Follow
Jason Wright
Jason Wright
Thought Networks
Verified email at thought.net - Homepage
Title
Cited by
Cited by
Year
Fuzzy logic based anomaly detection for embedded network security cyber sensor
O Linda, M Manic, T Vollmer, J Wright
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
882011
Mining bug databases for unidentified software vulnerabilities
D Wijayasekara, M Manic, JL Wright, M McQueen
Human System Interactions (HSI), 2012 5th International Conference on, 89-96, 2012
822012
Transparent Network Security Policy Enforcement.
AD Keromytis, JL Wright
USENIX Annual Technical Conference, FREENIX Track, 215-226, 2000
682000
The design of the OpenBSD cryptographic framework
AD Keromytis, JL Wright, T Raadt
582003
Neural network architecture selection analysis with application to cryptography location
JL Wright, M Manic
The 2010 International Joint Conference on Neural Networks (IJCNN), 1-6, 2010
292010
Neural network approach to locating cryptography in object code
JL Wright, M Manic
Emerging Technologies & Factory Automation, 2009. ETFA 2009. IEEE Conference …, 2009
212009
Cryptography as an operating system service: A case study
AD Keromytis, JL Wright, TD Raadt, M Burnside
ACM Transactions on Computer Systems (TOCS) 24 (1), 1-38, 2006
172006
Estimating software vulnerabilities: A case study based on the misclassification of bugs in MySQL server
JL Wright, JW Larsen, M McQueen
2013 International Conference on Availability, Reliability and Security, 72-81, 2013
142013
Analyses of two end-user software vulnerability exposure metrics (extended version)
JL Wright, M McQueen, L Wellman
Information Security Technical Report 17 (4), 173-184, 2013
142013
Are vulnerability disclosure deadlines justified?
M McQueen, JL Wright, L Wellman
2011 Third International Workshop on Security Measurements and Metrics, 96-101, 2011
132011
The analysis of dimensionality reduction techniques in cryptographic object code classification
JL Wright, M Manic
3rd International Conference on Human System Interaction, 157-162, 2010
112010
Software vulnerabilities: lifespans, metrics, and case study
JL Wright
University of Idaho, 2014
82014
Analyses of two end-user software vulnerability exposure metrics
JL Wright, M McQueen, L Wellman
Availability, Reliability and Security (ARES), 2012 Seventh International …, 2012
62012
Where am I? Operating System And Virtualization Identification Without System Calls
JL Wright
Cyber Security Symposium, 2017
52017
Time synchronization in hierarchical TESLA wireless sensor networks
JL Wright, M Manic
2009 2nd International Symposium on Resilient Control Systems, 36-39, 2009
42009
Experiences enhancing open source security in the posse project
JM Smith, MB Greenwald, S Ioannidis, AD Keromytis, D Rahn, J Wright
Free/open source software development, 242-257, 2005
42005
Finding cryptography in object code
JL Wright
Security Education Conference Toronto (SecTOR), 2008
32008
Operating System Doppelgängers: The Creation of Indistinguishable, Deterministic Environments
JL Wright, C Eagle, T Vidas
BSD Magazine 12 (12), 2018
22018
Recommended practice for securing control system modems
JR Davidson, JL Wright
Idaho National Laboratory (INL), 2008
22008
Transparent Network Security Policy Enforcement
JL Wright
2000 {USENIX} Annual Technical Conference ({USENIX}{ATC} 00), 2000
22000
The system can't perform the operation now. Try again later.
Articles 1–20