Jonathan M. Spring

Orcid: 0000-0001-9356-219X

According to our database1, Jonathan M. Spring authored at least 20 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications.
CoRR, 2023

An analysis of how many undiscovered vulnerabilities remain in information systems.
Comput. Secur., 2023

2021
Time to Change the CVSS?
IEEE Secur. Priv., 2021

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.
Proceedings of the 30th USENIX Security Symposium, 2021

Using Science in Cybersecurity
WorldScientific, ISBN: 9789811235870, 2021

2020
Historical Analysis of Exploit Availability Timelines.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

On managing vulnerabilities in AI/ML systems.
Proceedings of the NSPW '20: New Security Paradigms Workshop 2020, 2020

Learning the Associations of MITRE ATT & CK Adversarial Techniques.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Review of human decision-making during computer security incident analysis.
CoRR, 2019

Why Jenny can't figure out which of these messages is a covert information operation.
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019

2018
Towards Scientific Incident Response.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2017
Thinking about intrusion kill chains as mechanisms.
J. Cybersecur., 2017

Practicing a Science of Security: A Philosophy of Science Perspective.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

2015
Global adversarial capability modeling.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014.
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, 2015

2014
The Long "Taile" of Typosquatting Domain Names.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Cyber Security via Signaling Games: Toward a Science of Cyber Security.
Proceedings of the Distributed Computing and Internet Technology, 2014

SiLK: A Tool Suite for Unsampled Network Flow Analysis at Scale.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
Modeling malicious domain name take-down dynamics: Why eCrime pays.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

A notation for describing the steps in indicator expansion.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013


  Loading...