Measurement of the resonant and components in decays R Aaij, B Adeva, M Adinolfi, A Affolder, Z Ajaltouni, J Albrecht, F Alessio, ... Physical Review D 90 (1), 012003, 2014 | 273 | 2014 |
Curvature perturbation in multi-field inflation with non-minimal coupling J White, M Minamitsuji, M Sasaki Journal of Cosmology and Astroparticle Physics 2012 (07), 039, 2012 | 63 | 2012 |
Disformal invariance of curvature perturbation H Motohashi, J White Journal of Cosmology and Astroparticle Physics 2016 (02), 065, 2016 | 46 | 2016 |
Non-linear curvature perturbation in multi-field inflation models with non-minimal coupling J White, M Minamitsuji, M Sasaki Journal of Cosmology and Astroparticle Physics 2013 (09), 015, 2013 | 35 | 2013 |
Game theoretic attack analysis in online social network (OSN) services J White, JS Park, CA Kamhoua, KA Kwiat Proceedings of the 2013 ieee/acm international conference on advances in …, 2013 | 33 | 2013 |
Creating personally identifiable honeytokens J White Innovations and Advances in Computer Sciences and Engineering, 227-232, 2009 | 28 | 2009 |
Scalar suppression on large scales in open inflation J White, Y Zhang, M Sasaki Physical Review D 90 (8), 083517, 2014 | 26 | 2014 |
Multi-field effects in a simple extension of R2 inflation T Mori, K Kohri, J White Journal of Cosmology and Astroparticle Physics 2017 (10), 044, 2017 | 25 | 2017 |
Trusted online social network (OSN) services with optimal data management JS Park, KA Kwiat, CA Kamhoua, J White, S Kim Computers & Security 42, 116-136, 2014 | 22 | 2014 |
Analysis method N Ward, C Mundy, O Kan, R Harris, J White, K Binley, W Rayner, S Naylor, ... US Patent App. 10/170,385, 2003 | 22 | 2003 |
Implementing PII honeytokens to mitigate against the threat of malicous insiders J White, B Panda 2009 IEEE International Conference on Intelligence and Security Informatics …, 2009 | 19 | 2009 |
Multifield formulation of gravitational particle production after inflation Y Watanabe, J White Physical Review D 92 (2), 023504, 2015 | 18 | 2015 |
Automatic identification of critical data items in a database to mitigate the effects of malicious insiders J White, B Panda International Conference on Information Systems Security, 208-221, 2009 | 18 | 2009 |
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. J White, D Thompson Security and Management, 91-99, 2006 | 16 | 2006 |
Exploiting the hypoxia response. K Binley, O Kan, J White, S Naylor Current Opinion In Molecular Therapeutics 5 (6), 650-656, 2003 | 11 | 2003 |
Social network attack simulation with honeytokens J White, JS Park, CA Kamhoua, KA Kwiat Social Network Analysis and Mining 4, 1-14, 2014 | 9 | 2014 |
Insider threat discovery using automatic detection of mission critical data based on content J White, B Panda 2010 Sixth International Conference on Information Assurance and Security, 56-61, 2010 | 9 | 2010 |
Military expert panel report: Sea level rise and the US military’s mission R Keys, J Castellaw, R Parker, AC Phillips, J White, G Galloway The Center for Climate and Security, 44-45, 2018 | 8 | 2018 |
Reflector markers and systems and methods for identifying and locating them JE Greene, N Rulkov, J White US Patent 10,499,832, 2019 | 7 | 2019 |
High-frame-rate oil film interferometry JC White California Polytechnic State University, 2011 | 6 | 2011 |