Jared M. Smith

Orcid: 0000-0002-3240-2405

According to our database1, Jared M. Smith authored at least 20 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors.
DTRAP, 2023

AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
VAC: A Software Approach to Resilient SCADA Automation.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022

2021
Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems.
Digit. Investig., 2020

Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection.
CoRR, 2020

Peerlock: Flexsealing BGP.
CoRR, 2020

PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems.
Proceedings of the 29th USENIX Security Symposium, 2020

The Maestro Attack: Orchestrating Malicious Flows with BGP.
Proceedings of the Security and Privacy in Communication Networks, 2020

Withdrawing the BGP Re-Routing Curtain: Understanding the Security Impact of BGP Poisoning through Real-World Measurements.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2018
An Internet-Scale Feasibility Study of BGP Poisoning as a Security Primitive.
CoRR, 2018

Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems.
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors.
Proceedings of the Financial Cryptography and Data Security, 2018

Towards Architecture and OS-Independent Malware Detection via Memory Forensics.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
DEMO: Akatosh: Automated Cyber Incident Verification and Impact Analysis.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Crowdsourcing the discovery of software repositories in an educational environment.
PeerJ Prepr., 2016

The impact of analog computational error on an analog boolean satisfiability solver.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016

Exploring a framework for identity and attribute linking across heterogeneous data systems.
Proceedings of the 2nd International Workshop on BIG Data Software Engineering, 2016


  Loading...