Doug Montgomery
Doug Montgomery
Manager, Internet and Scalable Systems Research, NIST
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
BGPsec Protocol Specification
M Lepinski, K Sriram
RFC Editor, 2017
Performance evaluation of two layered mobility management using mobile IP and session initiation protocol
JW Jung, R Mudumbai, D Montgomery, HK Kahng
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
Performance of optical burst switching techniques in multi-hop networks
BC Kim, YZ Cho, JH Lee, YS Choi, D Montgomery
Global Telecommunications Conference, 2002. GLOBECOM'02. IEEE 3, 2772-2776, 2002
Problem Definition and Classification of BGP Route Leaks
K Sriram, D Montgomery, D McPherson, E Osterweil, B Dickson
RFC Editor, 2016
Study of BGP peering session attacks and their impacts on routing performance
K Sriram, D Montgomery, O Borchert, O Kim, DR Kuhn
IEEE Journal on Selected Areas in Communications 24 (10), 1901-1915, 2006
A reliable message delivery protocol for mobile agents
M Ranganathan, M Bednarek, D Montgomery
International Symposium on Agent Systems and Applications, 206-220, 2000
A comparative analysis of BGP anomaly detection and robustness algorithms
K Sriram, O Borchert, O Kim, P Gleichmann, D Montgomery
2009 Cybersecurity Applications & Technology Conference for Homeland …, 2009
Border gateway protocol security
R Kuhn, K Sriram, D Montgomery
NIST Special Publication 800, 54, 2007
Soft MUD: Implementing manufacturer usage descriptions on OpenFlow SDN switches
M Ranganathan, D Montgomery, OI El Mimouni
Mudumbai Ranganathan, Douglas Montgomery, Omar Ilias El Mimouni, 2019
Securing small business and home Internet of Things (IoT) devices: Mitigating network-based attacks using manufacturer usage description (MUD)
D Dodson, D Montgomery, W Polk, M Ranganathan, M Souppaya, ...
National Institute of Standards and Technology, 2020
Methods for detection and mitigation of bgp route leaks
K Sriram, D Montgomery, B Dickson, K Patel, A Robachevsky
draft-ietf-idr-route-leak-detection-mitigation-06, 2017
Design and simulation result of a Weighted Load Aware Routing (WLAR) protocol in mobile ad hoc network
DI Choi, JW Jung, KY Kwon, D Montgomery, HK Kahng
International Conference on Information Networking, 178-187, 2005
An empirical analysis of IPv6 transition mechanisms
MK Shin, HJ Kim, D Santay, D Montgomery
2006 8th International Conference Advanced Communication Technology 3, 6 pp …, 2006
Mobile streams: A middleware for reconfigurable distributed scripting
M Ranganathan, V Schaal, V Galtier, D Montgomery
Proceedings. First and Third International Symposium on Agent Systems …, 1999
Instrumenting open vswitch with monitoring capabilities: Designs and challenges
Z Zha, A Wang, Y Guo, D Montgomery, S Chen
Proceedings of the Symposium on SDN Research, 1-7, 2018
Resilient Interdomain Traffic Exchange
K Sriram, D Montgomery
NIST Special Publication 800, 189, 2019
Toward secure routing infrastructures
D Montgomery, S Murphy
IEEE Security & Privacy 4 (5), 84-87, 2006
RFC 8704: Enhanced Feasible-Path Unicast Reverse Path Forwarding
K Sriram, D Montgomery, J Haas
RFC Editor, 2020
An efficient optical burst switching technique for multi-hop networks
BC Kim, Y Cho, D Montgomery
IEICE transactions on communications 87 (6), 1737-1740, 2004
Testing SIP call flows using XML protocol templates
M Ranganathan, O Deruelle, D Montgomery
Testing of Communicating Systems: 15th IFIP International Conference …, 2003
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20