Visual firewall: real-time network security monitor CP Lee, J Trost, N Gibbs, R Beyah, JA Copeland IEEE Workshop on Visualization for Computer Security, 2005.(VizSEC 05)., 129-136, 2005 | 99 | 2005 |
Leveraging the cloud for big data biometrics: Meeting the performance requirements of the next generation biometric systems E Kohlwey, A Sussman, J Trost, A Maurer 2011 IEEE World Congress on Services, 597-601, 2011 | 84 | 2011 |
Method and Apparatus for Detecting Malicious Websites JA Trost US Patent App. 13/734,904, 2014 | 9 | 2014 |
Binarypig: Scalable static binary analysis over hadoop Z Hanif, T Calhoun, J Trost Black Hat USA, 2013 | 9 | 2013 |
Method and apparatus for enhanced network data processing and customizable user interface EW Ady, JT Altman, M Culbreth, J Herren, DM Nichols, J Trost US Patent 9,246,779, 2016 | 6 | 2016 |
Method and Apparatus for Detecting Malicious Websites JB MUNRO IV, JA Trost, ZD HANIF US Patent App. 14/332,673, 2014 | 4 | 2014 |
Visual firewall: Real-time network security monitoring CP Lee, J Trost, N Gibbs, R Beyah, JA Copeland Visualization for Computer Security, IEEE Workshops on, 16-16, 2005 | 3 | 2005 |
Systems And Methods For Cyber Security Alert Triage BS Jason Trost US Patent US11165815B2, 2021 | | 2021 |
US10782942B1 Rapid onboarding of data from diverse data sources into standardized objects with parser and unit test generation PG Jason Trost US Patent US10782942B1, 2019 | | 2019 |