Christine E. Jones

Learn More
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's origin, widespread packet forwarding techniques such as NAT and encapsulation may obscure the packet's true source. Techniques have been developed to determine the source of large packet(More)
Wireless networking has witnessed an explosion of interest from consumers in recent years for its applications in mobile and personal communications. As wireless networks become an integral component of the modern communication infrastructure, energy efficiency will be an important design consideration due to the limited battery life of mobile terminals.(More)
We present decoy routing, a mechanism capable of circumventing common network filtering strategies. Unlike other circumvention techniques, decoy routing does not require a client to connect to a specific IP address (which is easily blocked) in order to provide circumvention. We show that if it is possible for a client to connect to any unblocked(More)
DARPA’s Disruption-Tolerant Networking (DTN) program is developing technologies that enable access to information when stable end-to-end paths do not exist and network infrastructure access cannot be assured. DTN technology makes use of persistence within network nodes, along with the opportunistic use of mobility, to overcome disruptions to connectivity.(More)
Decoy routing is a powerful circumvention mechanism intended to provide secure communications that cannot be monitored, detected, or disrupted by a third party who controls the user's network infrastructure. Current decoy routing protocols have weaknesses, however: they either make the unrealistic assumption that routes through the network are symmetric(More)
CONTEXT Altered immune responses might contribute to the high morbidity and mortality observed in human immunodeficiency virus (HIV)-exposed uninfected infants. OBJECTIVE To study the association of maternal HIV infection with maternal- and infant-specific antibody levels to Haemophilus influenzae type b (Hib), pneumococcus, Bordetella pertussis antigens,(More)
There is an urgent need for a pro-active approach to botnet detection and mitigation that will enable computer network defenders to characterize emerging and future botnet threats and design effective defense techniques before these threats materialize. To this end, we have developed a System for Live Investigation of Next Generation bots (SLINGbot).(More)
The number of infants infected with HIV is declining with the rise in interventions for the elimination of paediatric HIV infection, but the number of uninfected infants exposed to HIV through their HIV-infected mothers is increasing. Interest in the health outcomes of HIV-exposed, uninfected infants has grown in the past decade, with several studies(More)
The Source Path Isolation Engine (SPIE) is a system capable of tracing a single IP packet to its point of origin or point of ingress into a network. SPIE supports tracing by storing a few bits of unique information about each packet for a period of time as the packets traverse the network. Software implementations of SPIE can trace packets through networks(More)
INTRODUCTION In England, antenatal pertussis immunization using a tetanus/low-dose diphtheria/5-component acellular-pertussis/inactivated-polio (TdaP5/IPV) vaccine was introduced in October 2012. We assessed infant responses to antigens in the maternal vaccine and to those conjugated to tetanus (TT) or the diphtheria toxin variant, CRM. METHODS Infants of(More)