Jonathan M. Smith

Affiliations: 
Computer and Information Science University of Pennsylvania, Philadelphia, PA, United States 
Area:
Networks: Networked Systems; Security and Privacy
Google:
"Jonathan Smith"

Children

Sign in to add trainee
Angelos D. Keromytis grad student 2001 Penn
Stephen J. Muir grad student 2001 Penn
Sotiris Ioannidis grad student 2005 Penn
Adam J. Aviv grad student 2012 Penn
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Dhawan U, Hriţcu C, Rubin R, et al. (2015) Architectural support for software-defined metadata processing International Conference On Architectural Support For Programming Languages and Operating Systems - Asplos. 2015: 487-502
Sonchack J, Aviv AJ, Keller E, et al. (2015) OFX: Enabling OpenFlow extensions for switch-level security applications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1678-1680
Valiron B, Ross NJ, Selinger P, et al. (2015) Programming the quantum future Communications of the Acm. 58: 52-61
Hicks M, Sturton C, King ST, et al. (2015) SPECS: A lightweight runtime mechanism for protecting software from security-critical processor bugs International Conference On Architectural Support For Programming Languages and Operating Systems - Asplos. 2015: 517-529
Kwon A, Zhang K, Lim PL, et al. (2015) RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks Proceedings of the 2014 International Conference On Field-Programmable Technology, Fpt 2014. 183-190
Gibson KL, Smith JM. (2015) The emperor's new masks: On demographic differences and disguises Ieee Computer Society Conference On Computer Vision and Pattern Recognition Workshops. 2015: 57-64
Sonchack J, Aviv AJ, Smith JM. (2015) Cross-domain collaboration for improved IDS rule set selection Journal of Information Security and Applications. 24: 25-40
Clark S, Blaze M, Smith JM. (2015) Smearing fingerprints: Changing the game of web tracking with composite privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 178-182
Clark S, Collis M, Blaze M, et al. (2014) Moving targets: Security and rapid-release in Firefox Proceedings of the Acm Conference On Computer and Communications Security. 1256-1266
Anderson T, Birman K, Broberg R, et al. (2014) A brief overview of the NEBULA future internet architecture Computer Communication Review. 44: 81-86
See more...