Volgen
Jeffrey Bickford
Jeffrey Bickford
Amazon Web Services
Geverifieerd e-mailadres voor amazon.com
Titel
Geciteerd door
Geciteerd door
Jaar
Rootkits on smart phones: attacks, implications and opportunities
J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode
Proceedings of the eleventh workshop on mobile computing systems …, 2010
2212010
Multilayered deception for intrusion detection and prevention
W Wang, Q Shen, AG Forte, JE Bickford
US Patent 8,739,281, 2014
1232014
Security versus energy tradeoffs in host-based mobile malware detection
J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode
Proceedings of the 9th international conference on Mobile systems …, 2011
592011
Detecting Targeted Attacks by Multilayer Deception
W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju
Journal of Cyber Security and Mobility 2 (2), 175-199, 2013
272013
Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks
HA Lagar-Cavilla, K Joshi, A Varshavsky, J Bickford, D Parra
Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and …, 2011
252011
Balancing malware rootkit detection with power consumption on mobile devices
HA Lagar-Cavilla, J Bickford, V Ganapathy, L Iftode, A Varshavsky
US Patent 8,566,935, 2013
232013
What you see predicts what you get—lightweight agent‐based malware detection
W Wang, I Murynets, J Bickford, CV Wart, G Xu
Security and Communication Networks 6 (1), 33-48, 2013
222013
Catching the wily hacker: A multilayer deception system
W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju
2012 35th IEEE Sarnoff Symposium, 1-6, 2012
212012
Method and apparatus for ranking apps in the wide-open internet
AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ...
US Patent App. 13/540,249, 2014
192014
Insider attack resistant system and method for cloud services integrity checking
T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart
US Patent 9,606,854, 2017
172017
Insider attack resistant system and method for cloud services integrity checking
T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart
US Patent App. 10/079,844, 2018
16*2018
Cloud-based communication account security
I Murynets, JE Bickford, G De Los Reyes, R Subbaraman, W Wang
US Patent 9,680,843, 2017
152017
Detecting altered applications using network traffic data
W Wang, JE Bickford
US Patent 8,973,139, 2015
142015
Method and apparatus for providing provably secure user input/output
JE Bickford, M Istomin, E Vahlis
US Patent 9,195,838, 2015
102015
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware
A Baliga, J Bickford, N Daswani
Journal of Cyber Security 3 (2), 1-30, 2014
92014
Method and apparatus for robust mobile application fingerprinting
AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ...
US Patent App. 13/540,307, 2014
92014
Safe internet browsing using a transparent virtual browser
J Bickford, P Giura
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
82015
Methods, systems, and computer program products for protecting a communication network against internet enabled cyber attacks through use of screen replication from controlled …
P Giura, JE Bickford, G De Los Reyes
US Patent 9,258,324, 2016
72016
Towards synchronization of live virtual machines among mobile devices
J Bickford, R Cáceres
Proceedings of the 14th Workshop on Mobile Computing Systems and …, 2013
62013
Rootkits on smart phones: attacks, implications, and energy-aware defense techniques
JE Bickford
Rutgers University-Graduate School-New Brunswick, 2012
52012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20