Jeffrey Bickford
Jeffrey Bickford
Amazon Web Services
Verified email at amazon.com
Title
Cited by
Cited by
Year
Rootkits on smart phones: attacks, implications and opportunities
J Bickford, R O'Hare, A Baliga, V Ganapathy, L Iftode
Proceedings of the eleventh workshop on mobile computing systems …, 2010
1922010
Multilayered deception for intrusion detection and prevention
W Wang, Q Shen, AG Forte, JE Bickford
US Patent 8,739,281, 2014
812014
Security versus energy tradeoffs in host-based mobile malware detection
J Bickford, HA Lagar-Cavilla, A Varshavsky, V Ganapathy, L Iftode
Proceedings of the 9th international conference on Mobile systems …, 2011
532011
Traffic backfilling: subsidizing lunch for delay-tolerant applications in UMTS networks
HA Lagar-Cavilla, K Joshi, A Varshavsky, J Bickford, D Parra
Proceedings of the 3rd ACM SOSP Workshop on Networking, Systems, and …, 2011
242011
Detecting Targeted Attacks by Multilayer Deception
W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju
Journal of Cyber Security and Mobility 2 (2), 175-199, 2013
222013
Balancing malware rootkit detection with power consumption on mobile devices
HA Lagar-Cavilla, J Bickford, V Ganapathy, L Iftode, A Varshavsky
US Patent 8,566,935, 2013
202013
Insider attack resistant system and method for cloud services integrity checking
T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart
US Patent App. 10/079,844, 2018
16*2018
Catching the wily hacker: A multilayer deception system
W Wang, J Bickford, I Murynets, R Subbaraman, AG Forte, G Singaraju
2012 35th IEEE Sarnoff Symposium, 1-6, 2012
162012
What you see predicts what you get—lightweight agent‐based malware detection
W Wang, I Murynets, J Bickford, CV Wart, G Xu
Security and Communication Networks 6 (1), 33-48, 2013
152013
Method and apparatus for ranking apps in the wide-open internet
AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ...
US Patent App. 13/540,249, 2014
122014
Secure browsing via a transparent network proxy
P Giura, JE Bickford, DE Hendrix, HF Shirokmann, TA Anschutz, CC Shih
US Patent 9,537,885, 2017
112017
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware
A Baliga, J Bickford, N Daswani
Journal of Cyber Security 3 (2), 1-30, 2014
92014
Cloud-based communication account security
I Murynets, JE Bickford, G De Los Reyes, R Subbaraman, W Wang
US Patent 9,680,843, 2017
62017
Method and apparatus for providing provably secure user input/output
JE Bickford, M Istomin, E Vahlis
US Patent 9,195,838, 2015
62015
Insider attack resistant system and method for cloud services integrity checking
T Jayawardena, JE Bickford, M Istomin, J Liefert, G Singaraju, C Van Wart
US Patent 9,606,854, 2017
52017
Method and apparatus for deriving and using trustful application metadata
AG Forte, B Coskun, Q Shen, I Murynets, J Bickford, M Istomin, P Giura, ...
US Patent 9,449,104, 2016
52016
Towards synchronization of live virtual machines among mobile devices
J Bickford, R Cáceres
Proceedings of the 14th Workshop on Mobile Computing Systems and …, 2013
52013
Rootkits on smart phones: attacks, implications, and energy-aware defense techniques
JE Bickford
Rutgers University-Graduate School-New Brunswick, 2012
52012
Safe internet browsing using a transparent virtual browser
J Bickford, P Giura
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
42015
Providing security through characterizing mobile traffic by domain names
J Bickford, W Wang
US Patent App. 15/217,279, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20