BibTeX records: Jonathan White

download as .bib file

@inproceedings{DBLP:conf/sigcse/MillsWL24,
  author       = {Alan Mills and
                  Jonathan White and
                  Phil Legg},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {Cyber Funfair: Creating Immersive and Educational Experiences for
                  Teaching Cyber Physical Systems Security},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {847--852},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626252.3630820},
  doi          = {10.1145/3626252.3630820},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/MillsWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MillsWL23,
  author       = {Alan Mills and
                  Jonathan White and
                  Phil Legg},
  title        = {Longitudinal risk-based security assessment of docker software container
                  images},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103478},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103478},
  doi          = {10.1016/J.COSE.2023.103478},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MillsWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/MarshallTCRRBHH23,
  author       = {Deborah A. Marshall and
                  Toni Tagimacruz and
                  Monica Cepoiu{-}Martin and
                  Jill Robert and
                  Bernice Ring and
                  Michael Burston and
                  Suzanne Higgins and
                  Monica Hess and
                  Jonathan White},
  title        = {A Simulation Modelling Study of Referral Distribution Policies in
                  a Centralized Intake System for Surgical Consultation},
  journal      = {J. Medical Syst.},
  volume       = {47},
  number       = {1},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10916-022-01897-x},
  doi          = {10.1007/S10916-022-01897-X},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jms/MarshallTCRRBHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/MungerWSTJSHGBFJWMBOMPHNJ23,
  author       = {Benjamin Munger and
                  Kathy Wilcox and
                  Jeshuah Sniderman and
                  Chuck Tung and
                  Brett Johnson and
                  Russell Schreiber and
                  Carson Henrion and
                  Kevin Gillespie and
                  Tom Burd and
                  Harry R. Fair III and
                  Dave Johnson and
                  Jonathan White and
                  Scott McLelland and
                  Steven Bakke and
                  Javin Olson and
                  Ryan McCracken and
                  Matthew Pickett and
                  Aaron Horiuchi and
                  Hien Nguyen and
                  Tim Jackson},
  title        = {"Zen 4": The {AMD} 5nm 5.7GHz x86-64 Microprocessor Core},
  booktitle    = {{IEEE} International Solid- State Circuits Conference, {ISSCC} 2023,
                  San Francisco, CA, USA, February 19-23, 2023},
  pages        = {38--39},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISSCC42615.2023.10067540},
  doi          = {10.1109/ISSCC42615.2023.10067540},
  timestamp    = {Wed, 29 Mar 2023 15:53:39 +0200},
  biburl       = {https://dblp.org/rec/conf/isscc/MungerWSTJSHGBFJWMBOMPHNJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/MillsWL22,
  author       = {Alan Mills and
                  Jonathan White and
                  Phil Legg},
  title        = {{OGMA:} Visualisation for Software Container Security Analysis and
                  Automated Remediation},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {76--81},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850335},
  doi          = {10.1109/CSR54599.2022.9850335},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csr2/MillsWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/BurdLPVMJVYWWLW22,
  author       = {Thomas Burd and
                  Wilson Li and
                  James Pistole and
                  Srividhya Venkataraman and
                  Michael McCabe and
                  Timothy Johnson and
                  James Vinh and
                  Thomas Yiu and
                  Mark Wasio and
                  Hon{-}Hin Wong and
                  Daryl Lieu and
                  Jonathan White and
                  Benjamin Munger and
                  Joshua Lindner and
                  Javin Olson and
                  Steven Bakke and
                  Jeshuah Sniderman and
                  Carson Henrion and
                  Russell Schreiber and
                  Eric Busta and
                  Brett Johnson and
                  Tim Jackson and
                  Aron Miller and
                  Ryan Miller and
                  Matthew Pickett and
                  Aaron Horiuchi and
                  Josef Dvorak and
                  Sabeesh Balagangadharan and
                  Sajeesh Ammikkallingal and
                  Pankaj Kumar},
  title        = {Zen3: The {AMD} 2\({}^{\mbox{nd}}\)-Generation 7nm x86-64 Microprocessor
                  Core},
  booktitle    = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2022,
                  San Francisco, CA, USA, February 20-26, 2022},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISSCC42614.2022.9731678},
  doi          = {10.1109/ISSCC42614.2022.9731678},
  timestamp    = {Mon, 21 Mar 2022 13:32:47 +0100},
  biburl       = {https://dblp.org/rec/conf/isscc/BurdLPVMJVYWWLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ud/MoscaWSC22,
  author       = {Erica Isa Mosca and
                  Jonathan White and
                  Edward Steinfeld and
                  Stefano Capolongo},
  editor       = {Ilaria Garofolo and
                  Giulia Bencini and
                  Alberto Arenghi},
  title        = {Designing Hospitals Through the Lens of Universal Design. An Evaluation
                  Tool to Enhance Inclusive Healthcare Facilities},
  booktitle    = {Transforming our World through Universal Design for Human Development
                  - Proceedings of the Sixth International Conference on Universal Design
                  {(UD} 2022), Brescia, Italy, 7 - 9 September 2022},
  series       = {Studies in Health Technology and Informatics},
  volume       = {297},
  pages        = {331--339},
  publisher    = {{IOS} Press},
  year         = {2022},
  url          = {https://doi.org/10.3233/SHTI220857},
  doi          = {10.3233/SHTI220857},
  timestamp    = {Thu, 06 Jul 2023 15:13:33 +0200},
  biburl       = {https://dblp.org/rec/conf/ud/MoscaWSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ud/WhiteM22,
  author       = {Jonathan White and
                  Erica Isa Mosca},
  editor       = {Ilaria Garofolo and
                  Giulia Bencini and
                  Alberto Arenghi},
  title        = {Developing Innovative Solutions for Universal Design in Healthcare
                  and Other Sectors},
  booktitle    = {Transforming our World through Universal Design for Human Development
                  - Proceedings of the Sixth International Conference on Universal Design
                  {(UD} 2022), Brescia, Italy, 7 - 9 September 2022},
  series       = {Studies in Health Technology and Informatics},
  volume       = {297},
  pages        = {340--347},
  publisher    = {{IOS} Press},
  year         = {2022},
  url          = {https://doi.org/10.3233/SHTI220858},
  doi          = {10.3233/SHTI220858},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ud/WhiteM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/LeggHSWJ21,
  author       = {Phil Legg and
                  Thomas Higgs and
                  Pennie Spruhan and
                  Jonathan White and
                  Ian Johnson},
  title        = {"Hacking an IoT Home": New opportunities for cyber security
                  education combining remote learning with cyber-physical systems},
  booktitle    = {International Conference on Cyber Situational Awareness, Data Analytics
                  and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CyberSA52016.2021.9478251},
  doi          = {10.1109/CYBERSA52016.2021.9478251},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/LeggHSWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/WhiteL21,
  author       = {Jonathan White and
                  Phil Legg},
  title        = {Unsupervised One-Class Learning for Anomaly Detection on Home IoT
                  Network Devices},
  booktitle    = {International Conference on Cyber Situational Awareness, Data Analytics
                  and Assessment, CyberSA 2021, Dublin, Ireland, June 14-18, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CyberSA52016.2021.9478248},
  doi          = {10.1109/CYBERSA52016.2021.9478248},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/WhiteL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/JinTKHW18,
  author       = {Ge Jin and
                  Manghui Tu and
                  Tae{-}Hoon Kim and
                  Justin Heffron and
                  Jonathan White},
  editor       = {Tiffany Barnes and
                  Daniel D. Garcia and
                  Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones},
  title        = {Game based Cybersecurity Training for High School Students},
  booktitle    = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018},
  pages        = {68--73},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3159450.3159591},
  doi          = {10.1145/3159450.3159591},
  timestamp    = {Tue, 06 Nov 2018 11:07:13 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/JinTKHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/MungerAABFFJKMM16,
  author       = {Benjamin Munger and
                  David Akeson and
                  Srikanth Arekapudi and
                  Tom Burd and
                  Harry R. Fair III and
                  Jim Farrell and
                  Dave Johnson and
                  Guhan Krishnan and
                  Hugh McIntyre and
                  Edward McLellan and
                  Samuel Naffziger and
                  Russell Schreiber and
                  Sriram Sundaram and
                  Jonathan White and
                  Kathryn Wilcox},
  title        = {Carrizo: {A} High Performance, Energy Efficient 28 nm {APU}},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {51},
  number       = {1},
  pages        = {105--116},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSSC.2015.2464688},
  doi          = {10.1109/JSSC.2015.2464688},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jssc/MungerAABFFJKMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/WilcoxCFGGHJKMNOPPRW15,
  author       = {Kathryn Wilcox and
                  Robert Cole and
                  Harry R. Fair III and
                  Kevin Gillespie and
                  Aaron Grenat and
                  Carson Henrion and
                  Ravi Jotwani and
                  Stephen Kosonocky and
                  Benjamin Munger and
                  Samuel Naffziger and
                  Robert S. Orefice and
                  Sanjay Pant and
                  Donald A. Priore and
                  Ravinder Rachala and
                  Jonathan White},
  title        = {Steamroller Module and Adaptive Clocking System in 28 nm {CMOS}},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {50},
  number       = {1},
  pages        = {24--34},
  year         = {2015},
  url          = {https://doi.org/10.1109/JSSC.2014.2357428},
  doi          = {10.1109/JSSC.2014.2357428},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jssc/WilcoxCFGGHJKMNOPPRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/WilcoxAFFJKMMNS15,
  author       = {Kathryn Wilcox and
                  David Akeson and
                  Harry R. Fair III and
                  Jim Farrell and
                  Dave Johnson and
                  Guhan Krishnan and
                  Hugh McIntyre and
                  Edward McLellan and
                  Samuel Naffziger and
                  Russell Schreiber and
                  Sriram Sundaram and
                  Jonathan White},
  title        = {4.8 {A} 28nm x86 {APU} optimized for power and area efficiency},
  booktitle    = {2015 {IEEE} International Solid-State Circuits Conference, {ISSCC}
                  2015, Digest of Technical Papers, San Francisco, CA, USA, February
                  22-26, 2015},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSCC.2015.7062937},
  doi          = {10.1109/ISSCC.2015.7062937},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isscc/WilcoxAFFJKMMNS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkKKWK14,
  author       = {Joon S. Park and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua and
                  Jonathan White and
                  Sookyung Kim},
  title        = {Trusted Online Social Network {(OSN)} services with optimal data management},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {116--136},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.004},
  doi          = {10.1016/J.COSE.2014.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkKKWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/WhitePKK14,
  author       = {Jonathan White and
                  Joon S. Park and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  title        = {Social network attack simulation with honeytokens},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {4},
  number       = {1},
  pages        = {221},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13278-014-0221-5},
  doi          = {10.1007/S13278-014-0221-5},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/WhitePKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/GillespieFHJKOP14,
  author       = {Kevin Gillespie and
                  Harry R. Fair III and
                  Carson Henrion and
                  Ravi Jotwani and
                  Stephen V. Kosonocky and
                  Robert S. Orefice and
                  Donald A. Priore and
                  Jonathan White and
                  Kathryn Wilcox},
  title        = {5.5 Steamroller: An x86-64 core implemented in 28nm bulk {CMOS}},
  booktitle    = {2014 {IEEE} International Conference on Solid-State Circuits Conference,
                  {ISSCC} 2014, Digest of Technical Papers, San Francisco, CA, USA,
                  February 9-13, 2014},
  pages        = {104--105},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISSCC.2014.6757357},
  doi          = {10.1109/ISSCC.2014.6757357},
  timestamp    = {Mon, 09 Aug 2021 14:54:04 +0200},
  biburl       = {https://dblp.org/rec/conf/isscc/GillespieFHJKOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/WhitePKK13,
  author       = {Jonathan White and
                  Joon S. Park and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  editor       = {Jon G. Rokne and
                  Christos Faloutsos},
  title        = {Game theoretic attack analysis in online social network {(OSN)} services},
  booktitle    = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13,
                  Niagara, ON, Canada - August 25 - 29, 2013},
  pages        = {1012--1019},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2492517.2500257},
  doi          = {10.1145/2492517.2500257},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/WhitePKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/WhiteB11,
  author       = {Jonathan White and
                  Nilanjan Banerjee},
  editor       = {David B. Johnson and
                  Anurag Kumar},
  title        = {Mirage: Mitigating illicit inventorying in a {RFID} enabled retail
                  environment},
  booktitle    = {Third International Conference on Communication Systems and Networks,
                  {COMSNETS} 2011, Bangalore, India, January 4-8, 2011},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMSNETS.2011.5716498},
  doi          = {10.1109/COMSNETS.2011.5716498},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/WhiteB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/FischerABDGHHHJMNVWW11,
  author       = {Tim C. Fischer and
                  Srikanth Arekapudi and
                  Eric Busta and
                  Carl Dietz and
                  Michael Golden and
                  Scott Hilker and
                  Aaron Horiuchi and
                  Kevin A. Hurd and
                  Dave Johnson and
                  Hugh McIntyre and
                  Samuel Naffziger and
                  James Vinh and
                  Jonathan White and
                  Kathryn Wilcox},
  title        = {Design solutions for the Bulldozer 32nm {SOI} 2-core processor module
                  in an 8-core {CPU}},
  booktitle    = {{IEEE} International Solid-State Circuits Conference, {ISSCC} 2011,
                  Digest of Technical Papers, San Francisco, CA, USA, 20-24 February,
                  2011},
  pages        = {78--80},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISSCC.2011.5746227},
  doi          = {10.1109/ISSCC.2011.5746227},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isscc/FischerABDGHHHJMNVWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/MulvaneyWH10,
  author       = {David Mulvaney and
                  Jonathan White and
                  Muna Hamdi},
  title        = {Elevator Dispatching Using Heuristic Search},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {16},
  number       = {1},
  pages        = {77--87},
  year         = {2010},
  url          = {https://doi.org/10.1080/10798587.2010.10643065},
  doi          = {10.1080/10798587.2010.10643065},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iasc/MulvaneyWH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WhiteP10,
  author       = {Jonathan White and
                  Brajendra Panda},
  title        = {Insider threat discovery using automatic detection of mission critical
                  data based on content},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {56--61},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604187},
  doi          = {10.1109/ISIAS.2010.5604187},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WhiteP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-5502,
  author       = {Jonathan White and
                  Nilanjan Banerjee},
  title        = {Mirage: Mitigating Illicit Inventorying in a {RFID} Enabled Retail
                  Environment},
  journal      = {CoRR},
  volume       = {abs/1006.5502},
  year         = {2010},
  url          = {http://arxiv.org/abs/1006.5502},
  eprinttype    = {arXiv},
  eprint       = {1006.5502},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1006-5502.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WhiteP09,
  author       = {Jonathan White and
                  Brajendra Panda},
  editor       = {Atul Prakash and
                  Indranil Gupta},
  title        = {Automatic Identification of Critical Data Items in a Database to Mitigate
                  the Effects of Malicious Insiders},
  booktitle    = {Information Systems Security, 5th International Conference, {ICISS}
                  2009, Kolkata, India, December 14-18, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5905},
  pages        = {208--221},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10772-6\_16},
  doi          = {10.1007/978-3-642-10772-6\_16},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/WhiteP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WhiteP09,
  author       = {Jonathan White and
                  Brajendra Panda},
  title        = {Implementing {PII} honeytokens to mitigate against the threat of malicous
                  insiders},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings},
  pages        = {233},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISI.2009.5137315},
  doi          = {10.1109/ISI.2009.5137315},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WhiteP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/WhitePYNL09,
  author       = {Jonathan White and
                  Brajendra Panda and
                  Quassai Yassen and
                  Khanh Nguyen and
                  Weihan Li},
  editor       = {Alfonso Rodr{\'{\i}}guez and
                  Mariemma Inmaculada Yag{\"{u}}e del Valle and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Detecting Malicious Insider Threats using a Null Affinity Temporal
                  Three Dimensional Matrix Relation},
  booktitle    = {Security in Information Systems, Proceedings of the 7th International
                  Workshop on Security in Information Systems, {WOSIS} 2009, In conjunction
                  with {ICEIS} 2009, Milan, Italy, May 2009},
  pages        = {93--102},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 03 Dec 2019 11:56:05 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/WhitePYNL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/SuWBC08,
  author       = {Shu{-}Yi Su and
                  Jonathan White and
                  David J. Balding and
                  Lachlan J. M. Coin},
  title        = {Inference of haplotypic phase and missing genotypes in polyploid organisms
                  and variable copy number genomic regions},
  journal      = {{BMC} Bioinform.},
  volume       = {9},
  year         = {2008},
  url          = {https://doi.org/10.1186/1471-2105-9-513},
  doi          = {10.1186/1471-2105-9-513},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/SuWBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisse/White08,
  author       = {Jonathan White},
  editor       = {Tarek M. Sobh},
  title        = {Creating Personally Identifiable Honeytokens},
  booktitle    = {Innovations and Advances in Computer Sciences and Engineering, Volume
                  {I} of the proceedings of the 2008 International Conference on Systems,
                  Computing Sciences and Software Engineering (SCSS), part of the International
                  Joint Conferences on Computer, Information, and Systems Sciences,
                  and Engineering, {CISSE} 2008, Bridgeport, Connecticut, {USA}},
  pages        = {227--232},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-90-481-3658-2\_39},
  doi          = {10.1007/978-90-481-3658-2\_39},
  timestamp    = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl       = {https://dblp.org/rec/conf/cisse/White08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WhiteT06,
  author       = {Jonathan White and
                  Dale Thompson},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Using Synthetic Decoys to Digitally Watermark Personally-Identifying
                  Data and to Promote Data Security},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {91--99},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 06 Dec 2006 10:51:51 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WhiteT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics