Follow
Jeff Avery
Jeff Avery
Verified email at purdue.edu
Title
Cited by
Cited by
Year
Learning from the ones that got away: Detecting new forms of phishing attacks
CN Gutierrez, T Kim, R Della Corte, J Avery, D Goldwasser, M Cinque, ...
IEEE Transactions on Dependable and Secure Computing 15 (6), 988-1001, 2018
862018
Ghost patches: Fake patches for fake vulnerabilities
J Avery, EH Spafford
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
192017
Modeling deception in information security as a hypergame–a primer
CN Gutierrez, S Bagchi, H Mohammed, J Avery
Proceedings of the 16th Annual Information Security Symposium, 41, 2015
142015
Offensive deception in computing
J Avery, M Almeshekah, E Spafford
International Conference on Cyber Warfare and Security, 23, 2017
92017
Formally modeling deceptive patches using a game-based approach
J Avery, JR Wallrabenstein
Computers & Security 75, 182-190, 2018
82018
Mitigating data exfiltration in storage-as-a-service clouds
D Wilson, J Avery
arXiv preprint arXiv:1606.08378, 2016
72016
Inhibiting and detecting offline password cracking using ErsatzPasswords
CN Gutierrez, MH Almeshekah, EH Spafford, MJ Atallah, J Avery
ACM Transactions on Privacy and Security (TOPS) 19 (3), 1-30, 2016
52016
Experimental designs: Testing a debugging oracle assistant
EH Spafford, C Viravan
Technical Report SERC-TR-120-P, Software Engineering Research Center, Purdue …, 1992
5*1992
The Application of Deception to Software Security Patching
JK Avery
Purdue University, 2017
22017
Snipe: signature generation for phishing emails
J Avery, C Gutierrez, P Wood, RD Corte, JFG Modelo-Howard, B Berndt, ...
Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015
12015
Mitigating Data Exfiltration in SaaS Clouds
D Wilson, J Avery
Journal of Business, Technology and Leadership 1 (1), 9-9, 2019
2019
Deception in computing: where and how it has been used
J Avery, C Guterriez, M Almeshekah, S Bagchi, EH Spafford
Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015
2015
pSigene: generalizing attack signatures
J Avery, G Modelo-Howard, F Arshad, S Bagchi, Y Qi
Proceedings of the 15th Annual Information Security Symposium, 1-1, 2014
2014
Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON Jeffrey Avery, PhD, Bryson Fraelich, William Duran, Andrew Lee, Agustin
ZM Sullivan, MB Birrer, S Dick, J Cochran
2018 Index IEEE Transactions on Dependable and Secure Computing Vol. 15
A Abbas, S Aditham, G Ahn, NZ Aitzhan, M Al-Qurishi, A Alamri, ...
The system can't perform the operation now. Try again later.
Articles 1–15