Jonathan M. Smith - Publications

Affiliations: 
Computer and Information Science University of Pennsylvania, Philadelphia, PA, United States 
Area:
Networks: Networked Systems; Security and Privacy

65 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Sturton C, Hicks M, King ST, Smith JM. FinalFilter: Asserting Security Properties of a Processor at Runtime Ieee Micro. 39: 35-42. DOI: 10.1109/Mm.2019.2921509  0.362
2015 Dhawan U, Hriţcu C, Rubin R, Vasilakis N, Chiricescu S, Smith JM, Knight TF, Pierce BC, DeHon A. Architectural support for software-defined metadata processing International Conference On Architectural Support For Programming Languages and Operating Systems - Asplos. 2015: 487-502. DOI: 10.1145/694344.2694383  0.603
2015 Sonchack J, Aviv AJ, Keller E, Smith JM. OFX: Enabling OpenFlow extensions for switch-level security applications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1678-1680. DOI: 10.1145/2810103.2810120  0.741
2015 Kwon A, Zhang K, Lim PL, Pan Y, Smith JM, Dehon A. RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks Proceedings of the 2014 International Conference On Field-Programmable Technology, Fpt 2014. 183-190. DOI: 10.1109/FPT.2014.7082774  0.589
2015 Sonchack J, Aviv AJ, Smith JM. Cross-domain collaboration for improved IDS rule set selection Journal of Information Security and Applications. 24: 25-40. DOI: 10.1016/j.jisa.2015.10.001  0.693
2014 Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013  0.772
2013 Kwon A, Dhawan U, Smith JM, Knight TF, DeHon A. Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security Proceedings of the Acm Conference On Computer and Communications Security. 721-732. DOI: 10.1145/2508859.2516713  0.623
2013 Chiricescu S, Dehon A, Demange D, Iyer S, Kliger A, Morrisett G, Pierce BC, Reubenstein H, Smith JM, Sullivan GT, Thomas A, Tov J, White CM, Wittenberg D. SAFE: A clean-slate architecture for secure systems 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 570-576. DOI: 10.1109/THS.2013.6699066  0.673
2012 Aviv AJ, Sapp B, Blaze M, Smith JM. Practicality of accelerometer side channels on smartphones Acm International Conference Proceeding Series. 41-50. DOI: 10.1145/2420950.2420957  0.709
2012 Arye M, Kiefer R, Super K, Nordström E, Freedman MJ, Keller E, Rondeau T, Smith JM. Increasing network resilience through edge diversity in NEBULA Mobile Computing and Communications Review. 16: 14-20. DOI: 10.1145/2412096.2412099  0.433
2012 Mao Y, Loo BT, Ives Z, Smith JM. MOSAIC: Declarative platform for dynamic overlay composition Computer Networks. 56: 64-84. DOI: 10.1016/J.Comnet.2011.08.006  0.44
2012 Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11  0.765
2010 Reed J, Aviv AJ, Wagner D, Haeberlen A, Pierce BC, Smith JM. Differential privacy for collaborative security Proceedings of the 3rd European Workshop On System Security, Eurosec'10. 1-7. DOI: 10.1145/1752046.1752047  0.755
2010 Mao Y, Wang F, Qiu L, Lam S, Smith J. S4: Small state and small stretch compact routing protocol for large static wireless networks Ieee/Acm Transactions On Networking. 18: 761-774. DOI: 10.1109/Tnet.2010.2046645  0.377
2009 West AG, Aviv AJ, Chang J, Prabhu VS, Blaze M, Kannan S, Lee I, Smith JM, Sokolsky O. QuanTM: A Quantitative Trust Management system Proceedings of the 2nd European Workshop On System Security, Eurosec'09. 28-35. DOI: 10.1145/1519144.1519149  0.727
2009 Alexander S, Cheng YH, Coan B, Ghetie A, Kaul V, Siegell B, Bellovin S, Maxemchuk NF, Schulzrinne H, Schwab S, Stavrou A, Smith JM. The dynamic community of interest and its realization in ZODIAC Ieee Communications Magazine. 47: 40-47. DOI: 10.1109/Mcom.2009.5273807  0.475
2009 Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51  0.584
2009 Anderson P, Gunter C, Kalmanek C, Narain S, Smith J, Talpade R, Xie G. Network infrastructure configuration Ieee Journal On Selected Areas in Communications. 27: 249-252. DOI: 10.1109/Jsac.2009.090401  0.379
2008 Mao Y, Loo BT, Ives Z, Smith JM. MOSAIC: Unified declarative platform for dynamic overlay composition Proceedings of 2008 Acm Conext Conference - 4th International Conference On Emerging Networking Experiments and Technologies, Conext '08. DOI: 10.1145/1544012.1544017  0.317
2008 Miltchev S, Smith JM, Prevelakis V, Keromytis A, Ioannidis S. Decentralized access control in distributed file systems Acm Computing Surveys. 40. DOI: 10.1145/1380584.1380588  0.675
2007 Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08  0.711
2007 Mao Y, Ives Z, Loo BT, Smith JM. The case for a unified extensible data-centric mobility infrastructure Proceedings of Acm Sigcomm 2007 Workshops - 2nd Acm International Workshop On Mobility in the Evolving Internet Architecture, Mobiarch'07. DOI: 10.1145/1366919.1366934  0.343
2007 Keromytis AD, Smith JM. Requirements for scalable access control and security management architectures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1239971.1239972  0.654
2006 Mao Y, Saul LK, Smith JM. IDES: An internet distance estimation service for large networks Ieee Journal On Selected Areas in Communications. 24: 2273-2283. DOI: 10.1109/Jsac.2006.884026  0.4
2006 Anagnostakis KG, Greenwald MB, Ioannidis S, Li D, Smith JM. Flexible network monitoring with FLAME Computer Networks. 50: 2548-2563. DOI: 10.1016/J.Comnet.2006.04.018  0.652
2006 Smith JM. Cognitive Techniques: Network Awareness Cognitive Radio Technology. 299-311. DOI: 10.1016/B978-075067952-7/50010-6  0.318
2005 Mao Y, Knutsson B, Lu H, Smith JM. DHARMA: Distributed home agent for robust mobile access Proceedings - Ieee Infocom. 2: 1196-1206. DOI: 10.1109/INFCOM.2005.1498346  0.306
2005 Muir S, Smith J. An operating system architecture for network processors 2005 Symposium On Architectures For Networking and Communications Systems, Ancs 2005. 61-70. DOI: 10.1109/ANCS.2005.4675266  0.304
2004 Takahashi N, Smith JM. Hybrid hierarchical overlay routing (Hyho): Towards minimal overlay dilation Ieice Transactions On Information and Systems. 2586-2593.  0.326
2003 Hadžić I, Smith JM. Balancing performance and flexibility with hardware support for network architectures Acm Transactions On Computer Systems. 21: 375-411. DOI: 10.1145/945506.945508  0.457
2003 Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Smith JM. Design and implementation of virtual private services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 269-274. DOI: 10.1109/ENABL.2003.1231419  0.704
2003 Keromytis AD, Ioannidis S, Greenwald MB, Smith JM. The STRONGMAN architecture Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 178-188. DOI: 10.1109/DISCEX.2003.1194883  0.639
2003 Hicks M, Keromytis AD, Smith JM. A secure PLAN Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 33: 413-426. DOI: 10.1007/978-3-540-48507-0_28  0.647
2002 Ioannidis S, Bellovin SM, Smith JM. Sub-operating systems: A new approach to application security Proceedings of the 10th Workshop On Acm Sigops European Workshop, Ew 10. 108-115. DOI: 10.1145/1133373.1133394  0.529
2002 Hicks M, Keromytis AD, Smith JM. A secure PLAN (extended version) Proceedings - Darpa Active Networks Conference and Exposition, Dance 2002. 224-237. DOI: 10.1109/DANCE.2002.1003496  0.647
2002 Anagnostakis KG, Ioannidis S, Miltchev S, Greenwald M, Smith JM, Ioannidis J. Efficient packet monitoring for network management Ieee Symposium Record On Network Operations and Management Symposium. 423-436.  0.636
2001 Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM. The price of safety in an active network Journal of Communications and Networks. 3: 4-18. DOI: 10.1109/Jcn.2001.6596875  0.67
2001 Anagnostakis KG, Ioannidis S, Miltchev S, Smith JM. Practical network applications on a lightweight active management environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2207: 101-115. DOI: 10.1007/3-540-45451-9_7  0.642
2000 Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM. Secure quality of service handling: SQoSH Ieee Communications Magazine. 38: 106-112. DOI: 10.1109/35.833566  0.676
2000 Anagnostakis KG, Hicks MW, Ioannidis S, Keromytis AD, Smith JM. Scalable resource control in active networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 343-357. DOI: 10.1007/3-540-40057-5_25  0.711
2000 Galis A, Plattner B, Smith JM, Denazis S, Moeller E, Guo H, Klein C, Serrat J, Laarhuis J, Karetsos GT, Todd C. A flexible IP active networks architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 1-15. DOI: 10.1007/3-540-40057-5_1  0.45
2000 Ioannidis S, Keromytis AD, Bellovin SM, Smith JM. Implementing a distributed firewall Proceedings of the Acm Conference On Computer and Communications Security. 190-199.  0.631
1999 Smith JM, Calvert KL, Murphy SL, Orman HK, Peterson LL. Activating networks: A progress report Computer. 32. DOI: 10.1109/2.755003  0.425
1999 Smith JM. Selected challenges in computer networking Computer. 32: 40-42. DOI: 10.1109/2.738302  0.394
1999 Alexander DS, Smith JM. The architecture of ALIEN Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1653: 1-13. DOI: 10.1007/978-3-540-48507-0_1  0.396
1998 Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. A secure active network environment architecture: Realization in SwitchWare Ieee Network. 12: 37-45. DOI: 10.1109/65.690960  0.658
1998 Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM. The switchware active network architecture Ieee Network. 12: 29-36. DOI: 10.1109/65.690959  0.662
1998 Feldmeier DC, McAuley AJ, Smith JM, Bakin DS, Marcus WS, Raleigh TM. Protocol boosters Ieee Journal On Selected Areas in Communications. 16: 437-444. DOI: 10.1109/49.669053  0.364
1998 Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. Safety and security of programmable network infrastructures Ieee Communications Magazine. 36: 84-92. DOI: 10.1109/35.722141  0.664
1998 Marcus WS, Hadzic I, McAuley AJ, Smith JM. Protocol boosters: Applying programmability to network infrastructures Ieee Communications Magazine. 36: 79-83. DOI: 10.1109/35.722140  0.467
1998 Arbaugh WA, Davin JR, Farber DJ, Smith JM. Security for virtual private intranets Computer. 31: 48-55. DOI: 10.1109/2.708450  0.453
1998 Hadzic I, Smith JM, Marcus WS. On-the-fly programmable hardware for networks Conference Record / Ieee Global Telecommunications Conference. 2: 821-826.  0.3
1997 Tennenhouse DL, Smith JM, Sincoskie WD, Wetherall DJ, Minden GJ. A survey of active network research Ieee Communications Magazine. 35: 80-86. DOI: 10.1109/35.568214  0.432
1997 Hadžić I, Smith JM. P4: A platform for FPGA implementation of protocol boosters Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1304: 438-447. DOI: 10.1007/3-540-63465-7_249  0.312
1996 Nahrstedt K, Smith JM. Design, implementation, and experiences of the OMEGA end-point architecture Ieee Journal On Selected Areas in Communications. 14: 1263-1279. DOI: 10.1109/49.536367  0.625
1995 Nahrstedt K, Smith JM. The QOS Broker Ieee Multimedia. 2: 53-67. DOI: 10.1109/93.368603  0.526
1995 Traw CBS, Smith JM. Striping within the network subsystem Ieee Network. 9: 22-32. DOI: 10.1109/65.397041  0.407
1993 Smith JM, Traw CBS. Giving applications access to Gb/s networking Ieee Network. 7: 44-52. DOI: 10.1109/65.224055  0.454
1993 Brendan C, Traw S, Smith JM. Hardware/Software Organization of a High-Performance ATM Host Interface Ieee Journal On Selected Areas in Communications. 11: 240-253. DOI: 10.1109/49.215019  0.405
1993 Clark DD, Davie BS, Farber DJ, Gopal IS, Kadaba BK, David Sincoskie W, Smith JM, Tennenhouse DL. The AURORA gigabit testbed Computer Networks and Isdn Systems. 25: 599-621. DOI: 10.1016/0169-7552(93)90056-A  0.395
1992 Clark DD, Davie BS, Farber DJ, Gopal IS, Kadaba BK, Sincoskie WD, Smith JM, Tennenhouse DL. An overview of the AURORA gigabit testbed Proceedings - Ieee Infocom. 2: 569-581.  0.301
1991 Delp GS, Farber DJ, Minnich RG, Smith JM, Tam MC. Memory As A Network Abstraction Ieee Network. 5: 34-41. DOI: 10.1109/65.93183  0.317
1991 Smith JM, Farber DJ. Traffic characteristics of a distributed memory system Computer Networks and Isdn Systems. 22: 143-154. DOI: 10.1016/0169-7552(91)90006-X  0.328
1990 Tam MC, Smith JM, Farber DJ. Taxonomy-based comparison of several distributed shared memory systems Operating Systems Review (Acm). 24: 40-67. DOI: 10.1145/382244.382831  0.327
1989 Smith JM, Maguire GQ. Measured response times for page-sized fetches on a network Acm Sigarch Computer Architecture News. 17: 48-54. DOI: 10.1145/71302.71308  0.378
Show low-probability matches.