Network communication system with improved security J McCoy, J White US Patent 9,118,712, 2015 | 299 | 2015 |
Quantitative analysis of intrusion detection systems: Snort and Suricata JS White, T Fitzsimmons, JN Matthews Cyber sensing 2013 8757, 10-21, 2013 | 116 | 2013 |
Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach S Gurajala, JS White, B Hudson, JN Matthews Proceedings of the 2015 international conference on social media & society, 1-7, 2015 | 100 | 2015 |
Profile characteristics of fake Twitter accounts S Gurajala, JS White, B Hudson, BR Voter, JN Matthews Big Data & Society 3 (2), 2053951716674236, 2016 | 93 | 2016 |
A survey of virtualization technologies with performance testing J White, A Pilbeam arXiv preprint arXiv:1010.3233, 2010 | 42 | 2010 |
A method for the automated detection phishing websites through both site characteristics and image analysis JS White, JN Matthews, JL Stacy Cyber Sensing 2012 8408, 111-121, 2012 | 25 | 2012 |
Coalmine: an experience in building a system for social media analytics JS White, JN Matthews, JL Stacy Cyber Sensing 2012 8408, 100-110, 2012 | 12 | 2012 |
A method for the automated detection phishing websites through both site characteristics and image analysis Cyber Sensing 2012; vol. 8408 JS White, JN Matthews, JL Stacy International Society for Optics and Photonics 2012, 2012 | 9 | 2012 |
Profile characteristics of fake twitter accounts JN Matthews, BR Voter, B Hudson, JS White, S Gurajala | 8 | 2016 |
Dynamic malware analysis using IntroVirt: a modified hypervisor-based system JS White, SR Pape, AT Meily, RM Gloo Cyber Sensing 2013 8757, 71-76, 2013 | 8 | 2013 |
It’s you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit JS White, JN Matthews | 7 | 2013 |
Social media Emoji analysis, correlations and trust modeling M Preisendorfer, S Sengupta, J White, A Tekeoglu Doctoral dissertation, 2018 | 6 | 2018 |
Social relevance: toward understanding the impact of the individual in an information cascade RT Hall, JS White, J Fields Cyber Sensing 2016 9826, 74-82, 2016 | 6 | 2016 |
An analysis of coupling attacks in high-speed fiber optic networks JS White, AW Pilbeam Enabling Photonics Technologies for Defense, Security, and Aerospace …, 2011 | 6 | 2011 |
A survey of virtualization technologies with performance testing. arXiv. org: Cornell University Library JS White, AW Pilbeam URL: http://arxiv. org/pdf/1010.3233. pdf, 2019 | 4 | 2019 |
The missing pieces: physical layer optical network security JS White State University of New York Institute of Technology at Utica/Rome, 2008 | 4 | 2008 |
Network gateway with enhanced requesting J McCoy, J White US Patent 8,265,089, 2012 | 3 | 2012 |
The Deep Space Network-a technology case study and what improvements to the Deep Space Network are needed to support crewed missions to Mars? P Falke, L Hash, J Marsh, J White, D Climek, K Kwiat | 2 | 2017 |
Connectors, Mavens, Salesmen and More: An Actor-Based Online Social Network (OSN) Analysis Method Using Tensed Predicate Logic JS White, JN Matthews SocialInformatics2014, 2014 | 2 | 2014 |
Security Challenges in SDN Implementation P Patil, L Hash, J White, A Tekeoglu | 1 | 2018 |