Name
Papers
Collaborators
JOSEPH G TRONT
41
64
Citations 
PageRank 
Referers 
149
24.97
401
Referees 
References 
424
189
Search Limit
100424
Title
Citations
PageRank
Year
Host Inventory Controls And Systems Survey: Evaluating The Cis Critical Security Control One In Higher Education Networks00.342018
Privacy Preserving Network Security Data Analytics: Architectures And System Design00.342018
Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things.10.362018
Designing a Micro-Moving Target IPv6 Defense for the Internet of Things.20.472017
MARCS: mobile augmented reality for cybersecurity00.342017
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet.00.342017
Spark on the ARC: Big data analytics frameworks on HPC clusters.00.342017
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities00.342016
Modeling network based moving target defense impacts through simulation in Ns-3.00.342016
Speed isn?t Enough: Usability and Adoption of an Optimized Alert Notification System.00.342016
Attention: moving target defense networks, how well are you moving?20.382015
Energy efficiency of Zipf traffic distributions within Facebook's data center fabric architecture20.372015
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses30.492015
Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid40.442014
Leveraging Cognitive Principles to Improve Security Visualization.10.362012
Developing a plug-in tool to make OneNote an e-textbook20.452012
Validating A Custom Ipv6 Security Application Using Opnet Modeler00.342012
Cover-VT: Converged Security Visualization Tool10.342011
What DHCPv6 says about you40.502011
Mini workshop — How to improve teaching and learning: Selecting, implementing and evaluating digital resources in the Engineering Pathway00.342011
Mt6d: A Moving Target Ipv6 Defense401.902011
Simulating the Deployment of Battery-Sensing Intrusion Protection Systems00.342009
WriteOn1.0: a tablet PC-based tool for effective classroom instruction30.492009
Mobile Device Profiling and Intrusion Detection Using Smart Batteries342.592008
Internet Security: Intrusion Detection and Prevention in Mobile Systems10.372007
Facilitating Pedagogical Practices through a Large-Scale Tablet PC Deployment30.502007
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection50.842007
Ubiquitous Security: Privacy versus Protection30.622006
WriteOn: a tool for classroom presentations on tablet PCs10.762006
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective40.542006
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction20.402004
Implementation Issues on the Quality Evaluation ofWeb-Based Courses and Digital Learning Resources00.342004
CANDI: A System for Classifying the Security Risks in Network Appliances00.342003
Design and Implementation of a Configurable Platform for Embedded Communication Systems20.462003
A Development System for Creating Real-time Machine Vision Hardware Using Field Programmable Gate Arrays20.471999
FX: a fast approximate fault simulator for the switch-level using VHDL10.351996
VHDL switch level fault simulation10.361994
A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer.00.341992
BIDES: a BIST design expert system40.771991
Automatic insertion of BIST hardware using VHDL132.141988
Parallel Computer Architectures and Problem Solving Strategies for the Consistent Labeling Problem82.531985