Learning from the ones that got away: Detecting new forms of phishing attacks CN Gutierrez, T Kim, R Della Corte, J Avery, D Goldwasser, M Cinque, ... IEEE Transactions on Dependable and Secure Computing 15 (6), 988-1001, 2018 | 97 | 2018 |
Ghost patches: Fake patches for fake vulnerabilities J Avery, EH Spafford ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017 | 20 | 2017 |
Modeling deception in information security as a hypergame–a primer CN Gutierrez, S Bagchi, H Mohammed, J Avery Proceedings of the 16th Annual Information Security Symposium, 41, 2015 | 14 | 2015 |
Offensive deception in computing J Avery, M Almeshekah, E Spafford International Conference on Cyber Warfare and Security, 23, 2017 | 11 | 2017 |
Mitigating data exfiltration in storage-as-a-service clouds D Wilson, J Avery arXiv preprint arXiv:1606.08378, 2016 | 10 | 2016 |
Formally modeling deceptive patches using a game-based approach J Avery, JR Wallrabenstein Computers & Security 75, 182-190, 2018 | 8 | 2018 |
Inhibiting and detecting offline password cracking using ErsatzPasswords CN Gutierrez, MH Almeshekah, EH Spafford, MJ Atallah, J Avery ACM Transactions on Privacy and Security (TOPS) 19 (3), 1-30, 2016 | 5 | 2016 |
Experimental designs: Testing a debugging oracle assistant EH Spafford, C Viravan Technical Report SERC-TR-120-P, Software Engineering Research Center, Purdue …, 1992 | 4 | 1992 |
The Application of Deception to Software Security Patching JK Avery Purdue University, 2017 | 2 | 2017 |
Snipe: signature generation for phishing emails J Avery, C Gutierrez, P Wood, RD Corte, JFG Modelo-Howard, B Berndt, ... Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015 | 1 | 2015 |
Mitigating Data Exfiltration in SaaS Clouds D Wilson, J Avery Journal of Business, Technology and Leadership 1 (1), 9-9, 2019 | | 2019 |
Deception in computing: where and how it has been used J Avery, C Guterriez, M Almeshekah, S Bagchi, EH Spafford Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015 | | 2015 |
pSigene: generalizing attack signatures J Avery, G Modelo-Howard, F Arshad, S Bagchi, Y Qi Proceedings of the 15th Annual Information Security Symposium, 1-1, 2014 | | 2014 |
Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON Jeffrey Avery, PhD, Bryson Fraelich, William Duran, Andrew Lee, Agustin ZM Sullivan, MB Birrer, S Dick, J Cochran | | |
2018 Index IEEE Transactions on Dependable and Secure Computing Vol. 15 A Abbas, S Aditham, G Ahn, NZ Aitzhan, M Al-Qurishi, A Alamri, ... | | |