Follow
Jonathan White
Jonathan White
Director of Computer Engineering and Assistant Professor of Engineering, Harding University
Verified email at harding.edu
Title
Cited by
Cited by
Year
Measurement of the resonant and components in decays
R Aaij, B Adeva, M Adinolfi, A Affolder, Z Ajaltouni, J Albrecht, F Alessio, ...
Physical Review D 90 (1), 012003, 2014
2732014
Curvature perturbation in multi-field inflation with non-minimal coupling
J White, M Minamitsuji, M Sasaki
Journal of Cosmology and Astroparticle Physics 2012 (07), 039, 2012
632012
Disformal invariance of curvature perturbation
H Motohashi, J White
Journal of Cosmology and Astroparticle Physics 2016 (02), 065, 2016
462016
Non-linear curvature perturbation in multi-field inflation models with non-minimal coupling
J White, M Minamitsuji, M Sasaki
Journal of Cosmology and Astroparticle Physics 2013 (09), 015, 2013
352013
Game theoretic attack analysis in online social network (OSN) services
J White, JS Park, CA Kamhoua, KA Kwiat
Proceedings of the 2013 ieee/acm international conference on advances in …, 2013
332013
Creating personally identifiable honeytokens
J White
Innovations and Advances in Computer Sciences and Engineering, 227-232, 2009
282009
Scalar suppression on large scales in open inflation
J White, Y Zhang, M Sasaki
Physical Review D 90 (8), 083517, 2014
262014
Multi-field effects in a simple extension of R2 inflation
T Mori, K Kohri, J White
Journal of Cosmology and Astroparticle Physics 2017 (10), 044, 2017
252017
Trusted online social network (OSN) services with optimal data management
JS Park, KA Kwiat, CA Kamhoua, J White, S Kim
Computers & Security 42, 116-136, 2014
222014
Analysis method
N Ward, C Mundy, O Kan, R Harris, J White, K Binley, W Rayner, S Naylor, ...
US Patent App. 10/170,385, 2003
222003
Implementing PII honeytokens to mitigate against the threat of malicous insiders
J White, B Panda
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
192009
Multifield formulation of gravitational particle production after inflation
Y Watanabe, J White
Physical Review D 92 (2), 023504, 2015
182015
Automatic identification of critical data items in a database to mitigate the effects of malicious insiders
J White, B Panda
International Conference on Information Systems Security, 208-221, 2009
182009
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security.
J White, D Thompson
Security and Management, 91-99, 2006
162006
Exploiting the hypoxia response.
K Binley, O Kan, J White, S Naylor
Current Opinion In Molecular Therapeutics 5 (6), 650-656, 2003
112003
Social network attack simulation with honeytokens
J White, JS Park, CA Kamhoua, KA Kwiat
Social Network Analysis and Mining 4, 1-14, 2014
92014
Insider threat discovery using automatic detection of mission critical data based on content
J White, B Panda
2010 Sixth International Conference on Information Assurance and Security, 56-61, 2010
92010
Military expert panel report: Sea level rise and the US military’s mission
R Keys, J Castellaw, R Parker, AC Phillips, J White, G Galloway
The Center for Climate and Security, 44-45, 2018
82018
Reflector markers and systems and methods for identifying and locating them
JE Greene, N Rulkov, J White
US Patent 10,499,832, 2019
72019
High-frame-rate oil film interferometry
JC White
California Polytechnic State University, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20