Conference Publications

Conference Publications


As required by the IEEE Electronic Information Dissemination Requirements “This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.”

1. Owen, H.L. “VLSI Architecture for Switch-Level Simulation,” Proceedings of Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS 93), San Diego, pp. 314-321, January 1993.

2. Owen, H. L. and Klett, T., “Simulation of Pointer Activity in Synchronous Digital Hierarchy Networks,” Proceedings of the International Phoenix Conference on Computers and Communications, Phoenix, pp. 409-415, March 1993.

3. Owen, H. L., Khan, U. R., and Hughes, J. L. A., “FPGA Based ASIC Hardware Emulator Architectures,” Proceedings 3rd International Workshop on Field Programmable Logic and Applications, Oxford, U.K. pp. L8-L19, September 1993.

4. Khan, U. R., Owen, H. L., and Hughes, J. L. A., “FPGA Architectures for ASIC Hardware Emulators,” Proceedings of the Sixth Annual IEEE International ASIC ’93, New York, pp. 336-340, October 1993.

5. Owen, H.L. “Synchronous Digital Hierarchy Network Modeling,” Proceedings of Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS 94), Durham, pp. 229-233, February 1994.

6. Owen, H. L., “Combinatorial Effects of Bit and Byte Justification in SDH Networks,” Proceedings of the International Phoenix Conference on Computers and Communications, Phoenix, pp. 372-376, April 1994.

7. Sholander, P. E. and Owen, H. L., “SONET/SDH Adaptive Threshold Pointer Processor Clocking Strategies,” Proceedings of GLOBECOM 94, San Francisco, pp. 1171-1174, November 1994.

8. Sholander, P. E. and Owen, H. L., “Simulation Model for the Analysis of Synchronous Digital Hierarchy Network Payload Jitter,” Proceedings of Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS 95), Durham, pp. 275-279, January 1995.

9. Park, W., Zegura, E. W., and Owen, H. L., “SONET/SDH Multicast Routing Algorithms in Symmetrical Three-Stage Networks,” Proceedings of ICC 95, Seattle, pp. 1912-1917, June 1995.

10. Scruggs, M. D. and Owen, H. L., “Evaluation of Several Survivability Risk Assessment Metrics Applied to Various Networks,” Proceedings of the 7th European Simulation Symposium, Erlangen, Germany, pp. 511-515, October 1995.

11. Sholander, P. E. and Owen, H. L., “Mapping Wander in SONET/SDH Fixed Threshold and Uniform Pointer Processors,” Proceedings of GLOBECOM 95, Singapore, pp. 50-55, November 1995.

12. Hamblen, J., Owen, H., and Yalamanchili, S., “Introduction of Rapid System Prototyping into Undergraduate Computer Engineering Curricula,” Proceedings of Frontiers in Education 25th Annual Conference, Atlanta, pp. 2C3.5 – 2C3.7, November 1995.

13. Hamblen, J., Owen, H., Yalamanchili, S., and Dao, B., “Using Rapid Prototyping in a Computer Architecture Design Laboratory,” 2nd Annual Workshop on Computer Architecture Education held in conjunction with High-Performance Computer Architecture Symposium, San Jose, February 1996. (Also published in IEEE Computer Society Computer Architecture Technical Committee Newsletter, pp. 44-52, June 1996).

14. Autry, C. B. and Owen, H. L., “Minimization of the Accumulated Phase Change at the Input of SDH/SONET Desynchronizers,” Proceedings of the International Phoenix Conference on Computers and Communications, Phoenix, pp. 315-320, April 1996.

15. Park, W.-B., Owen, H. L., and Zegura, E. W., “Connection Request Model for SONET/SDH Switch Evaluation,” Proceedings of ICC 96, Dallas, pp. 1452-1456, June 1996.

16. Park, J.-I., Wicker, S. B., and Owen, H. L.,”Concatenation of MLSE Equalizer and Viterbi Decoder for TDMA Cellular Systems,” Proceedings of 1996 MILCOM, McLean, Virginia, pp. 723-727, October 1996.

17. Park, W., Owen, H. L., and Zegura, E. W., “Pool-Based Traffic Generation Model for SONET/SDH,” Proceedings of GLOBECOM 96, pp. 912-916, London, November 1996.

18. Pai, D. and Owen, H. L., “ATM Bandwidth Management with Survivability Constraints,” Proceedings of 1997 International Phoenix Conference on Computers and Communications, Phoenix, pp. 171-176, February 1997.

19. Park, J.-I., Wicker, S. B., and Owen, H. L., “TDMA Cellular Soft Output Adaptive Equalization Based on the Modified-MAP Algorithm,” Proceedings of 1997 International Phoenix Conference on Computers and Communications, Phoenix, pp. 557-562, February 1997.

20. Pai, D. and Owen, H. L., “An Algorithm for Bandwidth Management with Survivability Constraints in ATM Networks,” Proceedings of 1997 International Conference on Communications, Montreal, pp. 261-266, 1997.

21. Sholander, P., Autry, C. B., and Owen, H. L., “Mapping Wander in SONET/SDH Adaptive Threshold Modulation Pointer Processors,” Proceedings of 1997 International Conference on Communications, Montreal, pp. 1587-1591, 1997.

22. Park, J.-I., Wicker, S. B., and Owen, H. L., “Soft Output Adaptive Equalization Techniques for pi/4-DQPSK Mobile Radio,” Proceedings of 1997 International Conference on Communications, Montreal, pp. 1503-1507, 1997.

23. Park, J., Choi, Y., Wicker, S., and Owen, H., “Trellis Based Turbo Equalization Techniques for Mobile Radio Receiver,” Proceedings of International Conference on Telecommunications 1999, Cheju, Korea, pp. 134-138, 1999.

24. Choi, M., Barnes, B., Owen, H., and Sokol, J., “Packet-Based Fair Queuing Scheduling Algorithm,” Proceedings of International Conference on Telecommunications 1999, Cheju, Korea, pp. 187-191, 1999.

25. Gurbuz, O. and Owen, H., “A Resource Management Framework for QoS Provisioning in W-CDMA Systems,” Proceedings of IEEE VTC’ 99, Houston, TX, pp. 407-411, Vol. 1, May 1999.

26. Gurbuz, O. and Owen, H., “Dynamic Resource Scheduling for Variable QoS in W-CDMA,” Proceedings of IEEE ICC’99, International Conference on Communications, Vancouver, pp. 703-707, Vol. 2, June 1999.

27. Johnston, R. and Owen, H., “SDH Digital Cross-Connect Traffic Generation Algorithm,” Modeling, Analysis and Simulation of Computer and Telecommunications Systems, College Park, pp. 84-91, October 1999.

28. Felten, J., Gurbuz, O., Owen, H., Grossmann, T., Kussmann, G., and Schroeck, W., “Modeling, Simulation, and Verification of an Enterprise Network,” Proceedings of IEEE GLOBECOM 99, Rio de Janeiro, Brazil, pp. 183-187, December 1999.

29. Gurbuz, O. and Owen, H., “Dynamic Resource Scheduling Strategies for QoS in W-CDMA,” Proceedings of IEEE GLOBECOM 99, Rio de Janeiro, Brazil, pp. 183-187, December 1999.

30. Gurbuz, O., Owen, H., Schroeck, W., and Grossmann, T., “OPNET Modeling of IPX/IGX Switches,” OPNETWORK ’99, Washington D.C., May 1999.

31. Barnes, B., Choi, M., Koehler, B., and Owen, H., “Real-Time Virtual Circuit Management for the Integrated Services Architectue,” Proceedings of the IEEE SoutheastCon ‘2000, Nashville, Tenn, pp. 315-321, April 2000.

32. Gurbuz, O. and Owen, H., “Delay Profiles of Dynamic Resource Scheduling Schemes for W-CDMA Systems,” Proceedings of IEEE 3G Wireless ‘2000, San Francisco, pp. 274-279, June 2000.

33. Jeong, S.H., Choi, M., Abler, R., Owen, H., Copeland, J., and Sokol, J., “ QoS Support for Real-Time Applications Using the Integration of RSVP/Intserv and Diffserv: A Testbed Experiment,” Proceedings of Networking 2000 CD, and Lecture Notes in Computer Science, Springer ISBN 3-540-67506-X, Paris, France, pp. 458-469, May 2000.

34. Jeong, S.H., Owen, H., Copeland, J., and Sokol, J., “QoS Management for Multimedia Applications Using an Efficient Queue Policy,” Proceedings of Networking 2000 CD, Paris, France, May 2000.

35. Choi, M. C., Owen, H.L., and Sokol, J., “Packet-size Based Queuing Algorithm for QoS Support,” International Conference on Networking 2001, Colmar, France, Vol. II, pp. 137-147, June 2001.

36. Koehler, B.G., Barlow, D.A., Owen, H.L., and Sokol, J., “Simulation Framework for Topological MPLS Traffic Engineering,” Proceedings SCI 2001, Orlando, pp. 421-426 June 2001.

37. Barlow, D., Owen, H. Vassiliou, V., Sokol, J., Huth, H.-P., and Grimminger, “Router-Based Traffic-Engineering in MPLS/DiffServ/HMIP Radio Access Networks,” Proceedings of the IASTED International Conference on Wireless and Optical Communications, Banff, Canada, pp.360 – 365, July 17-19, 2002.

38. Koehler, B., Barlow, D., Owen, H., and Sokol, J., “Traffic Engineering Communication Protocols for Best Effort Traffic,” International Conference on Communication Systems and Networks CSN 2002, Malaga Spain, pp. 360-365, September 2002.

39. Vassiliou, V., Owen, H., Barlow, D., Huth, H.-P., Sokol, J., and Grimminger, J., “A Radio Access Network for Next Generation Wireless Networks Based on MPLS and Hierarchical Mobile IP,” Proceedings of VTC 2002, pp. 782-786, Vancouver, Canada, September 2002.

40. Vassiliou, V., Barlow, D., Owen, H., Grimminger, J., Huth, H.-P., and Sokol, J., “Simulating Router-Based Traffic-Engineering in Radio Access Networks Using NS-2,” Communications, Internet, and Information Technology CIIT 2002, pp. 136-141, St. Thomas, US Virgin Islands, November 2002.

41. Krasser, S., Barlow, D., Owen, H., Grimminger, J., Huth, H.-P., and Sokol, J. “Evaluation of the Local State Fair Share Bandwidth Algorithm,” International Conference on Telecommunications”, pp. 911-916, Papeete French Polynesia, February 2003.

42. Athanasiades, N., Abler, R., Levine, J., Owen, H., and Riley, G., “Intrusion Detection Testing and Benchmarking Methodologies,” IEEE Information Assurance Workshop, pp. 63-72, Darmstadt, Germany, March 2003.

43. Levine, J., Culver, and Owen, H., “A Methodology for Detecting New Binary Rootkit Exploits,” IEEE Southeastcon, Ocho Rios, Jamaica, April 2003.

44. Vassiliou, V., Owen, H, Barlow, D., Sokol, J., Grimminger, J., Huth, H.-P., “M-MPLS Micro-Mobility Enabled Multiprotocol Label Switching,” ICC 2003, Anchorage, Alaska, May 2003.

45. Lim, Y.-X., Schmoyer, T, Levine, J, Owen, H., “Wireless Intrusion Detection and Response,” IEEE 4th Annual Information Assurance Workshop”, West Point N.Y., June 2003.

46. Levine, J., LaBella, R., Owen, H., Contis, D. and Culver, B., “The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks,” accepted IEEE 4th Annual Information Assurance Workshop, West Point, NY, June 2003.

47. Barlow, D. A., Vassiliou, V., Owen, H. L., “A Cryptographic Protocol to Protect MPLS Labels,” accepted IEEE 4th Annual Information Assurance Workshop, West Point, NY, June 2003.

48. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P. , and Sokol, J. “Distributed Bandwidth Reservation by Probing for Available Bandwidth,” ICON 2003, Sydney, Australia, October 2003.

49. Yang, W., Owen, H., Blough, D., “An Auction Pricing Strategy for Differentiated Networks,” Globecom 2003, San Francisco, December 2003.

50. Krasser, S, Owen, H., Grimminger, J., Huth, H.-P., and Sokol, J. “Probing Available Bandwidth in Radio Access Networks,”  Globecom 2003, December 2003.

51. Krasser, S, Owen, H., Grimminger, J., Huth, H.-P., and Sokol, J. “Evaluation of the Local State Fair Share Bandwidth Algorithm,” 10th International Conference on Telecommunications 2003, Papeete, French Polynesia,  March 2003.

52. Krasser, S., Owen, H., Grimminger, J., Huth, H.-P. , and Sokol, J. “Online Traffic Engineering and Connection Admission Control Based on Path Queue States,” IEEE Southeastcon 2004, Greensboro, North Carolina, USA, pp. 255-260, March 2004.

53. Levine, J., Grizzard, J., Hutto, P., and Owen, H., “A Methodology to Characterize Kernel Level Rootkit Expolits that Overwrite the System Call Table,” Southeastcon 2004, Greensboro, North Carolina, USA, March 2004.

54. Rojanarowan, J., Koehler, B., Owen, H., “MPLS Based Best Effort Traffic Engineering“, IEEE Southeastcon 2004, Greensboro, North Carolina, USA, March 2004.

55. Rojanarowan, J., Koehler, B., Owen, H., “Traffic Engineering Using MPLS for Best Effort Traffic“, ICN 2004, Guadelope, French Carribean, March 2004.

56. Altunbasak, H., and Owen, H., “Alternative Pair-Wise Key Exchange Protocols for Robost Security Networks (IEEE 802.11i) in Wireless LANs“, IEEE SOUTHEASTCON, Greensborough, North Carolina, March 2004.

57. Lim, Y.-X., Schmoyer, T, Levine, J, Owen, H., “Wireless Intrusion Detection and Response,” IEEE Wireless Communications and Networks Conference 2004, Atlanta, Georgia, March 2004.

58. Levine, L., Grizzard, J., and Owen, H, “A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table“, 2nd IEEE International Information Assurance Workshop, pp. 107-125, Charlotte, North Carolina, April 2004

59. Grizzard, J., Dodson, E., Conti, G., Levine, J., and Owen, Henry, “Towards a Trustable Immutable Kernel Extension (TIKE) for Self Healing Systems: A Virtual Machine Approach“, 5th Annual Information Assurance Workshop, pp. 444-446, West Point, NY, June 2004.

60. Jackson, T., Levine, J.,  Grizzard, J., and Owen, Henry, “An Investigation of a Compromised Host on a Honeynet Being Used to Increase the Security of a Large Enterprise Network“, 5th Annual Information Assurance Workshop, pp. 9-15, West Point, NY, June 2004.

61. Levine, L., Grizzard, J., and Owen, H, “Application of a Methodology to Characterize Rootkits Retrieved from Honeynets“, 5th  IEEE Systems, Man and Cybernetics Information Assurance Workshop, pp. 15-21, West Point, New York, June 2004.

62. Yang, W., Owen, H., Blough, D., “A Comparison of Auction and Flat Pricing  for Differentiated Service Networks,” ICC 2004, Paris, June 2004

63. Grizzard, J., Krasser, S., Owen, H., Conti, G., and  Dodson, E., “Towards an Approach for Automatically Repairing Compromised Network Systems“, 3rd IEEE International Symposium on Network Computing and Applications (IEEE NCA04), Cambridge, August 2004.

64. Dagon, D., Quin, X., Lee, W., Grizzard, J., Levine, J., and Owen, H., “HoneyStat: Local Worm Detection Using Honeypots“, Seventh International Symposium on Recent Advances in Intrusion Detection,  Sophia Antipolis, France, September 2004.

65. Grizzard, J., Levine, J., and Owen, Henry, “Re-Establishing Trust in Compromised Systems: Recovering from Rootkits that Trojan the System Call Table“, Ninth European Symposium on Research in Computer Security, September, 2004.

66. Altunbasak, H., Krasser, S., Owen, H., Grimminger, J., Huth, H.-P. , and Sokol, J. “Addressing the Weak Link Between Layer 2 and Layer 3 in the Internet Architecture“, The 29th Annual IEEE Conference on Local Computer Networks (LCN), Tampa, Florida, November 2004.

67. Altunbasak, H., Krasser, S., Owen, H., Grimminger, J., Huth, H.-P. , and Sokol, J. “Securing Layer 2 in Local Area Networks,” 4th International Conference on Networking, Reunion, France, April 2005, pp. 699-706.

68. Yang, W., Blough, D., and Owen, H., “Determining Differentiated Services Network Pricing Through Auctions”,  4th International Conference on Networking, Reunion Island, France, April 17-21, 2005, p. 802

69. Krasser, S., Owen, H., Sokol, J., Huth, H.-P. , and Grimminger, J., “Adaptive Per-Flow Traffic Engineering Based on Probe Packet Measurements ,”Communications Networks and Services Research, Halifax, Nova Scotia, Canada, May 2005.

 70. Grizzard, J., Simpson, C., Krasser, S., Owen, H. and Riley, G., “Flow Based Observations from NETI@Home and Honeynet Data”, Sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, June 2005, pp. 244-251.

71. Krasser, S., Conti, G., Grizzard, J., Gribschaw, J., and Owen, H, “Real-Time Forensic Network Data Analysis Using Animated and Coordinated Visualization”, Sixth IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, June 2005, pp. 42-49.

72. Conti, G., Grizzard, J., Ahamad, M., and Owen, H., “Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries”, VizSec, 2005.

73. Grizzard, J., and Owen, H. “On a μ-Kernel Based System Architecture Enabling Recovery from Rootkits”, First IEEE International Workshop on Critical Infrastructure Protection, Darmstadt, Germany, November 2005, pp. 13-21.

74. Lim, Y., and Owen, H., “Secure Wireless Location Services”, IEEE SoutheastCon 2007, Richmond Virginia, March 2007, pp. 135-140.

75. Xia, Y., Fairbanks, K., and Owen, H., “Establishing trust in Black Box Programs”, IEEE  SoutheastCon 2007, Richmond Virginia, March 2007, pp. 462-465.

76. Altunbasak, H., and Owen, H., “An Architectural Framework For Data Link Layer Security with Security Inter-layering”, IEEE SoutheastCon 2007, Richmond Virginia, March 2007, pp.  607-614.

77. Altunbasak, H., and Owen, H. “Security Inter-Layering for Evolving and Future Network Architectures”, IEEE SoutheastCon 2007, Richmond Virginia, March 2007, pp. 615-620.

78. Fairbanks, K., Lee, C., Xia, Y., Owen, H., “TimeKeeper: A Metadata Archiving Method for Honeypot Forensics”, Proceedings of the 2007 IEEE Workshop on Information Assurance United States Military Academy, West Point, NY pp. 114-118, June 2007.

79. Xia, Y., Fairbanks, K. , and Owen, H., “Visual Analysis of Program Flow Data With Data Propagation”, Visualization for Computer Security, Lecture Notes in Computer Science Springer Berlin, VisSec 2008, pp. 26-35, 2008.

80. Fairbanks, K. , Atreya, K., and Owen, H. , “BlackBerry IPD Parsing for Open Source Forensics 2009, Southeastcon ’09, pp, 195-199, March 2009, Atlanta, GA

81. M. Nowatkowski, J. Wolfgang, C. McManus, et al., “Cooperative Certificate Revocation List Distribution Methods in VANETs,” in Proceedings of ADHOCNETS 2009 Niagara Falls, Canada, 2009.

82. Kevin D. Fairbanks, Ying H. Xia, Henry L. Owen III, “A Method for Historical Ext3 Inode to Filename Translation on Honeypots,” Computer Software and Applications Conference, Annual International, vol. 2, pp. 392-397, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009.

83. M. Nowatkowski, J. Wolfgang, C. McManus, et al., “The Effects of Limited Lifetime Pseudonyms on Certificate Revocation List Size in VANETs,” SouthEastCon 2010

84. Nowatkowski, M.E.; Owen, H.L.; , “Certificate revocation list distribution in VANETs using Most Pieces Broadcast,” IEEE SoutheastCon 2010 (SoutheastCon), Proceedings of the , vol., no., pp.238-241, 18-21 March 2010

85. Sanders, S., Fairbanks, K., Jampana, S., and Owen, H., “Network Traffic Classification Using Multi-Dimensional Piecewise Polynomial Models”, IEEE SouthEastCon 2010, Charlotte-Concord, NC.

86. Kevin D. Fairbanks, Christopher P. Lee, and Henry L. Owen III , “Forensic Implications of Ext4”, Cyber Security and Information Intelligence Research Workshop, Oak Ridge National Laboratory, April 2010. ACM Proceedings.

87. Nowatkowski, M.E.; Owen, H.L.; , “Scalable certificate revocation list distribution in vehicular ad hoc networks,” GLOBECOM Workshops (GC Wkshps), 2010 IEEE , vol., no., pp.54-58, 6-10 Dec. 2010 Miami.

88. Benin, Nowatkowski, Owen, “Framework to Support Per Second Shifts of Pseudonyms in Regional VANETs”, VTC2010 , Ottawa, Canada

89. Benin, Nowatkowski, Owen, “Pseudonym Distribution in VANETs”, First International Workshop on Vehicular Communications and Networking (VECON 2010)

90. Sanders, S., Nunnally, T., and Owen, H., “Reducing Traffic traces Using a Polynomial Approximation for Traffic Classification”, IEEE SouthEastCon 2011.

91. Joseph Benin and Michael Nowatkowski and Henry Owen, “The Effects of Quality of Service on Vehicular Network Pseudonym Distribution in Congested Urban Environments”, 2012 IEEE Wireless Communications and Networking Conference (WCNC 2012) Workshops (Wireless Vehicular Communications and Networks). April 2012 Paris

92. Joseph Benin, Julien Poumailloux, Henry Owen, and Abdelmadjid Bouabdallah. Impact of pseudonym subsequent pre-computation and forwarding in hybrid vehicular networks, proceedings of the ninth ACM international workshop on Vehicular inter- networking, systems, and applications (VANET ’12). ACM, New York, NY, USA, 123-126.

93. Laura Heath, Henry Owen, Raheem Beyah, and Radu State “CLIP: Content Labeling in IPv6, a Layer 3 Protocol for Information Centric Networking”, ICC 2013