Search Results - "L. Wright, Jason"
-
1
Cannabinoid CB1 and CB2 receptor ligand specificity and the development of CB2-selective agonists
Published in Current medicinal chemistry (01-06-2008)“…Cannabinoids in current use such as nabilone activate both CB1 and CB2 receptors. Selective CB2 activation may provide some of the therapeutic effects of…”
Get more information
Journal Article -
2
Analyses of two end-user software vulnerability exposure metrics (extended version)
Published in Information security technical report (01-05-2013)“…Understanding the exposure risk of software vulnerabilities is an important part of the software ecosystem. Reliable software vulnerability metrics allow…”
Get full text
Journal Article -
3
Extraction of plasmid DNA using reactor scale alkaline lysis and selective precipitation for scalable transient transfection
Published in Cytotechnology (Dordrecht) (01-05-2001)“…DNA extracted and purified for vaccination, gene therapy or transfection of cultured cells has to meet different criteria. We describe herein, a scalable…”
Get full text
Journal Article -
4
The analysis of dimensionality reduction techniques in cryptographic object code classification
Published in 3rd International Conference on Human System Interaction (01-05-2010)“…This paper compares the application of three different dimension reduction techniques to the problem of classifying functions in object code form as being…”
Get full text
Conference Proceeding -
5
Are Vulnerability Disclosure Deadlines Justified?
Published in 2011 Third International Workshop on Security Measurements and Metrics (01-09-2011)“…Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of…”
Get full text
Conference Proceeding -
6
Neural network approach to Locating Cryptography in object code
Published in 2009 IEEE Conference on Emerging Technologies & Factory Automation (01-09-2009)“…Finding and identifying cryptography is a growing concern in the malware analysis community. In this paper, artificial neural networks are used to classify…”
Get full text
Conference Proceeding -
7
The relationship between live crowds, competitive anxiety, and performance for high school basketball players
Published 01-01-2015“…Live crowds and anxiety play a significant role in sport, and this study examined the relationship of the two with performance outcomes in high school…”
Get full text
Dissertation -
8
Software vulnerabilities: Lifespans, metrics, and case study
Published 01-01-2014“…It is difficult for end-users to judge the risk posed by software security vulnerabilities. This thesis examines three aspects of the software security…”
Get full text
Dissertation -
9
Mining Bug Databases for Unidentified Software Vulnerabilities
Published in 2012 5th International Conference on Human System Interactions (01-06-2012)“…Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been…”
Get full text
Conference Proceeding -
10
Analyses of Two End-User Software Vulnerability Ex
Published in Information security technical report (01-05-2013)“…Understanding the exposure risk because of softwar…”
Get full text
Journal Article -
11
The relationship between live crowds, competitive anxiety, and performance for high school basketball players
Get full text
Dissertation -
12
Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server
Published in 2013 International Conference on Availability, Reliability and Security (01-09-2013)“…Software vulnerabilities are an important part of the modern software economy. Being able to accurately classify software defects as a vulnerability, or not,…”
Get full text
Conference Proceeding -
13
Neural network architecture selection analysis with application to cryptography location
Published in The 2010 International Joint Conference on Neural Networks (IJCNN) (01-07-2010)“…When training a neural network it is tempting to experiment with architectures until a low total error is achieved. The danger in doing so is the creation of a…”
Get full text
Conference Proceeding -
14
Analyses of Two End-User Software Vulnerability Exposure Metrics
Published in 2012 Seventh International Conference on Availability, Reliability and Security (01-08-2012)“…The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of…”
Get full text
Conference Proceeding -
15
Time synchronization in hierarchical TESLA wireless sensor networks
Published in 2009 2nd International Symposium on Resilient Control Systems (01-08-2009)“…Time synchronization and event time correlation are important in wireless sensor networks. In particular, time is used to create a sequence events or time line…”
Get full text
Conference Proceeding