Jill Jermyn
Jill Jermyn
Verified email at cs.columbia.edu
Cited by
Cited by
Bait and snitch: Defending computer systems with decoys
JA Voris, J Jermyn, AD Keromytis, S Stolfo
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks
J Jermyn, RP Jover, I Murynets, M Istomin, S Stolfo
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
Fox in the trap: Thwarting masqueraders via automated decoy document deployment
J Voris, J Jermyn, N Boggs, S Stolfo
Proceedings of the Eighth European Workshop on System Security, 1-7, 2015
Resource provisioning planning for enterprise migration and automated application discovery
K Bai, J Hwang, JL Jermyn, ME Nidd, M Tacci, M Vukovic
US Patent 9,565,129, 2017
Bicycle wheel rim for mounting a bicycle tire without an inner tire body
CY Chen
US Patent 6,502,906, 2003
Vehicle occupant side crash protection system
Y Motozawa
US Patent 6,592,166, 2003
An analysis of dos attack strategies against the lte ran
J Jermyn, G Salles-Loustau, S Zonouz
Journal of Cyber Security and Mobility 3 (2), 159-180, 2014
Improving readiness for enterprise migration to the cloud
J Jermyn, J Hwang, K Bai, M Vukovic, N Anerousis, S Stolfo
Proceedings of the Middleware Industry Track, 1-7, 2014
Cloud transformation analytics services: a case study of cloud fitness validation for server migration
J Hwang, YW Huang, M Vukovic, J Jermyn
2015 IEEE International Conference on Services Computing, 387-394, 2015
Optimizing routing and load balancing in an SDN-enabled cloud during enterprise data center migration
J Hwang, JL Jermyn, M Vukovic, J Xiao
US Patent 9,756,121, 2017
Firecycle: A scalable test bed for large-scale LTE security research
J Jermyn, RP Jover, M Istomin, I Murynets
2014 IEEE International Conference on Communications (ICC), 907-913, 2014
Autosonda: Discovering rules and triggers of censorship devices
J Jermyn, N Weaver
7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2017
Making software more reliable by uncovering hidden dependencies
JS Bell
Columbia University, 2016
Discovering Network Control Vulnerabilities and Policies in Evolving Networks
JL Jermyn
Columbia University, 2017
Automated migration planning for moving into a setting of multiple firewalls
J Hwang, JL Jermyn, HGV Ramasamy, M Vukovic
US Patent 9,515,993, 2016
Towards an evolvable cellular architecture
J Jermyn
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
The system can't perform the operation now. Try again later.
Articles 1–16