Follow
Jeffrey Bickford
Jeffrey Bickford
Amazon Web Services
Verified email at amazon.com
Title
Cited by
Cited by
Year
Rootkits on smart phones: attacks, implications and opportunities
J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode
Proceedings of the eleventh workshop on mobile computing systems …, 2010
2262010
Multilayered deception for intrusion detection and prevention
W Wang, Q Shen, AG Forte, JE Bickford
US Patent 8,739,281, 2014
1242014
Security versus energy tradeoffs in host-based mobile malware detection
J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode
Proceedings of the 9th international conference on Mobile systems …, 2011
612011
Secure browsing via a transparent network proxy
P Giura, JE Bickford, DE Hendrix, HF Shirokmann, TA Anschutz, CC Shih
US Patent 9,537,885, 2017
352017
Detecting Targeted Attacks by Multilayer Deception
W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju
Journal of Cyber Security and Mobility 2 (2), 175-199, 2013
272013
Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks
HA Lagar-Cavilla, K Joshi, A Varshavsky, J Bickford, D Parra
Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and …, 2011
252011
Balancing malware rootkit detection with power consumption on mobile devices
HA Lagar-Cavilla, J Bickford, V Ganapathy, L Iftode, A Varshavsky
US Patent 8,566,935, 2013
232013
Catching the wily hacker: A multilayer deception system
W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju
2012 35th IEEE Sarnoff Symposium, 1-6, 2012
232012
What you see predicts what you get—lightweight agent‐based malware detection
W Wang, I Murynets, J Bickford, CV Wart, G Xu
Security and Communication Networks 6 (1), 33-48, 2013
222013
Method and apparatus for ranking apps in the wide-open internet
AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ...
US Patent App. 13/540,249, 2014
192014
Insider attack resistant system and method for cloud services integrity checking
T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart
US Patent 9,606,854, 2017
172017
Insider attack resistant system and method for cloud services integrity checking
T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart
US Patent App. 10/079,844, 2018
16*2018
Cloud-based communication account security
I Murynets, JE Bickford, G De Los Reyes, R Subbaraman, W Wang
US Patent 9,680,843, 2017
152017
Detecting altered applications using network traffic data
W Wang, JE Bickford
US Patent 8,973,139, 2015
142015
Providing security through characterizing mobile traffic by domain names
J Bickford, W Wang
US Patent App. 15/217,279, 2018
122018
Method and apparatus for providing provably secure user input/output
JE Bickford, M Istomin, E Vahlis
US Patent 9,195,838, 2015
102015
Safe internet browsing using a transparent virtual browser
J Bickford, P Giura
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
92015
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware
A Baliga, J Bickford, N Daswani
Journal of Cyber Security 3 (2), 1-30, 2014
92014
Method and apparatus for robust mobile application fingerprinting
AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ...
US Patent App. 13/540,307, 2014
92014
Methods, systems, and computer program products for protecting a communication network against internet enabled cyber attacks through use of screen replication from controlled …
P Giura, JE Bickford, G De Los Reyes
US Patent 9,258,324, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20