Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections DW Jacobson, JA Davis US Patent 6,044,402, 2000 | 180 | 2000 |
Network security bridge and associated method DW Jacobson US Patent 5,548,649, 1996 | 94 | 1996 |
Security and performance analysis of a secure clustering protocol for sensor networks P Banerjee, D Jacobson, SN Lahiri Sixth IEEE International Symposium on Network Computing and Applications …, 2007 | 86 | 2007 |
Attribution of fraudulent resource consumption in the cloud J Idziorek, M Tannian, D Jacobson 2012 IEEE fifth international conference on cloud computing, 99-106, 2012 | 75 | 2012 |
Detecting fraudulent use of cloud resources J Idziorek, M Tannian, D Jacobson Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 61-72, 2011 | 75 | 2011 |
IT-adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics JA Rursch, A Luse, D Jacobson IEEE Transactions on Education 53 (1), 71-79, 2009 | 69 | 2009 |
Cyber security training a survey of serious games in cyber security JN Tioh, M Mina, DW Jacobson 2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017 | 67 | 2017 |
The insecurity of cloud utility models J Idziorek, MF Tannian, D Jacobson IT Professional 15 (2), 22-27, 2012 | 58 | 2012 |
Cyber security for airports K Gopalakrishnan, M Govindarasu, DW Jacobson, BM Phares International Journal for Traffic and Transport Engineering 3 (4), 365-376, 2013 | 53 | 2013 |
Utilizing structural equation modeling and social cognitive career theory to identify factors in choice of IT as a major A Luse, JA Rursch, D Jacobson ACM Transactions on Computing Education (TOCE) 14 (3), 1-19, 2014 | 46 | 2014 |
Ten myths of cooperative learning in engineering education D Jacobson, J Davis, B Licklider FIE'98. 28th Annual Frontiers in Education Conference. Moving from'Teacher …, 1998 | 37 | 1998 |
ARA: A wireless living lab vision for smart and connected rural communities H Zhang, Y Guan, A Kamal, D Qiao, M Zheng, A Arora, O Boyraz, B Cox, ... Proceedings of the 15th ACM Workshop on Wireless Network Testbeds …, 2022 | 35 | 2022 |
Computer security literacy: staying safe in a digital world D Jacobson, J Idziorek CRC Press, 2012 | 28 | 2012 |
Introduction to network security D Jacobson Chapman and Hall/CRC, 2008 | 21 | 2008 |
Bounding delay on a multifarious token ring network SS Gaitonde, D Jacobson, AV Pohm Communications of the ACM 33 (1), 20-28, 1990 | 21 | 1990 |
When a testbed does more than testing: The Internet-Scale Event Attack and Generation Environment (ISEAGE)-providing learning and synthesizing experiences for cyber security … JA Rursch, D Jacobson 2013 IEEE Frontiers in Education Conference (FIE), 1267-1272, 2013 | 18 | 2013 |
A master/slave monitor measurement technique for an operating ethernet network D Jacobson, S Gaitonde, J Kim, J Lee, D Rover, M Sarwar, M Shafiq IEEE Network 1 (3), 40-48, 1987 | 16 | 1987 |
Cyber security social engineers an extensible teaching tool for social engineering education and awareness JN Tioh, M Mina, DW Jacobson 2019 IEEE Frontiers in Education Conference (FIE), 1-5, 2019 | 15 | 2019 |
Engaging millenials with information technology: A case study using high school cyber defense competitions D Jacobson, JA Rursch 12th Colloquium for Information Systems Security Education, 2008 | 12 | 2008 |
Cyber defense competition D Jacobson, N Evans 2006 Annual Conference & Exposition, 11.386. 1-11.386. 18, 2006 | 12 | 2006 |