Jason L. Wright

Orcid: 0000-0002-6443-1681

According to our database1, Jason L. Wright authored at least 11 papers between 2000 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2013
Analyses of two end-user software vulnerability exposure metrics (extended version).
Inf. Secur. Tech. Rep., 2013

Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Mining Bug Databases for Unidentified Software Vulnerabilities.
Proceedings of the 2012 5th International Conference on Human System Interactions, 2012

Analyses of Two End-User Software Vulnerability Exposure Metrics.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Are Vulnerability Disclosure Deadlines Justified?
Proceedings of the Third International Workshop on Security Measurements and Metrics, 2011

Fuzzy logic based anomaly detection for embedded network security cyber sensor.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Neural network architecture selection analysis with application to cryptography location.
Proceedings of the International Joint Conference on Neural Networks, 2010

2009
Neural Network Approach to Locating Cryptography in Object Code.
Proceedings of 12th IEEE International Conference on Emerging Technologies and Factory Automation, 2009

2006
Cryptography as an operating system service: A case study.
ACM Trans. Comput. Syst., 2006

2003
The Design of the {OpenBSD} Cryptographic Framework.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

2000
Transparent Network Security Policy Enforcement.
Proceedings of the Freenix Track: 2000 USENIX Annual Technical Conference, 2000


  Loading...