Rootkits on smart phones: attacks, implications and opportunities J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode Proceedings of the eleventh workshop on mobile computing systems …, 2010 | 226 | 2010 |
Multilayered deception for intrusion detection and prevention W Wang, Q Shen, AG Forte, JE Bickford US Patent 8,739,281, 2014 | 124 | 2014 |
Security versus energy tradeoffs in host-based mobile malware detection J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode Proceedings of the 9th international conference on Mobile systems …, 2011 | 61 | 2011 |
Secure browsing via a transparent network proxy P Giura, JE Bickford, DE Hendrix, HF Shirokmann, TA Anschutz, CC Shih US Patent 9,537,885, 2017 | 35 | 2017 |
Detecting Targeted Attacks by Multilayer Deception W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju Journal of Cyber Security and Mobility 2 (2), 175-199, 2013 | 27 | 2013 |
Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks HA Lagar-Cavilla, K Joshi, A Varshavsky, J Bickford, D Parra Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and …, 2011 | 25 | 2011 |
Balancing malware rootkit detection with power consumption on mobile devices HA Lagar-Cavilla, J Bickford, V Ganapathy, L Iftode, A Varshavsky US Patent 8,566,935, 2013 | 23 | 2013 |
Catching the wily hacker: A multilayer deception system W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju 2012 35th IEEE Sarnoff Symposium, 1-6, 2012 | 23 | 2012 |
What you see predicts what you get—lightweight agent‐based malware detection W Wang, I Murynets, J Bickford, CV Wart, G Xu Security and Communication Networks 6 (1), 33-48, 2013 | 22 | 2013 |
Method and apparatus for ranking apps in the wide-open internet AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,249, 2014 | 19 | 2014 |
Insider attack resistant system and method for cloud services integrity checking T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart US Patent 9,606,854, 2017 | 17 | 2017 |
Insider attack resistant system and method for cloud services integrity checking T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart US Patent App. 10/079,844, 2018 | 16* | 2018 |
Cloud-based communication account security I Murynets, JE Bickford, G De Los Reyes, R Subbaraman, W Wang US Patent 9,680,843, 2017 | 15 | 2017 |
Detecting altered applications using network traffic data W Wang, JE Bickford US Patent 8,973,139, 2015 | 14 | 2015 |
Providing security through characterizing mobile traffic by domain names J Bickford, W Wang US Patent App. 15/217,279, 2018 | 12 | 2018 |
Method and apparatus for providing provably secure user input/output JE Bickford, M Istomin, E Vahlis US Patent 9,195,838, 2015 | 10 | 2015 |
Safe internet browsing using a transparent virtual browser J Bickford, P Giura 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 9 | 2015 |
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware A Baliga, J Bickford, N Daswani Journal of Cyber Security 3 (2), 1-30, 2014 | 9 | 2014 |
Method and apparatus for robust mobile application fingerprinting AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ... US Patent App. 13/540,307, 2014 | 9 | 2014 |
Methods, systems, and computer program products for protecting a communication network against internet enabled cyber attacks through use of screen replication from controlled … P Giura, JE Bickford, G De Los Reyes US Patent 9,258,324, 2016 | 7 | 2016 |