Jonathan M. Spring
Title
Cited by
Cited by
Year
The long “taile” of typosquatting domain names
J Szurdi, B Kocso, G Cseh, JM Spring, M Felegyhazi, C Kanich
23rd USENIX Security Symposium (USENIX Security 14). San Diego, CA: USENIX …, 2014
1472014
Monitoring cloud computing by layer, part 1
JM Spring
Security & Privacy, IEEE 9 (2), 66-68, 2011
1252011
Silk: A tool suite for unsampled network flow analysis at scale
M Thomas, L Metcalf, JM Spring, P Krystosek, K Prevost
Big Data (BigData Congress), 2014 IEEE International Congress on, 184-191, 2014
90*2014
Monitoring cloud computing by layer, part 2
JM Spring
IEEE Security & Privacy, 52-55, 2011
552011
Towards robust experimental design for user studies in security and privacy
K Krol, JM Spring, S Parkin, MA Sasse
Learning from Authoritative Security Experiment Results (LASER), 2016
452016
Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014
L Metcalf, JM Spring
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015
272015
Practicing a Science of Security: A Philosophy of Science Perspective
JM Spring, T Moore, D Pym
New Security Paradigms Workshop, 2017
262017
Exploring a mechanistic approach to experimentation in computing
E Hatleback, JM Spring
Philosophy & Technology 27 (3), 441-459, 2014
252014
Introduction to Information Security: A Strategic-based Approach
T Shimeall, JM Spring
Newnes, 2013
242013
Thinking about intrusion kill chains as mechanisms
JM Spring, E Hatleback
Journal of Cybersecurity 3 (3), 185-197, 2017
212017
Why Separation Logic Works
D Pym, JM Spring, P O'Hearn
Philosophy & Technology, 2018
202018
Cyber security via signaling games: Toward a science of cyber security
W Casey, JA Morales, T Nguyen, JM Spring, R Weaver, E Wright, ...
Distributed Computing and Internet Technology, 34-42, 2014
202014
Correlating domain registrations and DNS first activity in general and for malware
JM Spring, L Metcalf, E Stoner
Securing and Trusting Internet Names 2011, 2011
182011
Global adversarial capability modeling
JM Spring, S Kern, A Summers
Electronic Crime Research (eCrime), 2015 APWG Symposium on, 1-21, 2015
142015
Blacklist ecosystem analysis update: 2014
L Metcalf, JM Spring
Carnegie Mellon University-Software Engineering Institute Pittsburgh United …, 2014
142014
Everything you wanted to know about blacklists but were afraid to ask
L Metcalf, JM Spring
Software Engineering Institute, CERT Coordination Center, Pittsburgh, PA …, 2013
142013
Toward realistic modeling criteria of games in internet security
JM Spring
Journal of Cyber Security & Information Systems 2 (2), 2-11, 2014
112014
Building general knowledge of mechanisms in information security
JM Spring, P Illari
Philosophy & Technology 32 (4), 627-659, 2019
92019
Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption
A Demjaha, JM Spring, I Becker, S Parkin, MA Sasse
Proc. USEC 2018, 2018
92018
Supplementary Data: Survey Data Analysis
A Demjaha, J Spring, I Becker, S Parkin, MA Sasse
9*
The system can't perform the operation now. Try again later.
Articles 1–20