEEE Computer Society
Citation Count: 0

Flow correlation algorithms compare flows to determine similarity, and are especially useful and well studied for detecting flow chains through "stepping stone" hosts. Most correlation algorithms use only one characteristic and require all values in the correlation matrix (the correlation value of all flows to all other flows) to be ...
Keywords: correlation algorithms, stepping stone detection, flow correlation

5 published by ACM
September 2002 WiSE '02: Proceedings of the 1st ACM workshop on Wireless security
Publisher: ACM
Citation Count: 35
Downloads (6 Weeks): 7,   Downloads (12 Months): 28,   Downloads (Overall): 4,376

Full text available: PDFPDF
In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements*. Research focus on three key aspects can significantly enhance network survivability: (i) establishing and maintaining survivable topologies that strive to keep the network connected even under attack, (ii) ...
Keywords: ad hoc routing, asymmetric channel, mobile wireless network, survivability, weak and episodic connectivity, eventual connectivity, eventual stability, fault tolerance, security, store and haul forwarding, topology, satellite, disconnected, low probability of detection (LPD)

6 published by ACM
September 2002 WiSE '02: Proceedings of the 1st ACM workshop on Wireless security
Publisher: ACM
Citation Count: 13
Downloads (6 Weeks): 1,   Downloads (12 Months): 11,   Downloads (Overall): 1,097

Full text available: PDFPDF
Experts have long recognized that theoretically it was possible to perform traffic analysis on encrypted packet streams by analyzing the timing of packet arrivals (or transmissions). We report on experiments to realize this possiblity using basic signal processing techniques taken from acoustics to perform traffic analysis on encrypted transmissions over ...
Keywords: wireless networks, encryption, traffic analysis, signal processing

7 published by ACM
February 2000 ACM Transactions on Computer Systems (TOCS): Volume 18 Issue 1, Feb. 2000
Publisher: ACM
Citation Count: 28
Downloads (6 Weeks): 6,   Downloads (12 Months): 22,   Downloads (Overall): 1,196

Full text available: PDFPDF
This article introduces Smart Packets and describes the smart Packets architecture, the packet formats, the language and its design goals, and security considerations. Smart Packets is an Active Networks project focusing on applying active networks technology to network management and monitoring. Messages in active networks are programs that are executed ...
Keywords: active networks

October 1999
Citation Count: 11
Downloads (6 Weeks): 0,   Downloads (12 Months): 0,   Downloads (Overall): 6

Full text available: TxtTxt
This memo describes a new IPv6 Hop-by-Hop Option type that alerts transit routers to more closely examine the contents of an IP datagram. This option is useful for situations where a datagram addressed to a particular destination contains information that may require special processing by routers along the path.

March 1999 WOES'99: Proceedings of the Workshop on Embedded Systems on Workshop on Embedded Systems
Publisher: USENIX Association
Citation Count: 3

Imagine a world in which every device has an embedded processor and a high-speed wireless link. Any two devices can talk to each other and you link devices together as needed to get your work done. Devices with embedded processors and wireless links are coming soon. This paper looks at ...

May 1998 IEEE Network: The Magazine of Global Internetworking: Volume 12 Issue 3, May 1998
Publisher: IEEE Press
Citation Count: 18

This article is a collection of short commentaries by recognized networking experts offering their perspectives on the relation between active networks and “end-to-end arguments”. The first commentary, by Bhattacharjee, Calvert, and Zegura, frames the question and makes a case arguing that active networking does not conflict with end-to-end argument principles. ...

May 1998 IEEE Network: The Magazine of Global Internetworking: Volume 12 Issue 3, May 1998
Publisher: IEEE Press
Citation Count: 4

First Page of the Article

January 1993
Citation Count: 0

The problem we address is efficient scheduling for periodic multicast in a network with directed links that uses Time Division Multiple Access (TDMA) protocols. The problem has its origin in the University of Delaware Highball network architecture. We assume the network contains switches that have multicast capability. Let the period ...
Keywords: fault tolerant

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us