Follow
Jeff Avery
Jeff Avery
Verified email at purdue.edu
Title
Cited by
Cited by
Year
Learning from the ones that got away: Detecting new forms of phishing attacks
CN Gutierrez, T Kim, R Della Corte, J Avery, D Goldwasser, M Cinque, ...
IEEE Transactions on Dependable and Secure Computing 15 (6), 988-1001, 2018
552018
Ghost patches: Fake patches for fake vulnerabilities
J Avery, EH Spafford
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
162017
Modeling deception in information security as a hypergame–a primer
CN Gutierrez, S Bagchi, H Mohammed, J Avery
Proceedings of the 16th Annual Information Security Symposium, 41, 2015
122015
Formally modeling deceptive patches using a game-based approach
J Avery, JR Wallrabenstein
Computers & Security 75, 182-190, 2018
82018
Mitigating data exfiltration in storage-as-a-service clouds
D Wilson, J Avery
arXiv preprint arXiv:1606.08378, 2016
62016
Offensive deception in computing
J Avery, M Almeshekah, E Spafford
International Conference on Cyber Warfare and Security, 23, 2017
52017
Inhibiting and detecting offline password cracking using ErsatzPasswords
CN Gutierrez, MH Almeshekah, EH Spafford, MJ Atallah, J Avery
ACM Transactions on Privacy and Security (TOPS) 19 (3), 1-30, 2016
42016
The Application of Deception to Software Security Patching
JK Avery
Purdue University, 2017
22017
Snipe: signature generation for phishing emails
J Avery, C Gutierrez, P Wood, RD Corte, JFG Modelo-Howard, B Berndt, ...
Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015
12015
Mitigating Data Exfiltration in SaaS Clouds
D Wilson, J Avery
Journal of Business, Technology and Leadership 1 (1), 9-9, 2019
2019
Deception in computing: where and how it has been used
J Avery, C Guterriez, M Almeshekah, S Bagchi, EH Spafford
Proceedings of the 16th Annual Information Security Symposium, 1-1, 2015
2015
pSigene: generalizing attack signatures
J Avery, G Modelo-Howard, F Arshad, S Bagchi, Y Qi
Proceedings of the 15th Annual Information Security Symposium, 1-1, 2014
2014
Spaf's Students, Past and Present
B Dankwa, A Master, R Morton, D Rapp, S Agarwal, H Agrawal, ...
2006
Analysis of Practical Application of Lightweight Cryptographic Algorithm ASCON Jeffrey Avery, PhD, Bryson Fraelich, William Duran, Andrew Lee, Agustin
ZM Sullivan, MB Birrer, S Dick, J Cochran
RSDA 2020 Workshop Committees
R Della Corte, C Gutierrez, J Hong, M Catillo, A Pecchia, M Cinque, D Kim, ...
2018 Index IEEE Transactions on Dependable and Secure Computing Vol. 15
A Abbas, S Aditham, G Ahn, NZ Aitzhan, M Al-Qurishi, A Alamri, ...
The system can't perform the operation now. Try again later.
Articles 1–16