The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Henry L. Owen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sven Krasser, Henry L. Owen, Joachim Sokol, Hans-Peter Huth, Jochen Grimminger
    Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:131-136 [Conf]
  2. Julian B. Grizzard, John G. Levine, Henry L. Owen
    Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:369-384 [Conf]
  3. David A. Barlow, Vasos Vassiliou, Henry L. Owen
    A Cryptographic Protocol to Protect MPLS Labels. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:237-242 [Conf]
  4. John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver
    The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:92-99 [Conf]
  5. Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen
    Wireless Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:68-75 [Conf]
  6. Dennis J. Pai, Henry L. Owen
    An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks. [Citation Graph (0, 0)][DBLP]
    ICC (1), 1997, pp:261-266 [Conf]
  7. Jong-Il Park, Stephen B. Wicker, Henry L. Owen
    Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio. [Citation Graph (0, 0)][DBLP]
    ICC (3), 1997, pp:1503-1507 [Conf]
  8. Peter E. Sholander, Chris Autry, Henry L. Owen
    Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors. [Citation Graph (0, 0)][DBLP]
    ICC (3), 1997, pp:1587-1591 [Conf]
  9. Myung Choi, Henry L. Owen, Joachim Sokol
    Packet-Size Based Queuing Algorithm for QoS Support. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2001, pp:137-147 [Conf]
  10. Hayriye Altunbasak, Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol
    Securing Layer 2 in Local Area Networks. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:699-706 [Conf]
  11. Weilai Yang, Henry L. Owen, Douglas M. Blough
    Determining Differentiated Services Network Pricing Through Auctions. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2005, pp:802-809 [Conf]
  12. John Spillane, Henry L. Owen
    Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate. [Citation Graph (0, 0)][DBLP]
    IPPS/SPDP Workshops, 1998, pp:37-42 [Conf]
  13. Nicholas Athanasiades, Randal Abler, John G. Levine, Henry L. Owen, George F. Riley
    Intrusion Detection Testing and Benchmarking Methodologies. [Citation Graph (0, 0)][DBLP]
    IWIA, 2003, pp:63-72 [Conf]
  14. John G. Levine, Julian B. Grizzard, Henry L. Owen
    A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:107-128 [Conf]
  15. Hayriye Altunbasak, Sven Krasser, Henry L. Owen, Joachim Sokol, Jochen Grimminger, Hans-Peter Huth
    Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:417-418 [Conf]
  16. Bob Johnston, Henry L. Owen
    SDH Digital Cross-Connect Traffic Generation Algorithm. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1999, pp:84-91 [Conf]
  17. Henry L. Owen
    VLSI Architecture for Switch-Level Simulation. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1993, pp:44-49 [Conf]
  18. Henry L. Owen
    Synchronous Digital Hierarchy Network Modeling. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1994, pp:229-233 [Conf]
  19. Peter E. Sholander, Henry L. Owen
    Simulation Model for Analysis of Synchronous Digital Hierarchy Network Payload Jitter. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 1995, pp:275-279 [Conf]
  20. Julian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson
    Towards an Approach for Automatically Repairing Compromised Network Systems. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:389-392 [Conf]
  21. Seong-Ho Jeong, Myung Choi, Randal Abler, Henry L. Owen, John A. Copeland, Joachim Sokol
    QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2000, pp:458-469 [Conf]
  22. David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen
    HoneyStat: Local Worm Detection Using Honeypots. [Citation Graph (0, 0)][DBLP]
    RAID, 2004, pp:39-58 [Conf]
  23. Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen
    Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:10- [Conf]
  24. David A. Barlow, Henry L. Owen, Vasos Vassiliou, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol
    Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2. [Citation Graph (0, 0)][DBLP]
    Communications, Internet, and Information Technology, 2002, pp:136-141 [Conf]
  25. Gregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee
    Countering Security Information Overload through Alert and Packet Visualization. [Citation Graph (0, 0)][DBLP]
    IEEE Computer Graphics and Applications, 2006, v:26, n:2, pp:60-70 [Journal]
  26. Henry L. Owen, Thomas M. Klett
    Synchronous Digital Hierarchy Network Pointer Simulation. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1994, v:26, n:5, pp:481-491 [Journal]
  27. Peter E. Sholander, Henry L. Owen
    The impact of mapping wander on the performance of SDH AU-4 and TU-3 uniform pointer processors. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:5, pp:457-473 [Journal]
  28. Seong-Ho Jeong, Henry L. Owen, John A. Copeland, Joachim Sokol
    QoS support for UDP/TCP based networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2001, v:24, n:1, pp:64-77 [Journal]
  29. Henry L. Owen
    Ring-based bandwidth dimensioning in SDH networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:2, pp:102-112 [Journal]
  30. Henry L. Owen, Thomas M. Klett
    Synchronous Digital Hierarchy statistical simulation of pointer activity. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1993, v:16, n:12, pp:759-766 [Journal]
  31. John G. Levine, Julian B. Grizzard, Henry L. Owen
    Using Honeynets to Protect Large Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:73-75 [Journal]
  32. John G. Levine, Julian B. Grizzard, Henry L. Owen
    Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:24-32 [Journal]
  33. Özgür Gürbüz, Henry L. Owen
    Dynamic resource scheduling (DRS): a multimedia QoS framework for W-CDMA. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2004, v:4, n:5, pp:529-546 [Journal]
  34. Özgür Gürbüz, Henry L. Owen
    Power Control Based QoS Provisioning for Multimedia in W-CDMA. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2002, v:8, n:1, pp:37-47 [Journal]

  35. A pricing approach for bandwidth allocation in differentiated service networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002