Jill Jermyn
Jill Jermyn
Verified email at cs.columbia.edu
Title
Cited by
Cited by
Year
Bait and snitch: Defending computer systems with decoys
JA Voris, J Jermyn, AD Keromytis, S Stolfo
832013
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks
J Jermyn, RP Jover, I Murynets, M Istomin, S Stolfo
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
512015
Fox in the trap: Thwarting masqueraders via automated decoy document deployment
J Voris, J Jermyn, N Boggs, S Stolfo
Proceedings of the Eighth European Workshop on System Security, 1-7, 2015
272015
Vehicle occupant side crash protection system
Y Motozawa
US Patent 6,592,166, 2003
25*2003
Resource provisioning planning for enterprise migration and automated application discovery
K Bai, J Hwang, JL Jermyn, ME Nidd, M Tacci, M Vukovic
US Patent 9,565,129, 2017
232017
Determining network security policies during data center migration and detecting security violation
K Bai, J Hwang, JL Jermyn, HV Ramasamy, M Vukovic
US Patent 10,015,197, 2018
21*2018
An analysis of dos attack strategies against the lte ran
J Jermyn, G Salles-Loustau, S Zonouz
Journal of Cyber Security and Mobility, 159–180-159–180, 2014
172014
Improving readiness for enterprise migration to the cloud
J Jermyn, J Hwang, K Bai, M Vukovic, N Anerousis, S Stolfo
Proceedings of the Middleware Industry Track, 1-7, 2014
152014
Optimizing routing and load balancing in an SDN-enabled cloud during enterprise data center migration
J Hwang, JL Jermyn, M Vukovic, J Xiao
US Patent 9,756,121, 2017
102017
Cloud transformation analytics services: a case study of cloud fitness validation for server migration
J Hwang, YW Huang, M Vukovic, J Jermyn
2015 IEEE International Conference on Services Computing, 387-394, 2015
102015
Firecycle: A scalable test bed for large-scale LTE security research
J Jermyn, RP Jover, M Istomin, I Murynets
2014 IEEE International Conference on Communications (ICC), 907-913, 2014
82014
Autosonda: Discovering rules and triggers of censorship devices
J Jermyn, N Weaver
7th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI …, 2017
52017
Making software more reliable by uncovering hidden dependencies
JS Bell
Columbia University, 2016
32016
Discovering Network Control Vulnerabilities and Policies in Evolving Networks
JL Jermyn
Columbia University, 2017
2017
Automated migration planning for moving into a setting of multiple firewalls
J Hwang, JL Jermyn, HV Ramasamy, M Vukovic
US Patent 9,515,993, 2016
2016
Towards an evolvable cellular architecture
J Jermyn
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
2015
2 Related Work
J Jermyn, G Salles-Loustau, S Zonouz
Journal of Cyber Security 3 (2), 159-180, 0
The system can't perform the operation now. Try again later.
Articles 1–17