Follow
Josh S. White
Josh S. White
Faculty - SUNYIT NY's Polytechnic Institute
Verified email at sunyit.edu - Homepage
Title
Cited by
Cited by
Year
Network communication system with improved security
J McCoy, J White
US Patent 9,118,712, 2015
2962015
Quantitative analysis of intrusion detection systems: Snort and Suricata
JS White, T Fitzsimmons, JN Matthews
Cyber sensing 2013 8757, 10-21, 2013
1122013
Fake Twitter accounts: profile characteristics obtained using an activity-based pattern detection approach
S Gurajala, JS White, B Hudson, JN Matthews
Proceedings of the 2015 international conference on social media & society, 1-7, 2015
982015
Profile characteristics of fake Twitter accounts
S Gurajala, JS White, B Hudson, BR Voter, JN Matthews
Big Data & Society 3 (2), 2053951716674236, 2016
902016
A survey of virtualization technologies with performance testing
J White, A Pilbeam
arXiv preprint arXiv:1010.3233, 2010
412010
A method for the automated detection phishing websites through both site characteristics and image analysis
JS White, JN Matthews, JL Stacy
Cyber Sensing 2012 8408, 111-121, 2012
262012
Coalmine: an experience in building a system for social media analytics
JS White, JN Matthews, JL Stacy
Cyber Sensing 2012 8408, 100-110, 2012
122012
Dynamic malware analysis using IntroVirt: a modified hypervisor-based system
JS White, SR Pape, AT Meily, RM Gloo
Cyber Sensing 2013 8757, 71-76, 2013
82013
Profile characteristics of fake twitter accounts
JN Matthews, BR Voter, B Hudson, JS White, S Gurajala
72016
It’s you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit
JS White, JN Matthews
72013
A method for the automated detection phishing websites through both site characteristics and image analysis Cyber Sensing 2012; vol. 8408
JS White, JN Matthews, JL Stacy
International Society for Optics and Photonics 2012, 2012
72012
Social relevance: toward understanding the impact of the individual in an information cascade
RT Hall, JS White, J Fields
Cyber Sensing 2016 9826, 74-82, 2016
62016
An analysis of coupling attacks in high-speed fiber optic networks
JS White, AW Pilbeam
Enabling Photonics Technologies for Defense, Security, and Aerospace …, 2011
62011
A survey of virtualization technologies with performance testing. arXiv. org: Cornell University Library
JS White, AW Pilbeam
URL: http://arxiv. org/pdf/1010.3233. pdf, 2019
42019
Social media Emoji analysis, correlations and trust modeling
M Preisendorfer, S Sengupta, J White, A Tekeoglu
42018
The missing pieces: physical layer optical network security
JS White
State University of New York Institute of Technology at Utica/Rome, 2008
42008
Network gateway with enhanced requesting
J McCoy, J White
US Patent 8,265,089, 2012
32012
The Deep Space Network-a technology case study and what improvements to the Deep Space Network are needed to support crewed missions to Mars?
P Falke, L Hash, J Marsh, J White, D Climek, K Kwiat
22017
Security Challenges in SDN Implementation
P Patil, L Hash, J White, A Tekeoglu
12018
Hybrid sentiment analysis utilizing multiple indicators to determine temporal shifts of opinion in OSNs
JS White, RT Hall, J Fields, HM White
Cyber Sensing 2016 9826, 67-73, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20