Year |
Citation |
Score |
2019 |
Sturton C, Hicks M, King ST, Smith JM. FinalFilter: Asserting Security Properties of a Processor at Runtime Ieee Micro. 39: 35-42. DOI: 10.1109/Mm.2019.2921509 |
0.362 |
|
2015 |
Dhawan U, Hriţcu C, Rubin R, Vasilakis N, Chiricescu S, Smith JM, Knight TF, Pierce BC, DeHon A. Architectural support for software-defined metadata processing International Conference On Architectural Support For Programming Languages and Operating Systems - Asplos. 2015: 487-502. DOI: 10.1145/694344.2694383 |
0.603 |
|
2015 |
Sonchack J, Aviv AJ, Keller E, Smith JM. OFX: Enabling OpenFlow extensions for switch-level security applications Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1678-1680. DOI: 10.1145/2810103.2810120 |
0.741 |
|
2015 |
Kwon A, Zhang K, Lim PL, Pan Y, Smith JM, Dehon A. RotoRouter: Router support for endpoint-authorized decentralized traffic filtering to prevent DoS attacks Proceedings of the 2014 International Conference On Field-Programmable Technology, Fpt 2014. 183-190. DOI: 10.1109/FPT.2014.7082774 |
0.589 |
|
2015 |
Sonchack J, Aviv AJ, Smith JM. Cross-domain collaboration for improved IDS rule set selection Journal of Information Security and Applications. 24: 25-40. DOI: 10.1016/j.jisa.2015.10.001 |
0.693 |
|
2014 |
Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013 |
0.772 |
|
2013 |
Kwon A, Dhawan U, Smith JM, Knight TF, DeHon A. Low-fat pointers: Compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security Proceedings of the Acm Conference On Computer and Communications Security. 721-732. DOI: 10.1145/2508859.2516713 |
0.623 |
|
2013 |
Chiricescu S, Dehon A, Demange D, Iyer S, Kliger A, Morrisett G, Pierce BC, Reubenstein H, Smith JM, Sullivan GT, Thomas A, Tov J, White CM, Wittenberg D. SAFE: A clean-slate architecture for secure systems 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 570-576. DOI: 10.1109/THS.2013.6699066 |
0.673 |
|
2012 |
Aviv AJ, Sapp B, Blaze M, Smith JM. Practicality of accelerometer side channels on smartphones Acm International Conference Proceeding Series. 41-50. DOI: 10.1145/2420950.2420957 |
0.709 |
|
2012 |
Arye M, Kiefer R, Super K, Nordström E, Freedman MJ, Keller E, Rondeau T, Smith JM. Increasing network resilience through edge diversity in NEBULA Mobile Computing and Communications Review. 16: 14-20. DOI: 10.1145/2412096.2412099 |
0.433 |
|
2012 |
Mao Y, Loo BT, Ives Z, Smith JM. MOSAIC: Declarative platform for dynamic overlay composition Computer Networks. 56: 64-84. DOI: 10.1016/J.Comnet.2011.08.006 |
0.44 |
|
2012 |
Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11 |
0.765 |
|
2010 |
Reed J, Aviv AJ, Wagner D, Haeberlen A, Pierce BC, Smith JM. Differential privacy for collaborative security Proceedings of the 3rd European Workshop On System Security, Eurosec'10. 1-7. DOI: 10.1145/1752046.1752047 |
0.755 |
|
2010 |
Mao Y, Wang F, Qiu L, Lam S, Smith J. S4: Small state and small stretch compact routing protocol for large static wireless networks Ieee/Acm Transactions On Networking. 18: 761-774. DOI: 10.1109/Tnet.2010.2046645 |
0.377 |
|
2009 |
West AG, Aviv AJ, Chang J, Prabhu VS, Blaze M, Kannan S, Lee I, Smith JM, Sokolsky O. QuanTM: A Quantitative Trust Management system Proceedings of the 2nd European Workshop On System Security, Eurosec'09. 28-35. DOI: 10.1145/1519144.1519149 |
0.727 |
|
2009 |
Alexander S, Cheng YH, Coan B, Ghetie A, Kaul V, Siegell B, Bellovin S, Maxemchuk NF, Schulzrinne H, Schwab S, Stavrou A, Smith JM. The dynamic community of interest and its realization in ZODIAC Ieee Communications Magazine. 47: 40-47. DOI: 10.1109/Mcom.2009.5273807 |
0.475 |
|
2009 |
Blaze M, Kannan S, Lee I, Sokolsky O, Smith JM, Keromytis AD, Lee W. Dynamic trust management Computer. 42: 44-52. DOI: 10.1109/Mc.2009.51 |
0.584 |
|
2009 |
Anderson P, Gunter C, Kalmanek C, Narain S, Smith J, Talpade R, Xie G. Network infrastructure configuration Ieee Journal On Selected Areas in Communications. 27: 249-252. DOI: 10.1109/Jsac.2009.090401 |
0.379 |
|
2008 |
Mao Y, Loo BT, Ives Z, Smith JM. MOSAIC: Unified declarative platform for dynamic overlay composition Proceedings of 2008 Acm Conext Conference - 4th International Conference On Emerging Networking Experiments and Technologies, Conext '08. DOI: 10.1145/1544012.1544017 |
0.317 |
|
2008 |
Miltchev S, Smith JM, Prevelakis V, Keromytis A, Ioannidis S. Decentralized access control in distributed file systems Acm Computing Surveys. 40. DOI: 10.1145/1380584.1380588 |
0.675 |
|
2007 |
Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Anagnostakis K, Smith JM. Virtual private services: Coordinated policy enforcement for distributed applications International Journal of Network Security. 4: 69-80. DOI: 10.6633/Ijns.200701.4(1).08 |
0.711 |
|
2007 |
Mao Y, Ives Z, Loo BT, Smith JM. The case for a unified extensible data-centric mobility infrastructure Proceedings of Acm Sigcomm 2007 Workshops - 2nd Acm International Workshop On Mobility in the Evolving Internet Architecture, Mobiarch'07. DOI: 10.1145/1366919.1366934 |
0.343 |
|
2007 |
Keromytis AD, Smith JM. Requirements for scalable access control and security management architectures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1239971.1239972 |
0.654 |
|
2006 |
Mao Y, Saul LK, Smith JM. IDES: An internet distance estimation service for large networks Ieee Journal On Selected Areas in Communications. 24: 2273-2283. DOI: 10.1109/Jsac.2006.884026 |
0.4 |
|
2006 |
Anagnostakis KG, Greenwald MB, Ioannidis S, Li D, Smith JM. Flexible network monitoring with FLAME Computer Networks. 50: 2548-2563. DOI: 10.1016/J.Comnet.2006.04.018 |
0.652 |
|
2006 |
Smith JM. Cognitive Techniques: Network Awareness Cognitive Radio Technology. 299-311. DOI: 10.1016/B978-075067952-7/50010-6 |
0.318 |
|
2005 |
Mao Y, Knutsson B, Lu H, Smith JM. DHARMA: Distributed home agent for robust mobile access Proceedings - Ieee Infocom. 2: 1196-1206. DOI: 10.1109/INFCOM.2005.1498346 |
0.306 |
|
2005 |
Muir S, Smith J. An operating system architecture for network processors 2005 Symposium On Architectures For Networking and Communications Systems, Ancs 2005. 61-70. DOI: 10.1109/ANCS.2005.4675266 |
0.304 |
|
2004 |
Takahashi N, Smith JM. Hybrid hierarchical overlay routing (Hyho): Towards minimal overlay dilation Ieice Transactions On Information and Systems. 2586-2593. |
0.326 |
|
2003 |
Hadžić I, Smith JM. Balancing performance and flexibility with hardware support for network architectures Acm Transactions On Computer Systems. 21: 375-411. DOI: 10.1145/945506.945508 |
0.457 |
|
2003 |
Ioannidis S, Bellovin SM, Ioannidis J, Keromytis AD, Smith JM. Design and implementation of virtual private services Proceedings of the Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises, Wetice. 2003: 269-274. DOI: 10.1109/ENABL.2003.1231419 |
0.704 |
|
2003 |
Keromytis AD, Ioannidis S, Greenwald MB, Smith JM. The STRONGMAN architecture Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 178-188. DOI: 10.1109/DISCEX.2003.1194883 |
0.639 |
|
2003 |
Hicks M, Keromytis AD, Smith JM. A secure PLAN Ieee Transactions On Systems, Man and Cybernetics Part C: Applications and Reviews. 33: 413-426. DOI: 10.1007/978-3-540-48507-0_28 |
0.647 |
|
2002 |
Ioannidis S, Bellovin SM, Smith JM. Sub-operating systems: A new approach to application security Proceedings of the 10th Workshop On Acm Sigops European Workshop, Ew 10. 108-115. DOI: 10.1145/1133373.1133394 |
0.529 |
|
2002 |
Hicks M, Keromytis AD, Smith JM. A secure PLAN (extended version) Proceedings - Darpa Active Networks Conference and Exposition, Dance 2002. 224-237. DOI: 10.1109/DANCE.2002.1003496 |
0.647 |
|
2002 |
Anagnostakis KG, Ioannidis S, Miltchev S, Greenwald M, Smith JM, Ioannidis J. Efficient packet monitoring for network management Ieee Symposium Record On Network Operations and Management Symposium. 423-436. |
0.636 |
|
2001 |
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM. The price of safety in an active network Journal of Communications and Networks. 3: 4-18. DOI: 10.1109/Jcn.2001.6596875 |
0.67 |
|
2001 |
Anagnostakis KG, Ioannidis S, Miltchev S, Smith JM. Practical network applications on a lightweight active management environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2207: 101-115. DOI: 10.1007/3-540-45451-9_7 |
0.642 |
|
2000 |
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM. Secure quality of service handling: SQoSH Ieee Communications Magazine. 38: 106-112. DOI: 10.1109/35.833566 |
0.676 |
|
2000 |
Anagnostakis KG, Hicks MW, Ioannidis S, Keromytis AD, Smith JM. Scalable resource control in active networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 343-357. DOI: 10.1007/3-540-40057-5_25 |
0.711 |
|
2000 |
Galis A, Plattner B, Smith JM, Denazis S, Moeller E, Guo H, Klein C, Serrat J, Laarhuis J, Karetsos GT, Todd C. A flexible IP active networks architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1942: 1-15. DOI: 10.1007/3-540-40057-5_1 |
0.45 |
|
2000 |
Ioannidis S, Keromytis AD, Bellovin SM, Smith JM. Implementing a distributed firewall Proceedings of the Acm Conference On Computer and Communications Security. 190-199. |
0.631 |
|
1999 |
Smith JM, Calvert KL, Murphy SL, Orman HK, Peterson LL. Activating networks: A progress report Computer. 32. DOI: 10.1109/2.755003 |
0.425 |
|
1999 |
Smith JM. Selected challenges in computer networking Computer. 32: 40-42. DOI: 10.1109/2.738302 |
0.394 |
|
1999 |
Alexander DS, Smith JM. The architecture of ALIEN Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1653: 1-13. DOI: 10.1007/978-3-540-48507-0_1 |
0.396 |
|
1998 |
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. A secure active network environment architecture: Realization in SwitchWare Ieee Network. 12: 37-45. DOI: 10.1109/65.690960 |
0.658 |
|
1998 |
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM. The switchware active network architecture Ieee Network. 12: 29-36. DOI: 10.1109/65.690959 |
0.662 |
|
1998 |
Feldmeier DC, McAuley AJ, Smith JM, Bakin DS, Marcus WS, Raleigh TM. Protocol boosters Ieee Journal On Selected Areas in Communications. 16: 437-444. DOI: 10.1109/49.669053 |
0.364 |
|
1998 |
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM. Safety and security of programmable network infrastructures Ieee Communications Magazine. 36: 84-92. DOI: 10.1109/35.722141 |
0.664 |
|
1998 |
Marcus WS, Hadzic I, McAuley AJ, Smith JM. Protocol boosters: Applying programmability to network infrastructures Ieee Communications Magazine. 36: 79-83. DOI: 10.1109/35.722140 |
0.467 |
|
1998 |
Arbaugh WA, Davin JR, Farber DJ, Smith JM. Security for virtual private intranets Computer. 31: 48-55. DOI: 10.1109/2.708450 |
0.453 |
|
1998 |
Hadzic I, Smith JM, Marcus WS. On-the-fly programmable hardware for networks Conference Record / Ieee Global Telecommunications Conference. 2: 821-826. |
0.3 |
|
1997 |
Tennenhouse DL, Smith JM, Sincoskie WD, Wetherall DJ, Minden GJ. A survey of active network research Ieee Communications Magazine. 35: 80-86. DOI: 10.1109/35.568214 |
0.432 |
|
1997 |
Hadžić I, Smith JM. P4: A platform for FPGA implementation of protocol boosters Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1304: 438-447. DOI: 10.1007/3-540-63465-7_249 |
0.312 |
|
1996 |
Nahrstedt K, Smith JM. Design, implementation, and experiences of the OMEGA end-point architecture Ieee Journal On Selected Areas in Communications. 14: 1263-1279. DOI: 10.1109/49.536367 |
0.625 |
|
1995 |
Nahrstedt K, Smith JM. The QOS Broker Ieee Multimedia. 2: 53-67. DOI: 10.1109/93.368603 |
0.526 |
|
1995 |
Traw CBS, Smith JM. Striping within the network subsystem Ieee Network. 9: 22-32. DOI: 10.1109/65.397041 |
0.407 |
|
1993 |
Smith JM, Traw CBS. Giving applications access to Gb/s networking Ieee Network. 7: 44-52. DOI: 10.1109/65.224055 |
0.454 |
|
1993 |
Brendan C, Traw S, Smith JM. Hardware/Software Organization of a High-Performance ATM Host Interface Ieee Journal On Selected Areas in Communications. 11: 240-253. DOI: 10.1109/49.215019 |
0.405 |
|
1993 |
Clark DD, Davie BS, Farber DJ, Gopal IS, Kadaba BK, David Sincoskie W, Smith JM, Tennenhouse DL. The AURORA gigabit testbed Computer Networks and Isdn Systems. 25: 599-621. DOI: 10.1016/0169-7552(93)90056-A |
0.395 |
|
1992 |
Clark DD, Davie BS, Farber DJ, Gopal IS, Kadaba BK, Sincoskie WD, Smith JM, Tennenhouse DL. An overview of the AURORA gigabit testbed Proceedings - Ieee Infocom. 2: 569-581. |
0.301 |
|
1991 |
Delp GS, Farber DJ, Minnich RG, Smith JM, Tam MC. Memory As A Network Abstraction Ieee Network. 5: 34-41. DOI: 10.1109/65.93183 |
0.317 |
|
1991 |
Smith JM, Farber DJ. Traffic characteristics of a distributed memory system Computer Networks and Isdn Systems. 22: 143-154. DOI: 10.1016/0169-7552(91)90006-X |
0.328 |
|
1990 |
Tam MC, Smith JM, Farber DJ. Taxonomy-based comparison of several distributed shared memory systems Operating Systems Review (Acm). 24: 40-67. DOI: 10.1145/382244.382831 |
0.327 |
|
1989 |
Smith JM, Maguire GQ. Measured response times for page-sized fetches on a network Acm Sigarch Computer Architecture News. 17: 48-54. DOI: 10.1145/71302.71308 |
0.378 |
|
Show low-probability matches. |