Measurement of the resonant and components in decays R Aaij, B Adeva, M Adinolfi, A Affolder, Z Ajaltouni, J Albrecht, F Alessio, ...
Physical Review D 90 (1), 012003, 2014
274 2014 Curvature perturbation in multi-field inflation with non-minimal coupling J White, M Minamitsuji, M Sasaki
Journal of Cosmology and Astroparticle Physics 2012 (07), 039, 2012
63 2012 Disformal invariance of curvature perturbation H Motohashi, J White
Journal of Cosmology and Astroparticle Physics 2016 (02), 065, 2016
46 2016 Non-linear curvature perturbation in multi-field inflation models with non-minimal coupling J White, M Minamitsuji, M Sasaki
Journal of Cosmology and Astroparticle Physics 2013 (09), 015, 2013
35 2013 Game theoretic attack analysis in online social network (OSN) services J White, JS Park, CA Kamhoua, KA Kwiat
Proceedings of the 2013 ieee/acm international conference on advances in …, 2013
33 2013 Creating personally identifiable honeytokens J White
Innovations and Advances in Computer Sciences and Engineering, 227-232, 2009
28 2009 Scalar suppression on large scales in open inflation J White, Y Zhang, M Sasaki
Physical Review D 90 (8), 083517, 2014
26 2014 Multi-field effects in a simple extension of R2 inflation T Mori, K Kohri, J White
Journal of Cosmology and Astroparticle Physics 2017 (10), 044, 2017
25 2017 Trusted online social network (OSN) services with optimal data management JS Park, KA Kwiat, CA Kamhoua, J White, S Kim
Computers & Security 42, 116-136, 2014
22 2014 Analysis method N Ward, C Mundy, O Kan, R Harris, J White, K Binley, W Rayner, S Naylor, ...
US Patent App. 10/170,385, 2003
22 2003 Implementing PII honeytokens to mitigate against the threat of malicous insiders J White, B Panda
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
19 2009 Multifield formulation of gravitational particle production after inflation Y Watanabe, J White
Physical Review D 92 (2), 023504, 2015
18 2015 Automatic identification of critical data items in a database to mitigate the effects of malicious insiders J White, B Panda
International Conference on Information Systems Security, 208-221, 2009
18 2009 Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. J White, D Thompson
Security and Management, 91-99, 2006
16 2006 Exploiting the hypoxia response. K Binley, O Kan, J White, S Naylor
Current Opinion In Molecular Therapeutics 5 (6), 650-656, 2003
11 2003 Social network attack simulation with honeytokens J White, JS Park, CA Kamhoua, KA Kwiat
Social Network Analysis and Mining 4, 1-14, 2014
9 2014 Insider threat discovery using automatic detection of mission critical data based on content J White, B Panda
2010 Sixth International Conference on Information Assurance and Security, 56-61, 2010
9 2010 Military expert panel report: Sea level rise and the US military’s mission R Keys, J Castellaw, R Parker, AC Phillips, J White, G Galloway
The Center for Climate and Security, 44-45, 2018
8 2018 Reflector markers and systems and methods for identifying and locating them JE Greene, N Rulkov, J White
US Patent 10,499,832, 2019
7 2019 High-frame-rate oil film interferometry JC White
California Polytechnic State University, 2011
6 2011