scispace - formally typeset
J

Jon Crowcroft

Researcher at University of Cambridge

Publications -  692
Citations -  40720

Jon Crowcroft is an academic researcher from University of Cambridge. The author has contributed to research in topics: The Internet & Multicast. The author has an hindex of 87, co-authored 672 publications receiving 38848 citations. Previous affiliations of Jon Crowcroft include Memorial University of Newfoundland & Information Technology University.

Papers
More filters
Journal ArticleDOI

Honeycomb: creating intrusion detection signatures using honeypots

TL;DR: A system for automated generation of attack signatures for network intrusion detection systems that successfully created precise traffic signatures that otherwise would have required the skills and time of a security officer to inspect the traffic manually.
Journal ArticleDOI

Vigilante: end-to-end containment of internet worms

TL;DR: Vigilante, a new end-to-end approach to contain worms automatically that addresses limitations of network-level techniques, can automatically contain fast-spreading worms that exploit unknown vulnerabilities without blocking innocuous traffic.
Proceedings ArticleDOI

Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms

TL;DR: A simplified model based on the renewal theory is used to study how the parameters of the distribution impact the delay performance of previously proposed forwarding algorithms, in the context of human carried devices.
Proceedings ArticleDOI

TCP-like congestion control for layered multicast data transfer

TL;DR: A novel congestion control algorithm suitable for use with cumulative, layered data streams in the MBone, which behaves similarly to TCP congestion control algorithms, and shares bandwidth fairly with other instances of the protocol and with TCP flows.

Core Based Trees (CBT) An Architecture for Scalable Inter-Domain Multicast Routing

Jon Crowcroft
TL;DR: In this article, the authors show how the current 1P multicast arctiltecture scales poorly (by scale poorly, they mean consume too much memory, bandwidth, or too many processing resources), and subsequently present a multicaat protocol based on a new scalable architecture that is low-cost, relatively simple and efficient.