Bait and snitch: Defending computer systems with decoys JA Voris, J Jermyn, AD Keromytis, S Stolfo | 142 | 2013 |
Resource provisioning planning for enterprise migration and automated application discovery K Bai, J Hwang, JL Jermyn, ME Nidd, M Tacci, M Vukovic US Patent 9,565,129, 2017 | 61 | 2017 |
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks J Jermyn, RP Jover, I Murynets, M Istomin, S Stolfo 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015 | 59 | 2015 |
Fox in the trap: Thwarting masqueraders via automated decoy document deployment J Voris, J Jermyn, N Boggs, S Stolfo Proceedings of the eighth European workshop on system security, 1-7, 2015 | 50 | 2015 |
Determining network security policies during data center migration and detecting security violation K Bai, J Hwang, JL Jermyn, HGV Ramasamy, M Vukovic US Patent 10,015,197, 2018 | 32 | 2018 |
Automated migration planning for moving into a setting of multiple firewalls J Hwang, JL Jermyn, HGV Ramasamy, M Vukovic US Patent 9,515,993, 2016 | 29 | 2016 |
Ensuring regulatory compliance during application migration to cloud-based containers MH Hernandez, JL Jermyn, CA Pickover, M Vukovic US Patent 10,171,310, 2019 | 24 | 2019 |
Optimizing routing and load balancing in an SDN-enabled cloud during enterprise data center migration J Hwang, JL Jermyn, M Vukovic, J Xiao US Patent 9,756,121, 2017 | 23 | 2017 |
An analysis of dos attack strategies against the lte ran J Jermyn, G Salles-Loustau, S Zonouz Journal of Cyber Security and Mobility, 159-180, 2014 | 22 | 2014 |
Improving readiness for enterprise migration to the cloud J Jermyn, J Hwang, K Bai, M Vukovic, N Anerousis, S Stolfo Proceedings of the Middleware Industry Track, 1-7, 2014 | 17 | 2014 |
Autosonda: Discovering rules and triggers of censorship devices J Jermyn, N Weaver 7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17), 2017 | 16 | 2017 |
Firecycle: A scalable test bed for large-scale LTE security research J Jermyn, RP Jover, M Istomin, I Murynets 2014 IEEE International Conference on Communications (ICC), 907-913, 2014 | 11 | 2014 |
Cloud transformation analytics services: a case study of cloud fitness validation for server migration J Hwang, YW Huang, M Vukovic, J Jermyn 2015 IEEE International Conference on Services Computing, 387-394, 2015 | 10 | 2015 |
Discovering network control vulnerabilities and policies in evolving networks J Jermyn Columbia University, 2017 | 2 | 2017 |
Towards an evolvable cellular architecture J Jermyn 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015 | | 2015 |