


default search action
Henry L. Owen
Person information
- affiliation: Georgia Tech, Atlanta, GA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j31]Joaquin Chung
, Rajkumar Kettimuthu, Nam Pho, Russ Clark, Henry L. Owen:
Orchestrating intercontinental advance reservations with software-defined exchanges. Future Gener. Comput. Syst. 95: 534-547 (2019) - [j30]Joaquin Chung
, Sean P. Donovan, Jeronimo Bezerra, Heidi Morgan, Julio Ibarra, Russ Clark, Henry L. Owen:
Novel network services for supporting big data science research. Future Gener. Comput. Syst. 98: 512-521 (2019) - 2018
- [j29]Joaquin Chung, Eun-Sung Jung
, Rajkumar Kettimuthu, Nageswara S. V. Rao, Ian T. Foster
, Russ Clark, Henry L. Owen:
Advance reservation access control using software-defined networking and tokens. Future Gener. Comput. Syst. 79: 225-234 (2018) - 2017
- [j28]Jacob H. Cox Jr.
, Joaquin Chung, Sean Patrick Donovan, Jared S. Ivey, Russell J. Clark, George F. Riley, Henry L. Owen:
Advancing Software-Defined Networks: A Survey. IEEE Access 5: 25487-25526 (2017) - [j27]Jacob H. Cox Jr.
, Russell J. Clark, Henry L. Owen:
Leveraging SDN and WebRTC for Rogue Access Point Security. IEEE Trans. Netw. Serv. Manag. 14(3): 756-770 (2017) - [p1]Jacob H. Cox Jr., Russell J. Clark, Henry L. Owen III:
A Security Policy Transition Framework for Software-Defined Networks. Guide to Security in SDN and NFV 2017: 149-169 - 2016
- [c43]Jacob H. Cox Jr., Russell J. Clark, Henry L. Owen III:
Leveraging SDN to Improve the Security of DHCP. SDN-NFV@CODASPY 2016: 35-38 - [c42]Jacob H. Cox Jr., Sean Patrick Donovan, Russell J. Clark, Henry L. Owen:
Ryuretic: A modular framework for Ryu. MILCOM 2016: 1065-1070 - [c41]Jacob H. Cox Jr., Russell J. Clark, Henry L. Owen:
Security policy transition framework for Software Defined networks. NFV-SDN 2016: 56-61 - 2015
- [c40]John Hall, Jordan Lee, Joseph Benin, Christopher Armstrong, Henry L. Owen:
IEEE 1609 Influenced Automatic Identification System (AIS). VTC Spring 2015: 1-5 - 2013
- [j26]Abdelkrim Hadjidj, Marion Souil, Abdelmadjid Bouabdallah, Yacine Challal
, Henry L. Owen:
Wireless sensor networks for rehabilitation applications: Challenges and opportunities. J. Netw. Comput. Appl. 36(1): 1-15 (2013) - 2012
- [c39]Joseph Benin, Julien Poumailloux, Henry L. Owen, Abdelmadjid Bouabdallah:
Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks. VANET@MOBICOM 2012: 123-126 - [c38]Joseph Benin, Michael Nowatkowski
, Henry L. Owen:
The effects of quality of service on vehicular network pseudonym distribution in congested urban environments. WCNC Workshops 2012: 365-370 - 2010
- [c37]Kevin D. Fairbanks
, Christopher P. Lee, Henry L. Owen III:
Forensic implications of Ext4. CSIIRW 2010: 22 - [c36]Joseph Benin, Michael Nowatkowski
, Henry L. Owen:
Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs. VTC Fall 2010: 1-5 - [c35]Joseph Benin, Michael Nowatkowski
, Henry L. Owen:
Unified pseudonym distribution in VANETs. WiMob 2010: 529-533
2000 – 2009
- 2009
- [c34]Michael Nowatkowski
, Chris McManus, Jennie Wolfgang, Henry L. Owen:
Cooperative Certificate Revocation List Distribution Methods in VANETs. ADHOCNETS 2009: 652-665 - [c33]Kevin D. Fairbanks
, Ying H. Xia, Henry L. Owen III:
A Method for Historical Ext3 Inode to Filename Translation on Honeypots. COMPSAC (2) 2009: 392-397 - 2008
- [j25]Yongpei Guan, Weilai Yang, Henry L. Owen, Douglas M. Blough:
A pricing approach for bandwidth allocation in differentiated service networks. Comput. Oper. Res. 35(12): 3769-3786 (2008) - [c32]Ying H. Xia, Kevin D. Fairbanks
, Henry L. Owen:
Visual Analysis of Program Flow Data with Data Propagation. VizSEC 2008: 26-35 - 2007
- [j24]Sven Krasser, Henry L. Owen, Joachim Sokol, Jochen Grimminger, Hans-Peter Huth:
Communication Networks Adaptive measurement-based traffic engineering in small differentiated services domains. Eur. Trans. Telecommun. 18(1): 35-47 (2007) - 2006
- [j23]Gregory J. Conti, Kulsoom Abdullah, Julian B. Grizzard, John T. Stasko, John A. Copeland, Mustaque Ahamad, Henry L. Owen, Christopher P. Lee:
Countering Security Information Overload through Alert and Packet Visualization. IEEE Computer Graphics and Applications 26(2): 60-70 (2006) - [j22]John G. Levine, Julian B. Grizzard, Henry L. Owen:
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection. IEEE Secur. Priv. 4(1): 24-32 (2006) - [j21]Randal T. Abler, Didier Contis
, Julian B. Grizzard, Henry L. Owen:
Georgia tech information security center hands-on network security laboratory. IEEE Trans. Educ. 49(1): 82-87 (2006) - 2005
- [j20]David A. Barlow, Vasos Vassiliou, Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol:
Traffic engineering based on local states in Internet protocol-based radio access networks. J. Commun. Networks 7(3): 377-384 (2005) - [c31]Sven Krasser, Henry L. Owen, Joachim Sokol, Hans-Peter Huth, Jochen Grimminger:
Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements. CNSR 2005: 131-136 - [c30]Hayriye Altunbasak, Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol:
Securing Layer 2 in Local Area Networks. ICN (2) 2005: 699-706 - [c29]Weilai Yang, Henry L. Owen, Douglas M. Blough:
Determining Differentiated Services Network Pricing Through Auctions. ICN (1) 2005: 802-809 - [c28]Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen:
Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. VizSEC 2005: 10 - 2004
- [j19]John G. Levine, Julian B. Grizzard, Henry L. Owen:
Using Honeynets to Protect Large Enterprise Networks. IEEE Secur. Priv. 2(6): 73-75 (2004) - [j18]Özgür Gürbüz, Henry L. Owen:
Dynamic resource scheduling (DRS): a multimedia QoS framework for W-CDMA. Wirel. Commun. Mob. Comput. 4(5): 529-546 (2004) - [c27]Julian B. Grizzard, John G. Levine, Henry L. Owen:
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. ESORICS 2004: 369-384 - [c26]Weilai Yang, Henry L. Owen, Douglas M. Blough:
A comparison of auction and flat pricing for differentiated service networks. ICC 2004: 2086-2091 - [c25]John G. Levine, Julian B. Grizzard, Henry L. Owen:
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. IWIA 2004: 107-128 - [c24]Hayriye Altunbasak, Sven Krasser, Henry L. Owen, Joachim Sokol, Jochen Grimminger, Hans-Peter Huth:
Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture. LCN 2004: 417-418 - [c23]Julian B. Grizzard, Sven Krasser, Henry L. Owen, Gregory J. Conti, Eric R. Dodson:
Towards an Approach for Automatically Repairing Compromised Network Systems. NCA 2004: 389-392 - [c22]David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Julian B. Grizzard, John G. Levine, Henry L. Owen:
HoneyStat: Local Worm Detection Using Honeypots. RAID 2004: 39-58 - [c21]Timothy R. Schmoyer, Yu-Xi Lim, Henry L. Owen:
Wireless intrusion detection and response: a classic study using main-in-the-middle attack. WCNC 2004: 883-888 - 2003
- [j17]Randal T. Abler, Henry L. Owen, George F. Riley:
University methodology for internetworking principles and design projects. IEEE Trans. Educ. 46(2): 218-225 (2003) - [c20]Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol:
Probing available bandwidth in radio access networks. GLOBECOM 2003: 3437-3441 - [c19]Weilai Yang, Henry L. Owen, Douglas M. Blough, Yongpei Guan:
An auction pricing strategy for differentiated service networks. GLOBECOM 2003: 4148-4152 - [c18]Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. Owen:
Wireless Intrusion Detection and Response. IAW 2003: 68-75 - [c17]John G. Levine, Richard LaBella, Henry L. Owen, Didier Contis, Brian Culver:
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks. IAW 2003: 92-99 - [c16]David A. Barlow, Vasos Vassiliou, Henry L. Owen:
A Cryptographic Protocol to Protect MPLS Labels. IAW 2003: 237-242 - [c15]Vasos Vassiliou, Henry L. Owen, David A. Barlow, Joachim Sokol, Hans-Peter Huth, Jochen Grimminger:
M-MPLS: Micromobility-enabled multiprotocol label switching. ICC 2003: 250-255 - [c14]Sven Krasser, Henry L. Owen, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol:
Distributed bandwidth reservation by probing for available bandwidth. ICON 2003: 443-448 - [c13]Nicholas Athanasiades, Randal T. Abler, John G. Levine, Henry L. Owen, George F. Riley:
Intrusion Detection Testing and Benchmarking Methodologies. IWIA 2003: 63-72 - 2002
- [j16]Bob Johnston, Henry L. Owen:
Traffic generation algorithm for sdh digital cross-connects. Eur. Trans. Telecommun. 13(3): 245-256 (2002) - [j15]Özgür Gürbüz, Henry L. Owen:
Power Control Based QoS Provisioning for Multimedia in W-CDMA. Wirel. Networks 8(1): 37-47 (2002) - [c12]David A. Barlow, Henry L. Owen, Vasos Vassiliou, Jochen Grimminger, Hans-Peter Huth, Joachim Sokol:
Simulating Router-based Traffic-engineering in Radio Access Networks using NS-2. Communications, Internet, and Information Technology 2002: 136-141 - 2001
- [j14]Seong-Ho Jeong, Henry L. Owen, John A. Copeland, Joachim Sokol:
QoS support for UDP/TCP based networks. Comput. Commun. 24(1): 64-77 (2001) - [j13]Won Bae Park, Henry L. Owen, Ellen W. Zegura:
Intact versus fractional switching in SONET/SDH cross - connects. Eur. Trans. Telecommun. 12(1): 37-54 (2001) - [c11]Myung Choi, Henry L. Owen, Joachim Sokol:
Packet-Size Based Queuing Algorithm for QoS Support. ICN (2) 2001: 137-147 - 2000
- [j12]Özgür Gürbüz, Henry L. Owen:
Dynamic resource scheduling schemes for W-CDMA systems. IEEE Commun. Mag. 38(10): 80-84 (2000) - [j11]Jong-Il Park, Stephen B. Wicker, Henry L. Owen:
Trellis-based soft-output adaptive equalization techniques for TDMA cellular systems. IEEE Trans. Veh. Technol. 49(1): 83-94 (2000) - [c10]Seong-Ho Jeong, Myung Choi, Randal T. Abler, Henry L. Owen, John A. Copeland, Joachim Sokol:
QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment. NETWORKING 2000: 458-469
1990 – 1999
- 1999
- [j10]Peter E. Sholander, Henry L. Owen:
The impact of mapping wander on the performance of SDH AU-4 and TU-3 uniform pointer processors. Comput. Networks 31(5): 457-473 (1999) - [c9]Özgür Gürbüz, Henry L. Owen:
Dynamic resource scheduling for variable QoS traffic in W-CDMA. ICC 1999: 703-707 - [c8]Bob Johnston, Henry L. Owen:
SDH Digital Cross-Connect Traffic Generation Algorithm. MASCOTS 1999: 84-91 - 1998
- [j9]Won Bae Park, Henry L. Owen, Ellen W. Zegura:
SONET/SDH traffic generation models. Eur. Trans. Telecommun. 9(1): 3-13 (1998) - [c7]John Spillane, Henry L. Owen:
Temporal Partitioning for Partially-Reconfigurable-Field-Programmable Gate. IPPS/SPDP Workshops 1998: 37-42 - 1997
- [j8]Peter E. Sholander, Henry L. Owen:
The impact of mapping wander on the performance of SDH TU-11 and TU-l2 uniform pointer processors. J. High Speed Networks 6(1): 53-65 (1997) - [c6]Dennis J. Pai, Henry L. Owen:
An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks. ICC (1) 1997: 261-266 - [c5]Jong-Il Park, Stephen B. Wicker, Henry L. Owen:
Soft Output Equalization Techniques for pi/4-DQPSK Moblie Radio. ICC (3) 1997: 1503-1507 - [c4]Peter E. Sholander, Chris Autry, Henry L. Owen:
Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors. ICC (3) 1997: 1587-1591 - 1996
- [j7]Henry L. Owen:
Ring-based bandwidth dimensioning in SDH networks. Comput. Commun. 19(2): 102-112 (1996) - [j6]Peter E. Sholander, Chris Autry, Henry L. Owen:
Effects of fixed frequency clock offsets in synchronous digital hierarchy networks. Eur. Trans. Telecommun. 7(1): 49-60 (1996) - 1995
- [j5]Henry L. Owen:
Synchronous digital hierarchy byte pointer justification versus VC-12 payload bit justification effects. Eur. Trans. Telecommun. 6(1): 97-105 (1995) - [j4]Peter E. Sholander, Henry L. Owen:
Methodology and Results of Synchronous Digital Hierarchy Network Payload Jitter Simulation. Simul. 64(1): 34-41 (1995) - [c3]Peter E. Sholander, Henry L. Owen:
Simulation Model for Analysis of Synchronous Digital Hierarchy Network Payload Jitter. MASCOTS 1995: 275-279 - 1994
- [j3]Henry L. Owen, Thomas M. Klett:
Synchronous Digital Hierarchy Network Pointer Simulation. Comput. Networks ISDN Syst. 26(5): 481-491 (1994) - [c2]Henry L. Owen:
Synchronous Digital Hierarchy Network Modeling. MASCOTS 1994: 229-233 - 1993
- [j2]Henry L. Owen, Thomas M. Klett:
Synchronous Digital Hierarchy statistical simulation of pointer activity. Comput. Commun. 16(12): 759-766 (1993) - [j1]Henry L. Owen, Carsten Wulf-Mathies:
Synchronous Digital Hierarchy Optical Metropolitan Network Ring Traffic Analysis. Eur. Trans. Telecommun. 4(6): 591-597 (1993) - [c1]Henry L. Owen:
VLSI Architecture for Switch-Level Simulation. MASCOTS 1993: 44-49
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint