A quantitative study of virtual machine live migration W Hu, A Hicks, L Zhang, EM Dow, V Soni, H Jiang, R Bull, JN Matthews Proceedings of the 2013 ACM cloud and autonomic computing conference, 1-10, 2013 | 113 | 2013 |
Critical analysis of layer 2 network security in virtualised environments RL Bull, JN Matthews International Journal of Communication Networks and Distributed Systems 17 …, 2016 | 11 | 2016 |
Exploring layer 2 network security in virtualized environments RL Bull, JN Matthews Retrieved Oct 19, 2014, 2014 | 6 | 2014 |
VLAN hopping, ARP poisoning and man-in-the-middle attacks in virtualized environments RL Bull, JN Matthews, KA Trumbull DEF CON 24 (9), 2016 | 5 | 2016 |
Lab on a stick P Shipman, R Bull Proceedings of the 16th Annual Conference on Information Technology …, 2015 | 4 | 2015 |
Arp poisoning attack in the vmware esxi 6.0 hypervisor environment RL Bull Retrieved, 2016 | 3 | 2016 |
Spanning Tree Protocol S Kasu, L Hash, J Marsh, R Bull | 3 | 2015 |
Migrating a voice communications laboratory to a virtualized environment R Bull Proceedings of the 14th annual ACM SIGITE conference on Information …, 2013 | 3 | 2013 |
Reactive routing: Harnessing advanced software modems MJ Moore, RL Bull, S Burleigh, J Cook, J Waszkiewicz, D Cook, J Seif 2023 IEEE Cognitive Communications for Aerospace Applications Workshop …, 2023 | 2 | 2023 |
Design and implementation of a computer science virtualized lab environment at sunyit (master’s thesis) R Bull State University of New York Institute of Technology, 2012 | 1 | 2012 |
ACritical ANALYSIS OF LAYER 2 NETWORK SECURITY IN VIRTUALIZED ENVIRONMENTS RL Bull CLARKSON UNIVERSITY, 2016 | | 2016 |
Aligning the SUNY Poly NCS Program with Nationally Recognized Accreditation J Cook, J Marsh, L Hash, R Bull | | 2015 |
Layer 2 Network Security in Virtualized Environments DHCP Attacks RL Bull | | 2014 |
Exploring Layer 2 Network Security Issues in Virtualized Environments RL Bull, JN Matthews | | 2013 |
Group Wireless Location Tracking With An Android Sink RL Bull, AB Stuart, E Spetka, G Thamilarasu | | 2012 |
VLAN Security RL Bull, CS Seminar, P Attacks | | |
LTE VIRTUALIZATION R BULL, A THOTA | | |