Henry L. Owen
Affiliations:- Georgia Tech, Atlanta, GA, USA
According to our database1,
Henry L. Owen
authored at least 75 papers
between 1993 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
2018
Future Gener. Comput. Syst., 2018
2017
Proceedings of the Guide to Security in SDN and NFV, 2017
IEEE Trans. Netw. Serv. Manag., 2017
2016
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
2015
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
2013
Wireless sensor networks for rehabilitation applications: Challenges and opportunities.
J. Netw. Comput. Appl., 2013
2012
The effects of quality of service on vehicular network pseudonym distribution in congested urban environments.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference Workshops, 2012
Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012
2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Comput. Oper. Res., 2008
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
2007
Communication Networks Adaptive measurement-based traffic engineering in small differentiated services domains.
Eur. Trans. Telecommun., 2007
2006
IEEE Trans. Educ., 2006
IEEE Secur. Priv., 2006
IEEE Computer Graphics and Applications, 2006
2005
Traffic engineering based on local states in Internet protocol-based radio access networks.
J. Commun. Networks, 2005
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries.
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
Proceedings of the Networking, 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
2004
Wirel. Commun. Mob. Comput., 2004
Wireless intrusion detection and response: a classic study using main-in-the-middle attack.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004
Proceedings of IEEE International Conference on Communications, 2004
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
Proceedings of the Computer Security, 2004
2003
IEEE Trans. Educ., 2003
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of IEEE International Conference on Communications, 2003
Wireless Intrusion Detection and Response.
Proceedings of the IEEE Systems, 2003
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks.
Proceedings of the IEEE Systems, 2003
A Cryptographic Protocol to Protect MPLS Labels.
Proceedings of the IEEE Systems, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Global Telecommunications Conference, 2003
2002
Eur. Trans. Telecommun., 2002
Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2.
Proceedings of the IASTED International Conference on Communications, 2002
2001
Eur. Trans. Telecommun., 2001
Proceedings of the Networking, 2001
2000
Trellis-based soft-output adaptive equalization techniques for TDMA cellular systems.
IEEE Trans. Veh. Technol., 2000
QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment.
Proceedings of the NETWORKING 2000, 2000
1999
The impact of mapping wander on the performance of SDH AU-4 and TU-3 uniform pointer processors.
Comput. Networks, 1999
Proceedings of the MASCOTS 1999, 1999
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999
1998
Proceedings of the Parallel and Distributed Processing, 10 IPPS/SPDP'98 Workshops Held in Conjunction with the 12th International Parallel Processing Symposium and 9th Symposium on Parallel and Distributed Processing, Orlando, Florida, USA, March 30, 1998
1997
The impact of mapping wander on the performance of SDH TU-11 and TU-l2 uniform pointer processors.
J. High Speed Networks, 1997
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997
An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997
1996
Eur. Trans. Telecommun., 1996
1995
Methodology and Results of Synchronous Digital Hierarchy Network Payload Jitter Simulation.
Simul., 1995
Synchronous digital hierarchy byte pointer justification versus VC-12 payload bit justification effects.
Eur. Trans. Telecommun., 1995
Simulation Model for Analysis of Synchronous Digital Hierarchy Network Payload Jitter.
Proceedings of the MASCOTS '95, 1995
1994
Comput. Networks ISDN Syst., 1994
Proceedings of the MASCOTS '94, Proceedings of the Second International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, January 31, 1994
1993
Eur. Trans. Telecommun., 1993
Comput. Commun., 1993
VLSI Architecture for Switch-Level Simulation.
Proceedings of the MASCOTS '93, 1993