Follow
Doug Jacobson
Title
Cited by
Cited by
Year
Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections
DW Jacobson, JA Davis
US Patent 6,044,402, 2000
1802000
Network security bridge and associated method
DW Jacobson
US Patent 5,548,649, 1996
931996
Security and performance analysis of a secure clustering protocol for sensor networks
P Banerjee, D Jacobson, SN Lahiri
Sixth IEEE International Symposium on Network Computing and Applications …, 2007
852007
Detecting fraudulent use of cloud resources
J Idziorek, M Tannian, D Jacobson
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 61-72, 2011
702011
IT-adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics
JA Rursch, A Luse, D Jacobson
IEEE Transactions on Education 53 (1), 71-79, 2009
692009
Attribution of fraudulent resource consumption in the cloud
J Idziorek, M Tannian, D Jacobson
2012 IEEE fifth international conference on cloud computing, 99-106, 2012
682012
Cyber security training a survey of serious games in cyber security
JN Tioh, M Mina, DW Jacobson
2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017
632017
The insecurity of cloud utility models
J Idziorek, MF Tannian, D Jacobson
IT Professional 15 (2), 22-27, 2012
572012
Cyber security for airports
K Gopalakrishnan, M Govindarasu, DW Jacobson, BM Phares
International Journal for Traffic and Transport Engineering 3 (4), 365-376, 2013
492013
Utilizing structural equation modeling and social cognitive career theory to identify factors in choice of IT as a major
A Luse, JA Rursch, D Jacobson
ACM Transactions on Computing Education (TOCE) 14 (3), 1-19, 2014
422014
Ten myths of cooperative learning in engineering education
D Jacobson, J Davis, B Licklider
FIE'98. 28th Annual Frontiers in Education Conference. Moving from'Teacher …, 1998
371998
Computer security literacy: staying safe in a digital world
D Jacobson, J Idziorek
CRC Press, 2016
242016
Bounding delay on a multifarious token ring network
SS Gaitonde, D Jacobson, AV Pohm
Communications of the ACM 33 (1), 20-28, 1990
211990
Introduction to network security
D Jacobson
Chapman and Hall/CRC, 2008
202008
ARA: A wireless living lab vision for smart and connected rural communities
H Zhang, Y Guan, A Kamal, D Qiao, M Zheng, A Arora, O Boyraz, B Cox, ...
Proceedings of the 15th ACM Workshop on Wireless Network Testbeds …, 2022
172022
When a testbed does more than testing: The Internet-Scale Event Attack and Generation Environment (ISEAGE)-providing learning and synthesizing experiences for cyber security …
JA Rursch, D Jacobson
2013 IEEE Frontiers in Education Conference (FIE), 1267-1272, 2013
172013
A master/slave monitor measurement technique for an operating ethernet network
D Jacobson, S Gaitonde, J Kim, J Lee, D Rover, M Sarwar, M Shafiq
IEEE Network 1 (3), 40-48, 1987
161987
Cyber defense competition
D Jacobson, N Evans
2006 Annual Conference & Exposition, 11.386. 1-11.386. 18, 2006
122006
A case study of authenticated and secure file transfer: the Iowa Campaign Finance Reporting System (ICFRS)
NE Hastings, JM Whitmer, JA Davis, DW Jacobson
1997 IEEE International Performance, Computing and Communications Conference …, 1997
121997
Engaging millenials with information technology: A case study using high school cyber defense competitions
D Jacobson, JA Rursch
12th Colloquium for Information Systems Security Education, 2008
112008
The system can't perform the operation now. Try again later.
Articles 1–20