Jeffrey Bickford

According to our database1, Jeffrey Bickford authored at least 14 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Firenze: Model Evaluation Using Weak Signals.
Proceedings of the Conference on Applied Machine Learning in Information Security, 2022

2021
Adversarial Robustness with Non-uniform Perturbations.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2016
WhatApp: Modeling mobile applications by domain names.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

2015
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

Detecting Malicious Activity on Smartphones Using Sensor Measurements.
Proceedings of the Network and System Security - 9th International Conference, 2015

Safe Internet Browsing Using a Transparent Virtual Browser.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware.
J. Cyber Secur. Mobil., 2014

2013
What you see predicts what you get - lightweight agent-based malware detection.
Secur. Commun. Networks, 2013

Detecting Targeted Attacks By Multilayer Deception.
J. Cyber Secur. Mobil., 2013

Towards synchronization of live virtual machines among mobile devices.
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications, 2013

2012
Catching the Wily Hacker: A multilayer deception system.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

2011
Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks.
ACM SIGOPS Oper. Syst. Rev., 2011

Security versus energy tradeoffs in host-based mobile malware detection.
Proceedings of the 9th International Conference on Mobile Systems, 2011

2010
Rootkits on smart phones: attacks, implications and opportunities.
Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, 2010


  Loading...