Jonathan White
Jonathan White
Director of Computer Engineering and Assistant Professor of Engineering, Harding University
Verified email at harding.edu
Title
Cited by
Cited by
Year
Measurement of the resonant and components in decays
R Aaij, B Adeva, M Adinolfi, A Affolder, Z Ajaltouni, J Albrecht, F Alessio, ...
Physical Review D 90 (1), 012003, 2014
1332014
Curvature perturbation in multi-field inflation with non-minimal coupling
J White, M Minamitsuji, M Sasaki
Journal of Cosmology and Astroparticle Physics 2012 (07), 039, 2012
552012
Non-linear curvature perturbation in multi-field inflation models with non-minimal coupling
J White, M Minamitsuji, M Sasaki
Journal of Cosmology and Astroparticle Physics 2013 (09), 015, 2013
342013
Disformal invariance of curvature perturbation
H Motohashi, J White
Journal of Cosmology and Astroparticle Physics 2016 (02), 065, 2016
332016
Game theoretic attack analysis in online social network (OSN) services
J White, JS Park, CA Kamhoua, KA Kwiat
Proceedings of the 2013 ieee/acm international conference on advances in …, 2013
242013
Scalar suppression on large scales in open inflation
J White, Y Zhang, M Sasaki
Physical Review D 90 (8), 083517, 2014
222014
Creating personally identifiable honeytokens
J White
Innovations and Advances in Computer Sciences and Engineering, 227-232, 2010
222010
Analysis method
N Ward, C Mundy, O Kan, R Harris, J White, K Binley, W Rayner, S Naylor, ...
US Patent App. 10/170,385, 2003
192003
Trusted online social network (OSN) services with optimal data management
JS Park, KA Kwiat, CA Kamhoua, J White, S Kim
Computers & Security 42, 116-136, 2014
182014
Automatic identification of critical data items in a database to mitigate the effects of malicious insiders
J White, B Panda
International Conference on Information Systems Security, 208-221, 2009
162009
Implementing pii honeytokens to mitigate against the threat of malicous insiders
J White, B Panda
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
152009
Multi-field effects in a simple extension of R2 inflation
T Mori, K Kohri, J White
Journal of Cosmology and Astroparticle Physics 2017 (10), 044, 2017
142017
Multifield formulation of gravitational particle production after inflation
Y Watanabe, J White
Physical Review D 92 (2), 023504, 2015
132015
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security.
J White, D Thompson
Security and Management, 91-99, 2006
132006
Exploiting the hypoxia response.
K Binley, O Kan, J White, S Naylor
Current opinion in molecular therapeutics 5 (6), 650-656, 2003
112003
Insider threat discovery using automatic detection of mission critical data based on content
J White, B Panda
2010 Sixth International Conference on Information Assurance and Security, 56-61, 2010
82010
Social network attack simulation with honeytokens
J White, JS Park, CA Kamhoua, KA Kwiat
Social Network Analysis and Mining 4 (1), 221, 2014
62014
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation.
J White, B Panda, Q Yassen, K Nguyen, W Li
WOSIS, 93-102, 2009
62009
High-frame-rate oil film interferometry
JC White
52011
Load Balancing on a Grid Using Data Characteristics.
JL White, DR Thompson
GCA, 184-190, 2005
42005
The system can't perform the operation now. Try again later.
Articles 1–20