关注
Josh S. White
Josh S. White
Assistant Professor of Data Science - Utica University
在 sunyit.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Network communication system with improved security
J McCoy, J White
US Patent 9,118,712, 2015
2992015
Quantitative analysis of intrusion detection systems: Snort and Suricata
JS White, T Fitzsimmons, JN Matthews
Cyber sensing 2013 8757, 10-21, 2013
1162013
Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach
S Gurajala, JS White, B Hudson, JN Matthews
Proceedings of the 2015 international conference on social media & society, 1-7, 2015
1002015
Profile characteristics of fake Twitter accounts
S Gurajala, JS White, B Hudson, BR Voter, JN Matthews
Big Data & Society 3 (2), 2053951716674236, 2016
932016
A survey of virtualization technologies with performance testing
J White, A Pilbeam
arXiv preprint arXiv:1010.3233, 2010
422010
A method for the automated detection phishing websites through both site characteristics and image analysis
JS White, JN Matthews, JL Stacy
Cyber Sensing 2012 8408, 111-121, 2012
252012
Coalmine: an experience in building a system for social media analytics
JS White, JN Matthews, JL Stacy
Cyber Sensing 2012 8408, 100-110, 2012
122012
A method for the automated detection phishing websites through both site characteristics and image analysis Cyber Sensing 2012; vol. 8408
JS White, JN Matthews, JL Stacy
International Society for Optics and Photonics 2012, 2012
92012
Profile characteristics of fake twitter accounts
JN Matthews, BR Voter, B Hudson, JS White, S Gurajala
82016
Dynamic malware analysis using IntroVirt: a modified hypervisor-based system
JS White, SR Pape, AT Meily, RM Gloo
Cyber Sensing 2013 8757, 71-76, 2013
82013
It’s you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit
JS White, JN Matthews
72013
Social media Emoji analysis, correlations and trust modeling
M Preisendorfer, S Sengupta, J White, A Tekeoglu
Doctoral dissertation, 2018
62018
Social relevance: toward understanding the impact of the individual in an information cascade
RT Hall, JS White, J Fields
Cyber Sensing 2016 9826, 74-82, 2016
62016
An analysis of coupling attacks in high-speed fiber optic networks
JS White, AW Pilbeam
Enabling Photonics Technologies for Defense, Security, and Aerospace …, 2011
62011
A survey of virtualization technologies with performance testing. arXiv. org: Cornell University Library
JS White, AW Pilbeam
URL: http://arxiv. org/pdf/1010.3233. pdf, 2019
42019
The missing pieces: physical layer optical network security
JS White
State University of New York Institute of Technology at Utica/Rome, 2008
42008
Network gateway with enhanced requesting
J McCoy, J White
US Patent 8,265,089, 2012
32012
The Deep Space Network-a technology case study and what improvements to the Deep Space Network are needed to support crewed missions to Mars?
P Falke, L Hash, J Marsh, J White, D Climek, K Kwiat
22017
Connectors, Mavens, Salesmen and More: An Actor-Based Online Social Network (OSN) Analysis Method Using Tensed Predicate Logic
JS White, JN Matthews
SocialInformatics2014, 2014
22014
Security Challenges in SDN Implementation
P Patil, L Hash, J White, A Tekeoglu
12018
系统目前无法执行此操作,请稍后再试。
文章 1–20