Doug Jacobson
Title
Cited by
Cited by
Year
Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections
DW Jacobson, JA Davis
US Patent 6,044,402, 2000
1782000
Network security bridge and associated method
DW Jacobson
US Patent 5,548,649, 1996
931996
Security and performance analysis of a secure clustering protocol for sensor networks
P Banerjee, D Jacobson, SN Lahiri
Sixth IEEE International Symposium on Network Computing and Applications …, 2007
882007
Detecting fraudulent use of cloud resources
J Idziorek, M Tannian, D Jacobson
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 61-72, 2011
642011
IT-adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics
JA Rursch, A Luse, D Jacobson
IEEE Transactions on Education 53 (1), 71-79, 2009
522009
Attribution of fraudulent resource consumption in the cloud
J Idziorek, M Tannian, D Jacobson
2012 IEEE fifth international conference on cloud computing, 99-106, 2012
512012
The insecurity of cloud utility models
J Idziorek, MF Tannian, D Jacobson
IT Professional 15 (2), 22-27, 2012
512012
Ten myths of cooperative learning in engineering education
D Jacobson, J Davis, B Licklider
FIE'98. 28th Annual Frontiers in Education Conference. Moving from'Teacher …, 1998
331998
Cyber security for airports
K Gopalakrishnan, M Govindarasu, DW Jacobson, BM Phares
International Journal for Traffic and Transport Engineering 3 (4), 365-376, 2013
302013
Paterno: By the book
J Paterno, B Asbell
Berkley, 1991
301991
Cyber security training a survey of serious games in cyber security
JN Tioh, M Mina, DW Jacobson
2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017
242017
Utilizing structural equation modeling and social cognitive career theory to identify factors in choice of IT as a major
A Luse, JA Rursch, D Jacobson
ACM Transactions on Computing Education (TOCE) 14 (3), 1-19, 2014
242014
Computer security literacy: staying safe in a digital world
D Jacobson, J Idziorek
CRC Press, 2016
192016
Bounding delay on a multifarious token ring network
SS Gaitonde, D Jacobson, AV Pohm
Communications of the ACM 33 (1), 20-28, 1990
161990
A master/slave monitor measurement technique for an operating ethernet network
D Jacobson, S Gaitonde, J Kim, J Lee, D Rover, M Sarwar, M Shafiq
IEEE Network 1 (3), 40-48, 1987
161987
Introduction to network security
D Jacobson
CRC Press, 2008
152008
Cyber defense competition
D Jacobson, N Evans
ASEE Annual Conference & Exposition: Excellence in Education, 2006
122006
A case study of authenticated and secure file transfer: the Iowa Campaign Finance Reporting System (ICFRS)
NE Hastings, JM Whitmer, JA Davis, DW Jacobson
1997 IEEE International Performance, Computing and Communications Conference …, 1997
121997
Engaging millenials with information technology: A case study using high school cyber defense competitions
D Jacobson, JA Rursch
12th Colloquium for Information Systems Security Education, 2008
112008
A distributed measurement technique for an operating ethernet network
DW Jacobson
Proceedings of the 15th annual conference on Computer Science, 458, 1987
101987
The system can't perform the operation now. Try again later.
Articles 1–20