Measurement of the resonant and components in decays R Aaij, B Adeva, M Adinolfi, A Affolder, Z Ajaltouni, J Albrecht, F Alessio, ... Physical Review D 90 (1), 012003, 2014 | 133 | 2014 |
Curvature perturbation in multi-field inflation with non-minimal coupling J White, M Minamitsuji, M Sasaki Journal of Cosmology and Astroparticle Physics 2012 (07), 039, 2012 | 55 | 2012 |
Non-linear curvature perturbation in multi-field inflation models with non-minimal coupling J White, M Minamitsuji, M Sasaki Journal of Cosmology and Astroparticle Physics 2013 (09), 015, 2013 | 34 | 2013 |
Disformal invariance of curvature perturbation H Motohashi, J White Journal of Cosmology and Astroparticle Physics 2016 (02), 065, 2016 | 33 | 2016 |
Game theoretic attack analysis in online social network (OSN) services J White, JS Park, CA Kamhoua, KA Kwiat Proceedings of the 2013 ieee/acm international conference on advances in …, 2013 | 24 | 2013 |
Scalar suppression on large scales in open inflation J White, Y Zhang, M Sasaki Physical Review D 90 (8), 083517, 2014 | 22 | 2014 |
Creating personally identifiable honeytokens J White Innovations and Advances in Computer Sciences and Engineering, 227-232, 2010 | 22 | 2010 |
Analysis method N Ward, C Mundy, O Kan, R Harris, J White, K Binley, W Rayner, S Naylor, ... US Patent App. 10/170,385, 2003 | 19 | 2003 |
Trusted online social network (OSN) services with optimal data management JS Park, KA Kwiat, CA Kamhoua, J White, S Kim Computers & Security 42, 116-136, 2014 | 18 | 2014 |
Automatic identification of critical data items in a database to mitigate the effects of malicious insiders J White, B Panda International Conference on Information Systems Security, 208-221, 2009 | 16 | 2009 |
Implementing pii honeytokens to mitigate against the threat of malicous insiders J White, B Panda 2009 IEEE International Conference on Intelligence and Security Informatics …, 2009 | 15 | 2009 |
Multi-field effects in a simple extension of R2 inflation T Mori, K Kohri, J White Journal of Cosmology and Astroparticle Physics 2017 (10), 044, 2017 | 14 | 2017 |
Multifield formulation of gravitational particle production after inflation Y Watanabe, J White Physical Review D 92 (2), 023504, 2015 | 13 | 2015 |
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. J White, D Thompson Security and Management, 91-99, 2006 | 13 | 2006 |
Exploiting the hypoxia response. K Binley, O Kan, J White, S Naylor Current opinion in molecular therapeutics 5 (6), 650-656, 2003 | 11 | 2003 |
Insider threat discovery using automatic detection of mission critical data based on content J White, B Panda 2010 Sixth International Conference on Information Assurance and Security, 56-61, 2010 | 8 | 2010 |
Social network attack simulation with honeytokens J White, JS Park, CA Kamhoua, KA Kwiat Social Network Analysis and Mining 4 (1), 221, 2014 | 6 | 2014 |
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation. J White, B Panda, Q Yassen, K Nguyen, W Li WOSIS, 93-102, 2009 | 6 | 2009 |
High-frame-rate oil film interferometry JC White | 5 | 2011 |
Load Balancing on a Grid Using Data Characteristics. JL White, DR Thompson GCA, 184-190, 2005 | 4 | 2005 |