default search action
Jonathan M. Spring
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Jonathan M. Spring:
An analysis of how many undiscovered vulnerabilities remain in information systems. Comput. Secur. 131: 103191 (2023) - [i5]Jonathan M. Spring:
An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems. CoRR abs/2304.09259 (2023) - [i4]Micah Musser, Andrew Lohn, James X. Dempsey, Jonathan M. Spring, Ram Shankar Siva Kumar, Brenda Leong, Christina Liaghati, Cindy Martinez, Crystal D. Grant, Daniel Rohrer, Heather Frase, Jonathan Elliott, John Bansemer, Mikel Rodriguez, Mitt Regan, Rumman Chowdhury, Stefan Hermanek:
Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications. CoRR abs/2305.14553 (2023) - 2022
- [j5]Allen D. Householder, Jonathan M. Spring:
Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures. DTRAP 3(4): 39:1-39:28 (2022) - 2021
- [b1]Leigh Metcalf, Jonathan M. Spring:
Using Science in Cybersecurity. WorldScientific 2021, ISBN 9789811235856, pp. 1-304 - [j4]Jonathan M. Spring, Phyllis Illari:
Review of Human Decision-making during Computer Security Incident Analysis. DTRAP 2(2): 11:1-11:47 (2021) - [j3]Leigh Metcalf, Jonathan M. Spring:
The Ecosystem of Detection and Blocklisting of Domain Generation. DTRAP 2(3): 19:1-19:22 (2021) - [j2]Jonathan M. Spring, Eric Hatleback, Allen D. Householder, Art Manion, Deana Shick:
Time to Change the CVSS? IEEE Secur. Priv. 19(2): 74-78 (2021) - [c14]Soo-Jin Moon, Yucheng Yin, Rahul Anand Sharma, Yifei Yuan, Jonathan M. Spring, Vyas Sekar:
Accurately Measuring Global Risk of Amplification Attacks using AmpMap. USENIX Security Symposium 2021: 3881-3898 - [i3]Jonathan M. Spring, April Galyardt, Allen D. Householder, Nathan M. VanHoudnos:
On managing vulnerabilities in AI/ML systems. CoRR abs/2101.10865 (2021) - 2020
- [c13]Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou:
Learning the Associations of MITRE ATT & CK Adversarial Techniques. CNS 2020: 1-9 - [c12]Jonathan M. Spring, April Galyardt, Allen D. Householder, Nathan M. VanHoudnos:
On managing vulnerabilities in AI/ML systems. NSPW 2020: 111-126 - [c11]Allen D. Householder, Jeff Chrabaszcz, Trent Novelly, David Warren, Jonathan M. Spring:
Historical Analysis of Exploit Availability Timelines. CSET @ USENIX Security Symposium 2020 - [i2]Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou:
Learning the Associations of MITRE ATT&CK Adversarial Techniques. CoRR abs/2005.01654 (2020)
2010 – 2019
- 2019
- [c10]Tristan Caulfield, Jonathan M. Spring, M. Angela Sasse:
Why Jenny can't figure out which of these messages is a covert information operation. NSPW 2019: 118-128 - [i1]Jonathan M. Spring, Phyllis Illari:
Review of human decision-making during computer security incident analysis. CoRR abs/1903.10080 (2019) - 2018
- [c9]Jonathan M. Spring, David J. Pym:
Towards Scientific Incident Response. GameSec 2018: 398-417 - 2017
- [j1]Jonathan M. Spring, Eric Hatleback:
Thinking about intrusion kill chains as mechanisms. J. Cybersecur. 3(3): 185-197 (2017) - [c8]Jonathan M. Spring, Tyler Moore, David J. Pym:
Practicing a Science of Security: A Philosophy of Science Perspective. NSPW 2017: 1-18 - 2015
- [c7]Leigh Metcalf, Jonathan M. Spring:
Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014. WISCS@CCS 2015: 13-22 - [c6]Jonathan M. Spring, Sarah Kern, Alec Summers:
Global adversarial capability modeling. eCrime 2015: 22-42 - 2014
- [c5]Mark Thomas, Leigh Metcalf, Jonathan M. Spring, Paul Krystosek, Katherine Prevost:
SiLK: A Tool Suite for Unsampled Network Flow Analysis at Scale. BigData Congress 2014: 184-191 - [c4]William Casey, Jose Andre Morales, Thomson Nguyen, Jonathan M. Spring, Rhiannon Weaver, Evan Wright, Leigh Metcalf, Bud Mishra:
Cyber Security via Signaling Games: Toward a Science of Cyber Security. ICDCIT 2014: 34-42 - [c3]Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan M. Spring, Márk Félegyházi, Chris Kanich:
The Long "Taile" of Typosquatting Domain Names. USENIX Security Symposium 2014: 191-206 - 2013
- [c2]Jonathan M. Spring:
A notation for describing the steps in indicator expansion. eCrime 2013: 1-6 - [c1]Jonathan M. Spring:
Modeling malicious domain name take-down dynamics: Why eCrime pays. eCrime 2013: 1-9
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint