T
Timothy Wood
Researcher at George Washington University
Publications - 97
Citations - 8190
Timothy Wood is an academic researcher from George Washington University. The author has contributed to research in topics: Virtual machine & Cloud computing. The author has an hindex of 35, co-authored 90 publications receiving 7615 citations. Previous affiliations of Timothy Wood include Rutgers University & University of Massachusetts Amherst.
Papers
More filters
Proceedings ArticleDOI
The feasibility of launching and detecting jamming attacks in wireless networks
TL;DR: This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.
Proceedings Article
Black-box and gray-box strategies for virtual machine migration
TL;DR: This work presents Sandpiper, a system that automates the task of monitoring and detecting hotspots, determining a new mapping of physical to virtual resources and initiating the necessary migrations, and implements a black- box approach that is fully OS- and application-agnostic and a gray-box approach that exploits OS-and- application-level statistics.
Journal ArticleDOI
Agile dynamic provisioning of multi-tier Internet applications
TL;DR: A novel dynamic provisioning technique for multi-tier Internet applications that employs a flexible queuing model to determine how much of the resources to allocate to each tier of the application, and a combination of predictive and reactive methods that determine when to provision these resources, both at large and small time scales is proposed.
Journal ArticleDOI
NetVM: High Performance and Flexible Networking Using Virtualization on Commodity Platforms
TL;DR: This evaluation shows how NetVM can compose complex network functionality from multiple pipelined VMs and still obtain throughputs up to 10 Gbps, an improvement of more than 250% compared to existing techniques that use SR-IOV for virtualized networking.
Proceedings ArticleDOI
Channel surfing and spatial retreats: defenses against wireless denial of service
TL;DR: This paper presents two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack, and studies both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network.