default search action
Jonathan White
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Alan Mills, Jonathan White, Phil Legg:
GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range. J. Cybersecur. Priv. 4(3): 615-628 (2024) - [c20]Alan Mills, Jonathan White, Phil Legg:
Cyber Funfair: Creating Immersive and Educational Experiences for Teaching Cyber Physical Systems Security. SIGCSE (1) 2024: 847-852 - 2023
- [j8]Alan Mills, Jonathan White, Phil Legg:
Longitudinal risk-based security assessment of docker software container images. Comput. Secur. 135: 103478 (2023) - [j7]Deborah A. Marshall, Toni Tagimacruz, Monica Cepoiu-Martin, Jill Robert, Bernice Ring, Michael Burston, Suzanne Higgins, Monica Hess, Jonathan White:
A Simulation Modelling Study of Referral Distribution Policies in a Centralized Intake System for Surgical Consultation. J. Medical Syst. 47(1): 4 (2023) - [c19]Benjamin Munger, Kathy Wilcox, Jeshuah Sniderman, Chuck Tung, Brett Johnson, Russell Schreiber, Carson Henrion, Kevin Gillespie, Tom Burd, Harry R. Fair III, Dave Johnson, Jonathan White, Scott McLelland, Steven Bakke, Javin Olson, Ryan McCracken, Matthew Pickett, Aaron Horiuchi, Hien Nguyen, Tim Jackson:
"Zen 4": The AMD 5nm 5.7GHz x86-64 Microprocessor Core. ISSCC 2023: 38-39 - 2022
- [c18]Alan Mills, Jonathan White, Phil Legg:
OGMA: Visualisation for Software Container Security Analysis and Automated Remediation. CSR 2022: 76-81 - [c17]Thomas Burd, Wilson Li, James Pistole, Srividhya Venkataraman, Michael McCabe, Timothy Johnson, James Vinh, Thomas Yiu, Mark Wasio, Hon-Hin Wong, Daryl Lieu, Jonathan White, Benjamin Munger, Joshua Lindner, Javin Olson, Steven Bakke, Jeshuah Sniderman, Carson Henrion, Russell Schreiber, Eric Busta, Brett Johnson, Tim Jackson, Aron Miller, Ryan Miller, Matthew Pickett, Aaron Horiuchi, Josef Dvorak, Sabeesh Balagangadharan, Sajeesh Ammikkallingal, Pankaj Kumar:
Zen3: The AMD 2nd-Generation 7nm x86-64 Microprocessor Core. ISSCC 2022: 1-3 - [c16]Erica Isa Mosca, Jonathan White, Edward Steinfeld, Stefano Capolongo:
Designing Hospitals Through the Lens of Universal Design. An Evaluation Tool to Enhance Inclusive Healthcare Facilities. UD 2022: 331-339 - [c15]Jonathan White, Erica Isa Mosca:
Developing Innovative Solutions for Universal Design in Healthcare and Other Sectors. UD 2022: 340-347 - 2021
- [c14]Phil Legg, Thomas Higgs, Pennie Spruhan, Jonathan White, Ian Johnson:
"Hacking an IoT Home": New opportunities for cyber security education combining remote learning with cyber-physical systems. CyberSA 2021: 1-4 - [c13]Jonathan White, Phil Legg:
Unsupervised One-Class Learning for Anomaly Detection on Home IoT Network Devices. CyberSA 2021: 1-8
2010 – 2019
- 2018
- [c12]Ge Jin, Manghui Tu, Tae-Hoon Kim, Justin Heffron, Jonathan White:
Game based Cybersecurity Training for High School Students. SIGCSE 2018: 68-73 - 2016
- [j6]Benjamin Munger, David Akeson, Srikanth Arekapudi, Tom Burd, Harry R. Fair III, Jim Farrell, Dave Johnson, Guhan Krishnan, Hugh McIntyre, Edward McLellan, Samuel Naffziger, Russell Schreiber, Sriram Sundaram, Jonathan White, Kathryn Wilcox:
Carrizo: A High Performance, Energy Efficient 28 nm APU. IEEE J. Solid State Circuits 51(1): 105-116 (2016) - 2015
- [j5]Kathryn Wilcox, Robert Cole, Harry R. Fair III, Kevin Gillespie, Aaron Grenat, Carson Henrion, Ravi Jotwani, Stephen Kosonocky, Benjamin Munger, Samuel Naffziger, Robert S. Orefice, Sanjay Pant, Donald A. Priore, Ravinder Rachala, Jonathan White:
Steamroller Module and Adaptive Clocking System in 28 nm CMOS. IEEE J. Solid State Circuits 50(1): 24-34 (2015) - [c11]Kathryn Wilcox, David Akeson, Harry R. Fair III, Jim Farrell, Dave Johnson, Guhan Krishnan, Hugh McIntyre, Edward McLellan, Samuel Naffziger, Russell Schreiber, Sriram Sundaram, Jonathan White:
4.8 A 28nm x86 APU optimized for power and area efficiency. ISSCC 2015: 1-3 - 2014
- [j4]Joon S. Park, Kevin A. Kwiat, Charles A. Kamhoua, Jonathan White, Sookyung Kim:
Trusted Online Social Network (OSN) services with optimal data management. Comput. Secur. 42: 116-136 (2014) - [j3]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Social network attack simulation with honeytokens. Soc. Netw. Anal. Min. 4(1): 221 (2014) - [c10]Kevin Gillespie, Harry R. Fair III, Carson Henrion, Ravi Jotwani, Stephen V. Kosonocky, Robert S. Orefice, Donald A. Priore, Jonathan White, Kathryn Wilcox:
5.5 Steamroller: An x86-64 core implemented in 28nm bulk CMOS. ISSCC 2014: 104-105 - 2013
- [c9]Jonathan White, Joon S. Park, Charles A. Kamhoua, Kevin A. Kwiat:
Game theoretic attack analysis in online social network (OSN) services. ASONAM 2013: 1012-1019 - 2011
- [c8]Jonathan White, Nilanjan Banerjee:
Mirage: Mitigating illicit inventorying in a RFID enabled retail environment. COMSNETS 2011: 1-9 - [c7]Tim C. Fischer, Srikanth Arekapudi, Eric Busta, Carl Dietz, Michael Golden, Scott Hilker, Aaron Horiuchi, Kevin A. Hurd, Dave Johnson, Hugh McIntyre, Samuel Naffziger, James Vinh, Jonathan White, Kathryn Wilcox:
Design solutions for the Bulldozer 32nm SOI 2-core processor module in an 8-core CPU. ISSCC 2011: 78-80 - 2010
- [j2]David Mulvaney, Jonathan White, Muna Hamdi:
Elevator Dispatching Using Heuristic Search. Intell. Autom. Soft Comput. 16(1): 77-87 (2010) - [c6]Jonathan White, Brajendra Panda:
Insider threat discovery using automatic detection of mission critical data based on content. IAS 2010: 56-61 - [i1]Jonathan White, Nilanjan Banerjee:
Mirage: Mitigating Illicit Inventorying in a RFID Enabled Retail Environment. CoRR abs/1006.5502 (2010)
2000 – 2009
- 2009
- [c5]Jonathan White, Brajendra Panda:
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. ICISS 2009: 208-221 - [c4]Jonathan White, Brajendra Panda:
Implementing PII honeytokens to mitigate against the threat of malicous insiders. ISI 2009: 233 - [c3]Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li:
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. WOSIS 2009: 93-102 - 2008
- [j1]Shu-Yi Su, Jonathan White, David J. Balding, Lachlan J. M. Coin:
Inference of haplotypic phase and missing genotypes in polyploid organisms and variable copy number genomic regions. BMC Bioinform. 9 (2008) - [c2]Jonathan White:
Creating Personally Identifiable Honeytokens. SCSS (1) 2008: 227-232 - 2006
- [c1]Jonathan White, Dale Thompson:
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. Security and Management 2006: 91-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint