关注
Dr. Ronny L. Bull
Dr. Ronny L. Bull
TCT Networks Corporation
在 tct-networks.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A quantitative study of virtual machine live migration
W Hu, A Hicks, L Zhang, EM Dow, V Soni, H Jiang, R Bull, JN Matthews
Proceedings of the 2013 ACM cloud and autonomic computing conference, 1-10, 2013
1132013
Critical analysis of layer 2 network security in virtualised environments
RL Bull, JN Matthews
International Journal of Communication Networks and Distributed Systems 17 …, 2016
112016
Exploring layer 2 network security in virtualized environments
RL Bull, JN Matthews
Retrieved Oct 19, 2014, 2014
62014
VLAN hopping, ARP poisoning and man-in-the-middle attacks in virtualized environments
RL Bull, JN Matthews, KA Trumbull
DEF CON 24 (9), 2016
52016
Lab on a stick
P Shipman, R Bull
Proceedings of the 16th Annual Conference on Information Technology …, 2015
42015
Arp poisoning attack in the vmware esxi 6.0 hypervisor environment
RL Bull
Retrieved, 2016
32016
Spanning Tree Protocol
S Kasu, L Hash, J Marsh, R Bull
32015
Migrating a voice communications laboratory to a virtualized environment
R Bull
Proceedings of the 14th annual ACM SIGITE conference on Information …, 2013
32013
Reactive routing: Harnessing advanced software modems
MJ Moore, RL Bull, S Burleigh, J Cook, J Waszkiewicz, D Cook, J Seif
2023 IEEE Cognitive Communications for Aerospace Applications Workshop …, 2023
22023
Design and implementation of a computer science virtualized lab environment at sunyit (master’s thesis)
R Bull
State University of New York Institute of Technology, 2012
12012
ACritical ANALYSIS OF LAYER 2 NETWORK SECURITY IN VIRTUALIZED ENVIRONMENTS
RL Bull
CLARKSON UNIVERSITY, 2016
2016
Aligning the SUNY Poly NCS Program with Nationally Recognized Accreditation
J Cook, J Marsh, L Hash, R Bull
2015
Layer 2 Network Security in Virtualized Environments DHCP Attacks
RL Bull
2014
Exploring Layer 2 Network Security Issues in Virtualized Environments
RL Bull, JN Matthews
2013
Group Wireless Location Tracking With An Android Sink
RL Bull, AB Stuart, E Spetka, G Thamilarasu
2012
VLAN Security
RL Bull, CS Seminar, P Attacks
LTE VIRTUALIZATION
R BULL, A THOTA
系统目前无法执行此操作,请稍后再试。
文章 1–17