Follow
Jill Jermyn
Jill Jermyn
Verified email at cs.columbia.edu
Title
Cited by
Cited by
Year
Bait and snitch: Defending computer systems with decoys
JA Voris, J Jermyn, AD Keromytis, S Stolfo
1362013
Scalability of Machine to Machine systems and the Internet of Things on LTE mobile networks
J Jermyn, RP Jover, I Murynets, M Istomin, S Stolfo
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
562015
Resource provisioning planning for enterprise migration and automated application discovery
K Bai, J Hwang, JL Jermyn, ME Nidd, M Tacci, M Vukovic
US Patent 9,565,129, 2017
552017
Fox in the trap: Thwarting masqueraders via automated decoy document deployment
J Voris, J Jermyn, N Boggs, S Stolfo
Proceedings of the eighth European workshop on system security, 1-7, 2015
422015
Determining network security policies during data center migration and detecting security violation
K Bai, J Hwang, JL Jermyn, HGV Ramasamy, M Vukovic
US Patent 10,015,197, 2018
302018
Automated migration planning for moving into a setting of multiple firewalls
J Hwang, JL Jermyn, HGV Ramasamy, M Vukovic
US Patent 9,515,993, 2016
242016
An analysis of dos attack strategies against the lte ran
J Jermyn, G Salles-Loustau, S Zonouz
Journal of Cyber Security and Mobility 3 (2), 159-180, 2014
222014
Ensuring regulatory compliance during application migration to cloud-based containers
MH Hernandez, JL Jermyn, CA Pickover, M Vukovic
US Patent 10,171,310, 2019
202019
Optimizing routing and load balancing in an SDN-enabled cloud during enterprise data center migration
J Hwang, JL Jermyn, M Vukovic, J Xiao
US Patent 9,756,121, 2017
202017
Improving readiness for enterprise migration to the cloud
J Jermyn, J Hwang, K Bai, M Vukovic, N Anerousis, S Stolfo
Proceedings of the Middleware Industry Track, 1-7, 2014
172014
Autosonda: Discovering rules and triggers of censorship devices
J Jermyn, N Weaver
7th USENIX Workshop on Free and Open Communications on the Internet (FOCI 17), 2017
132017
Firecycle: A scalable test bed for large-scale LTE security research
J Jermyn, RP Jover, M Istomin, I Murynets
2014 IEEE International Conference on Communications (ICC), 907-913, 2014
112014
Cloud transformation analytics services: a case study of cloud fitness validation for server migration
J Hwang, YW Huang, M Vukovic, J Jermyn
2015 IEEE International Conference on Services Computing, 387-394, 2015
102015
Discovering network control vulnerabilities and policies in evolving networks
J Jermyn
Columbia University, 2017
22017
Towards an evolvable cellular architecture
J Jermyn
2015 IEEE 16th International Symposium on A World of Wireless, Mobile and …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–15