Jill Jermyn

According to our database1, Jill Jermyn authored at least 9 papers between 2014 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Discovering Network Control Vulnerabilities and Policies in Evolving Networks.
PhD thesis, 2017

Autosonda: Discovering Rules and Triggers of Censorship Devices.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

2015
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Towards an evolvable cellular architecture.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Fox in the trap: thwarting masqueraders via automated decoy document deployment.
Proceedings of the Eighth European Workshop on System Security, 2015

Cloud Transformation Analytics Services: A Case Study of Cloud Fitness Validation for Server Migration.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
An Analysis of DoS Attack Strategies Against the LTE RAN.
J. Cyber Secur. Mobil., 2014

Improving readiness for enterprise migration to the cloud.
Proceedings of the Middleware Industry Track, Bordeaux, France, December 8-12, 2014, 2014

Firecycle: A scalable test bed for large-scale LTE security research.
Proceedings of the IEEE International Conference on Communications, 2014


  Loading...