Jill Jermyn
Jill Jermyn
Verified email at cs.columbia.edu
Title
Cited by
Cited by
Year
Bait and snitch: Defending computer systems with decoys
JA Voris, J Jermyn, AD Keromytis, S Stolfo
862013
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks
J Jermyn, RP Jover, I Murynets, M Istomin, S Stolfo
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
532015
Fox in the trap: Thwarting masqueraders via automated decoy document deployment
J Voris, J Jermyn, N Boggs, S Stolfo
Proceedings of the Eighth European Workshop on System Security, 1-7, 2015
282015
Vehicle occupant side crash protection system
Y Motozawa
US Patent 6,592,166, 2003
25*2003
Resource provisioning planning for enterprise migration and automated application discovery
K Bai, J Hwang, JL Jermyn, ME Nidd, M Tacci, M Vukovic
US Patent 9,565,129, 2017
242017
Determining network security policies during data center migration and detecting security violation
K Bai, J Hwang, JL Jermyn, HGV Ramasamy, M Vukovic
US Patent 10,015,197, 2018
21*2018
An analysis of dos attack strategies against the lte ran
J Jermyn, G Salles-Loustau, S Zonouz
Journal of Cyber Security and Mobility, 159–180-159–180, 2014
182014
Improving readiness for enterprise migration to the cloud
J Jermyn, J Hwang, K Bai, M Vukovic, N Anerousis, S Stolfo
Proceedings of the Middleware Industry Track, 1-7, 2014
152014
Optimizing routing and load balancing in an SDN-enabled cloud during enterprise data center migration
J Hwang, JL Jermyn, M Vukovic, J Xiao
US Patent 9,756,121, 2017
132017
Cloud transformation analytics services: a case study of cloud fitness validation for server migration
J Hwang, YW Huang, M Vukovic, J Jermyn
2015 IEEE International Conference on Services Computing, 387-394, 2015
102015
Firecycle: A scalable test bed for large-scale LTE security research
J Jermyn, RP Jover, M Istomin, I Murynets
2014 IEEE International Conference on Communications (ICC), 907-913, 2014
92014
Autosonda: Discovering rules and triggers of censorship devices
J Jermyn, N Weaver
7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2017
72017
Making software more reliable by uncovering hidden dependencies
JS Bell
Columbia University, 2016
32016
Discovering Network Control Vulnerabilities and Policies in Evolving Networks
J Jermyn
Columbia University, 2017
2017
Automated migration planning for moving into a setting of multiple firewalls
J Hwang, JL Jermyn, HGV Ramasamy, M Vukovic
US Patent 9,515,993, 2016
2016
Towards an evolvable cellular architecture
J Jermyn
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
2015
2 Related Work
J Jermyn, G Salles-Loustau, S Zonouz
Journal of Cyber Security 3 (2), 159-180, 0
The system can't perform the operation now. Try again later.
Articles 1–17