Fuzzy logic based anomaly detection for embedded network security cyber sensor O Linda, M Manic, T Vollmer, J Wright 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011 | 88 | 2011 |
Mining bug databases for unidentified software vulnerabilities D Wijayasekara, M Manic, JL Wright, M McQueen Human System Interactions (HSI), 2012 5th International Conference on, 89-96, 2012 | 82 | 2012 |
Transparent Network Security Policy Enforcement. AD Keromytis, JL Wright USENIX Annual Technical Conference, FREENIX Track, 215-226, 2000 | 68 | 2000 |
The design of the OpenBSD cryptographic framework AD Keromytis, JL Wright, T Raadt | 58 | 2003 |
Neural network architecture selection analysis with application to cryptography location JL Wright, M Manic The 2010 International Joint Conference on Neural Networks (IJCNN), 1-6, 2010 | 29 | 2010 |
Neural network approach to locating cryptography in object code JL Wright, M Manic Emerging Technologies & Factory Automation, 2009. ETFA 2009. IEEE Conference …, 2009 | 21 | 2009 |
Cryptography as an operating system service: A case study AD Keromytis, JL Wright, TD Raadt, M Burnside ACM Transactions on Computer Systems (TOCS) 24 (1), 1-38, 2006 | 17 | 2006 |
Estimating software vulnerabilities: A case study based on the misclassification of bugs in MySQL server JL Wright, JW Larsen, M McQueen 2013 International Conference on Availability, Reliability and Security, 72-81, 2013 | 14 | 2013 |
Analyses of two end-user software vulnerability exposure metrics (extended version) JL Wright, M McQueen, L Wellman Information Security Technical Report 17 (4), 173-184, 2013 | 14 | 2013 |
Are vulnerability disclosure deadlines justified? M McQueen, JL Wright, L Wellman 2011 Third International Workshop on Security Measurements and Metrics, 96-101, 2011 | 13 | 2011 |
The analysis of dimensionality reduction techniques in cryptographic object code classification JL Wright, M Manic 3rd International Conference on Human System Interaction, 157-162, 2010 | 11 | 2010 |
Software vulnerabilities: lifespans, metrics, and case study JL Wright University of Idaho, 2014 | 8 | 2014 |
Analyses of two end-user software vulnerability exposure metrics JL Wright, M McQueen, L Wellman Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012 | 6 | 2012 |
Where am I? Operating System And Virtualization Identification Without System Calls JL Wright Cyber Security Symposium, 2017 | 5 | 2017 |
Time synchronization in hierarchical TESLA wireless sensor networks JL Wright, M Manic 2009 2nd International Symposium on Resilient Control Systems, 36-39, 2009 | 4 | 2009 |
Experiences enhancing open source security in the posse project JM Smith, MB Greenwald, S Ioannidis, AD Keromytis, D Rahn, J Wright Free/open source software development, 242-257, 2005 | 4 | 2005 |
Finding cryptography in object code JL Wright Security Education Conference Toronto (SecTOR), 2008 | 3 | 2008 |
Operating System Doppelgängers: The Creation of Indistinguishable, Deterministic Environments JL Wright, C Eagle, T Vidas BSD Magazine 12 (12), 2018 | 2 | 2018 |
Recommended practice for securing control system modems JR Davidson, JL Wright Idaho National Laboratory (INL), 2008 | 2 | 2008 |
Transparent Network Security Policy Enforcement JL Wright 2000 {USENIX} Annual Technical Conference ({USENIX}{ATC} 00), 2000 | 2 | 2000 |