Jonathan White

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
Longitudinal risk-based security assessment of docker software container images.
Comput. Secur., December, 2023

A Simulation Modelling Study of Referral Distribution Policies in a Centralized Intake System for Surgical Consultation.
J. Medical Syst., 2023


2022
Developing Innovative Solutions for Universal Design in Healthcare and Other Sectors.
Proceedings of the Transforming our World through Universal Design for Human Development - Proceedings of the Sixth International Conference on Universal Design (UD 2022), Brescia, Italy, 7, 2022

Designing Hospitals Through the Lens of Universal Design. An Evaluation Tool to Enhance Inclusive Healthcare Facilities.
Proceedings of the Transforming our World through Universal Design for Human Development - Proceedings of the Sixth International Conference on Universal Design (UD 2022), Brescia, Italy, 7, 2022


OGMA: Visualisation for Software Container Security Analysis and Automated Remediation.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

"Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems.
Proceedings of the International Conference on Cyber Situational Awareness, 2021

2018
Game based Cybersecurity Training for High School Students.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

2016
Carrizo: A High Performance, Energy Efficient 28 nm APU.
IEEE J. Solid State Circuits, 2016

2015
Steamroller Module and Adaptive Clocking System in 28 nm CMOS.
IEEE J. Solid State Circuits, 2015

4.8 A 28nm x86 APU optimized for power and area efficiency.
Proceedings of the 2015 IEEE International Solid-State Circuits Conference, 2015

2014
Social network attack simulation with honeytokens.
Soc. Netw. Anal. Min., 2014

Trusted Online Social Network (OSN) services with optimal data management.
Comput. Secur., 2014

5.5 Steamroller: An x86-64 core implemented in 28nm bulk CMOS.
Proceedings of the 2014 IEEE International Conference on Solid-State Circuits Conference, 2014

2013
Game theoretic attack analysis in online social network (OSN) services.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2011
Design solutions for the Bulldozer 32nm SOI 2-core processor module in an 8-core CPU.
Proceedings of the IEEE International Solid-State Circuits Conference, 2011

Mirage: Mitigating illicit inventorying in a RFID enabled retail environment.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

2010
Elevator Dispatching Using Heuristic Search.
Intell. Autom. Soft Comput., 2010

Insider threat discovery using automatic detection of mission critical data based on content.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation.
Proceedings of the Security in Information Systems, 2009

Implementing PII honeytokens to mitigate against the threat of malicous insiders.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders.
Proceedings of the Information Systems Security, 5th International Conference, 2009

2008
Inference of haplotypic phase and missing genotypes in polyploid organisms and variable copy number genomic regions.
BMC Bioinform., 2008

Creating Personally Identifiable Honeytokens.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008

2006
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security.
Proceedings of the 2006 International Conference on Security & Management, 2006


  Loading...