Seguir
Jonathan M. Spring
Jonathan M. Spring
Cybersecurity and Infrastructure Security Agency
Dirección de correo verificada de cisa.dhs.gov - Página principal
Título
Citado por
Citado por
Año
The long “taile” of typosquatting domain names
J Szurdi, B Kocso, G Cseh, JM Spring, M Felegyhazi, C Kanich
23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA: USENIX …, 2014
2262014
Learning the Associations of MITRE ATT&CK Adversarial Techniques
R Al-Shaer, JM Spring, E Christou
Communications and Network Security, 2020
1482020
Monitoring cloud computing by layer, part 1
JM Spring
Security & Privacy, IEEE 9 (2), 66-68, 2011
1442011
Time to Change the CVSS?
J Spring, E Hatleback, A Householder, A Manion, D Shick
IEEE Security & Privacy 19 (2), 74-78, 2021
83*2021
Towards robust experimental design for user studies in security and privacy
K Krol, JM Spring, S Parkin, MA Sasse
Learning from Authoritative Security Experiment Results (LASER), 2016
712016
Monitoring cloud computing by layer, part 2
JM Spring
IEEE Security & Privacy, 52-55, 2011
572011
Practicing a Science of Security: A Philosophy of Science Perspective
JM Spring, T Moore, D Pym
New Security Paradigms Workshop, 2017
532017
Introduction to Information Security: A Strategic-based Approach
T Shimeall, JM Spring
Newnes, 2013
52*2013
Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014
L Metcalf, JM Spring
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015
482015
Historical Analysis of Exploit Availability Timelines
AD Householder, J Chrabaszcz, T Novelly, D Warren, JM Spring
13th USENIX Workshop on Cyber Security Experimentation and Test, 2020
382020
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, JM Spring, I Becker, S Parkin, MA Sasse
Proc. USEC 2018, 2018
382018
Why Separation Logic Works
D Pym, JM Spring, P O'Hearn
Philosophy & Technology, 2018
332018
Prioritizing Vulnerability Response: A Stakeholder-Specific Vulnerability Categorization
JM Spring, E Hatleback, AD Householder, A Manion, D Shick
Workshop on the Economics of Information Security, 2020
32*2020
Cyber security via signaling games: Toward a science of cyber security
W Casey, JA Morales, T Nguyen, JM Spring, R Weaver, E Wright, ...
Distributed Computing and Internet Technology, 34-42, 2014
322014
Exploring a mechanistic approach to experimentation in computing
E Hatleback, JM Spring
Philosophy & Technology 27 (3), 441-459, 2014
282014
Silk: A tool suite for unsampled network flow analysis at scale
M Thomas, L Metcalf, JM Spring, P Krystosek, K Prevost
Big Data (BigData Congress), 2014 IEEE International Congress on, 184-191, 2014
272014
Review of Human Decision-making during Computer Security Incident Analysis
JM Spring, P Illari
Digital Threats: Research and Practice 2 (2), 1-47, 2021
242021
Accurately measuring global risk of amplification attacks using ampmap
SJ Moon, Y Yin, RA Sharma, Y Yuan, JM Spring, V Sekar
30th USENIX Security Symposium (USENIX Security 21), 2021
232021
On managing vulnerabilities in AI/ML systems
JM Spring, A Galyardt, AD Householder, N VanHoudnos
Proceedings of the New Security Paradigms Workshop 2020, 111-126, 2020
232020
Thinking about intrusion kill chains as mechanisms
JM Spring, E Hatleback
Journal of Cybersecurity 3 (3), 185-197, 2017
232017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20