Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors

22nd International Conference on Financial Cryptography and Data Security (FC)
Jordan Holland, R. Joseph Connor, J. Parker Diamond, Jared M. Smith, and Max Schuchard

Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems

Industrial Control System Security Workshop at the 34th Annual Computer Security Applications Conference (ACSAC)
Rima A. Awad, Saeed Beztchi, Jared M. Smith, J. Bryan Lyles, Stacy Prowell
Publisher's website BibTeX

Towards Architecture and OS-Independent Malware Detection via Memory Forensics

ACM Conference on Computer and Communications Security (ACM CCS)
Rachel Petrik, Berat Arik, and Jared M. Smith
Publisher's website BibTeX

Akatosh: Automated Cyber Incident Verification and Impact Analysis

ACM Conference on Computer and Communications Security (CCS)
Smith, Jared M., Greenlee, Elliot, Ferber, Aaron

Network Resiliency via Reactive Routing

Network and Distributed Systems Security Symposium (ISOC NDSS)
Jared M. Smith and Max Schuchard

The Impact of Analog Computational Error on an Analog Boolean Satisfiability Solver

IEEE International Symposium on Circuits and Systems (ISCAS)
Smith, Jared M. and Basford, David A and Connor, R Joseph and MacLennan, Bruce J and Holleman, Jeremy

Exploring a Framework for Identity and Attribute Linking Across Heterogeneous Data Systems

2nd International Big Data Software Engineering Workshop (BigDSE) at the ACM International Conference on Software Engineering (IEEE ICSE)
Nathan Wilder, Jared M. Smith, and Audris Mockus