Search Results - "L. Wright, Jason"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Cannabinoid CB1 and CB2 receptor ligand specificity and the development of CB2-selective agonists by Ashton, John C, Wright, Jason L, McPartland, John M, Tyndall, Joel D A

    Published in Current medicinal chemistry (01-06-2008)
    “…Cannabinoids in current use such as nabilone activate both CB1 and CB2 receptors. Selective CB2 activation may provide some of the therapeutic effects of…”
    Get more information
    Journal Article
  2. 2

    Analyses of two end-user software vulnerability exposure metrics (extended version) by L. Wright, Jason, McQueen, Miles, Wellman, Lawrence

    Published in Information security technical report (01-05-2013)
    “…Understanding the exposure risk of software vulnerabilities is an important part of the software ecosystem. Reliable software vulnerability metrics allow…”
    Get full text
    Journal Article
  3. 3

    Extraction of plasmid DNA using reactor scale alkaline lysis and selective precipitation for scalable transient transfection by WRIGHT, Jason L, JORDAN, Martin, WURM, Florian M

    Published in Cytotechnology (Dordrecht) (01-05-2001)
    “…DNA extracted and purified for vaccination, gene therapy or transfection of cultured cells has to meet different criteria. We describe herein, a scalable…”
    Get full text
    Journal Article
  4. 4

    The analysis of dimensionality reduction techniques in cryptographic object code classification by Wright, Jason L, Manic, Milos

    “…This paper compares the application of three different dimension reduction techniques to the problem of classifying functions in object code form as being…”
    Get full text
    Conference Proceeding
  5. 5

    Are Vulnerability Disclosure Deadlines Justified? by McQueen, M., Wright, J. L., Wellman, L.

    “…Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of…”
    Get full text
    Conference Proceeding
  6. 6

    Neural network approach to Locating Cryptography in object code by Wright, J.L., Manic, M.

    “…Finding and identifying cryptography is a growing concern in the malware analysis community. In this paper, artificial neural networks are used to classify…”
    Get full text
    Conference Proceeding
  7. 7

    The relationship between live crowds, competitive anxiety, and performance for high school basketball players by Wright, Jason L

    Published 01-01-2015
    “…Live crowds and anxiety play a significant role in sport, and this study examined the relationship of the two with performance outcomes in high school…”
    Get full text
    Dissertation
  8. 8

    Software vulnerabilities: Lifespans, metrics, and case study by Wright, Jason L

    Published 01-01-2014
    “…It is difficult for end-users to judge the risk posed by software security vulnerabilities. This thesis examines three aspects of the software security…”
    Get full text
    Dissertation
  9. 9

    Mining Bug Databases for Unidentified Software Vulnerabilities by Wijayasekara, D., Manic, M., Wright, J. L., McQueen, M.

    “…Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been…”
    Get full text
    Conference Proceeding
  10. 10

    Analyses of Two End-User Software Vulnerability Ex by Jason L. Wright, Miles McQueen, Lawrence Wellman

    Published in Information security technical report (01-05-2013)
    “…Understanding the exposure risk because of softwar…”
    Get full text
    Journal Article
  11. 11

    The relationship between live crowds, competitive anxiety, and performance for high school basketball players by Wright, Jason L

    “…Live crowds and anxiety play a significant role in sport, and this study examined the relationship of the two with performance outcomes in high school…”
    Get full text
    Dissertation
  12. 12

    Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server by Wright, Jason L., Larsen, Jason W., McQueen, Miles

    “…Software vulnerabilities are an important part of the modern software economy. Being able to accurately classify software defects as a vulnerability, or not,…”
    Get full text
    Conference Proceeding
  13. 13

    Neural network architecture selection analysis with application to cryptography location by Wright, J L, Manic, M

    “…When training a neural network it is tempting to experiment with architectures until a low total error is achieved. The danger in doing so is the creation of a…”
    Get full text
    Conference Proceeding
  14. 14

    Analyses of Two End-User Software Vulnerability Exposure Metrics by Wright, J. L., McQueen, M., Wellman, L.

    “…The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of…”
    Get full text
    Conference Proceeding
  15. 15

    Time synchronization in hierarchical TESLA wireless sensor networks by Wright, J.L., Manic, M.

    “…Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line…”
    Get full text
    Conference Proceeding