| Network connection blocker, method, and computer readable memory for monitoring connections in a computer network and blocking the unwanted connections DW Jacobson, JA Davis US Patent 6,044,402, 2000 | 181 | 2000 |
| Network security bridge and associated method DW Jacobson US Patent 5,548,649, 1996 | 94 | 1996 |
| Security and performance analysis of a secure clustering protocol for sensor networks P Banerjee, D Jacobson, SN Lahiri Sixth IEEE International Symposium on Network Computing and Applications …, 2007 | 87 | 2007 |
| Attribution of fraudulent resource consumption in the cloud J Idziorek, M Tannian, D Jacobson 2012 IEEE fifth international conference on cloud computing, 99-106, 2012 | 78 | 2012 |
| Detecting fraudulent use of cloud resources J Idziorek, M Tannian, D Jacobson Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 61-72, 2011 | 78 | 2011 |
| IT-adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics JA Rursch, A Luse, D Jacobson IEEE Transactions on Education 53 (1), 71-79, 2009 | 73 | 2009 |
| Cyber security training a survey of serious games in cyber security JN Tioh, M Mina, DW Jacobson 2017 IEEE Frontiers in Education Conference (FIE), 1-5, 2017 | 72 | 2017 |
| Cyber security for airports K Gopalakrishnan, M Govindarasu, DW Jacobson, BM Phares International Journal for Traffic and Transport Engineering 3 (4), 365-376, 2013 | 62 | 2013 |
| The insecurity of cloud utility models J Idziorek, MF Tannian, D Jacobson IT Professional 15 (2), 22-27, 2012 | 58 | 2012 |
| Utilizing structural equation modeling and social cognitive career theory to identify factors in choice of IT as a major A Luse, JA Rursch, D Jacobson ACM Transactions on Computing Education (TOCE) 14 (3), 1-19, 2014 | 54 | 2014 |
| ARA: A wireless living lab vision for smart and connected rural communities H Zhang, Y Guan, A Kamal, D Qiao, M Zheng, A Arora, O Boyraz, B Cox, ... Proceedings of the 15th ACM Workshop on Wireless Network Testbeds …, 2022 | 43 | 2022 |
| Ten myths of cooperative learning in engineering education D Jacobson, J Davis, B Licklider FIE'98. 28th Annual Frontiers in Education Conference. Moving from'Teacher …, 1998 | 38 | 1998 |
| Computer security literacy: staying safe in a digital world D Jacobson, J Idziorek CRC Press, 2016 | 31 | 2016 |
| Introduction to network security D Jacobson Chapman and Hall/CRC, 2008 | 26 | 2008 |
| Cyber security social engineers an extensible teaching tool for social engineering education and awareness JN Tioh, M Mina, DW Jacobson 2019 IEEE Frontiers in Education Conference (FIE), 1-5, 2019 | 22 | 2019 |
| When a testbed does more than testing: The Internet-Scale Event Attack and Generation Environment (ISEAGE)-providing learning and synthesizing experiences for cyber security … JA Rursch, D Jacobson 2013 IEEE Frontiers in Education Conference (FIE), 1267-1272, 2013 | 21 | 2013 |
| Bounding delay on a multifarious token ring network SS Gaitonde, D Jacobson, AV Pohm Communications of the ACM 33 (1), 20-28, 1990 | 19 | 1990 |
| A master/slave monitor measurement technique for an operating ethernet network D Jacobson, S Gaitonde, J Kim, J Lee, D Rover, M Sarwar, M Shafiq IEEE Network 1 (3), 40-48, 1987 | 17 | 1987 |
| Engaging millenials with information technology: A case study using high school cyber defense competitions D Jacobson, JA Rursch 12th Colloquium for Information Systems Security Education, 2008 | 13 | 2008 |
| Cyber defense competition D Jacobson, N Evans 2006 Annual Conference & Exposition, 11.386. 1-11.386. 18, 2006 | 12 | 2006 |