Doug Jacobson
Cited by
Cited by
Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections
DW Jacobson, JA Davis
US Patent 6,044,402, 2000
Network security bridge and associated method
DW Jacobson
US Patent 5,548,649, 1996
Security and performance analysis of a secure clustering protocol for sensor networks
P Banerjee, D Jacobson, SN Lahiri
Sixth IEEE International Symposium on Network Computing and Applications …, 2007
Detecting fraudulent use of cloud resources
J Idziorek, M Tannian, D Jacobson
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 61-72, 2011
IT-adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics
JA Rursch, A Luse, D Jacobson
IEEE Transactions on Education 53 (1), 71-79, 2009
Attribution of fraudulent resource consumption in the cloud
J Idziorek, M Tannian, D Jacobson
2012 IEEE fifth international conference on cloud computing, 99-106, 2012
The insecurity of cloud utility models
J Idziorek, MF Tannian, D Jacobson
IT Professional 15 (2), 22-27, 2012
Ten myths of cooperative learning in engineering education
D Jacobson, J Davis, B Licklider
FIE'98. 28th Annual Frontiers in Education Conference. Moving from'Teacher …, 1998
Cyber security for airports
K Gopalakrishnan, M Govindarasu, DW Jacobson, BM Phares
International Journal for Traffic and Transport Engineering 3 (4), 365-376, 2013
Paterno: By the book
J Paterno, B Asbell
Berkley, 1991
Cyber security training a survey of serious games in cyber security
JN Tioh, M Mina, DW Jacobson
2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017
Utilizing structural equation modeling and social cognitive career theory to identify factors in choice of IT as a major
A Luse, JA Rursch, D Jacobson
ACM Transactions on Computing Education (TOCE) 14 (3), 1-19, 2014
Computer security literacy: staying safe in a digital world
D Jacobson, J Idziorek
CRC Press, 2016
Bounding delay on a multifarious token ring network
SS Gaitonde, D Jacobson, AV Pohm
Communications of the ACM 33 (1), 20-28, 1990
A master/slave monitor measurement technique for an operating ethernet network
D Jacobson, S Gaitonde, J Kim, J Lee, D Rover, M Sarwar, M Shafiq
IEEE Network 1 (3), 40-48, 1987
Introduction to network security
D Jacobson
CRC Press, 2008
Cyber defense competition
D Jacobson, N Evans
ASEE Annual Conference & Exposition: Excellence in Education, 2006
A case study of authenticated and secure file transfer: the Iowa Campaign Finance Reporting System (ICFRS)
NE Hastings, JM Whitmer, JA Davis, DW Jacobson
1997 IEEE International Performance, Computing and Communications Conference …, 1997
Engaging millenials with information technology: A case study using high school cyber defense competitions
D Jacobson, JA Rursch
12th Colloquium for Information Systems Security Education, 2008
A distributed measurement technique for an operating ethernet network
DW Jacobson
Proceedings of the 15th annual conference on Computer Science, 458, 1987
The system can't perform the operation now. Try again later.
Articles 1–20