Jeanna Matthews' Publications/Presentations

C. Fiandrino, B. Kantarci, F. Anjomshoa, D. Kliazovich, P. Bouvry, J. Matthews,
Sociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms
IEEE Transactions on Sustainable Computing, May 6 2017.
DOI: 10.1109/TSUSC.2017.2702060

ACM US Public Policy Council (USACM) ,
Statement on Algorithmic Transparency and Accountability ,
January 12 2017.

R. Bull, J. Matthews, K. Trumbull
VLAN Hopping, ARP Poisoning & Man-In-The-Middle Attacks in Virtualized Environments
DEFCON24, Las Vegas, August 6-9 2016.
PDF
Paper , Video , Demos , Slides , Abstract/Bios

C. Fiandrino, B. Kantarci, F. Anjomshoa, D. Kliazovich, P. Bouvry, J. Matthews,
Sociability-Driven User Recruitment in Mobile Crowdsensing Internet of Things Platforms
Proceedings of IEEE GLOBECOM 2016, Washington D.C., December 2016.
PDF
Slides

S. Gurajala, J White, B.Hudson, B. Voter and J. Matthews,
Profile characteristics of fake Twitter accounts
Big Data & Society, July‐December 2016: 1‐13.
DOI: 10.1177/2053951716674236

E. Dow and J. Matthews,
WAYFINDER: parallel virtual machine reallocation through A* search
Memetic Computing, 8(4), 255-267, Springer-Verlag Berlin Heidelberg, August 2016.
DOI 10.1007/s12293-016-0205-2

H. Jiang, Y. Liu, J. Matthews,
IP Geolocation Estimation using Neural Networks with Stable Landmarks
19th IEEE Global Internet Symposium, San Francisco, CA, USA, April 11, 2016.
PDF , Slides .

P. Glasser, O. Kocabas, B. Kantarci, T. Soyata, and J. Matthews,
Energy efficient VM migration revisited: SLA assurance and minimum service disruption with available hosts
Proceedings of the 12th International Conference on High-capacity Optical Networks and Emerging/Enabling Technologies (HONET), Dec 2015. Best Paper Award.
PDF

E. Dow and J. Matthews,
Virtual Machine Migration Plan Generation Through A* Search
2015 IEEE 4th International Conference on Cloud Networking (CloudNet) , Niagrara Falls, ON, October 5-7 2015.
PDF

R. Bull and J. Matthews,
Exploring Layer 2 Network Security in Virtualized Environments
DEFCON23, Las Vegas, August 6-9 2015.
PDF
Paper , Video , Other Materials , Journal Version, Journal link

S. Gurajala, J. White, B. Hudson, J. Matthews,
Fake Twitter accounts: Profile characteristics obtained using an activity-based pattern detection approach
2015 Social Media & Society Conference, Toronto, Canada, July 27-29 2015.
PDF

J. White and J. Matthews
Connectors, Mavens, Salesman and More: An Actor-Based Online Social Network (OSN) Analysis Method Using Tensed Predicate Logic
ASE SocialInformatics 2014, December 2014.
PDF
Slides

J. Matthews
Strategies for Computer Security Research: Practical Strategies for Taming the Angst and Changing the World
Women in Cybersecurity Conference , Nashville, TN, April 11-12 2014.
Slides: PDF , referenced materials .

J. White and J. Matthews
It's you on photo?: Automatic Detection of Twitter Accounts Infected With the Blackhole Exploit Kit
(Malware 2013), October 2013.
PDF

W. Hu, A. Hicks, L. Zhang, E. Dow, V. Soni, H. Jiang, R. Bull, J. Matthews
A Quantitative Study of Virtual Machine Live Migration
The ACM Cloud and Autonomic Computing Conference (CAC2013), August 2013.
PDF

J. White, T. Fitzsimmons, J. Matthews
Quantitative Analysis of Intrusion Detection Systems: Snort and Suricata
Cyber Sensing 2013, Proceedings of SPIE (8757) , April 2013.
PDF

Future of Cloud Computing Think Tank ,
Excerpt .

J. White, J. Matthews, J. Stacy
A method for the automated detection phishing websites through both site characteristics and image analysis
Cyber Sensing 2012, Proceedings of SPIE 8408/84080B(2012) , April 2012.
PDF

J. White, J. Matthews, J. Stacy
Coalmine: an experience in building a system for social media analytics
Cyber Sensing 2012, Proceedings of SPIE 8408/84080A(2012) , April 2012.
PDF

W. Hu, J. Matthews, T. Yang
The Good, the Bad and the Ugly of Consumer Cloud Storage
Operating System Review, Volume 44, Issue 3, July 2010 .
PDF

J. Matthews, T. Garfinkel, C. Hoff, J. Wheeler
Virtual Machine Contracts for Datacenter and Cloud Computing Environments
Proceedings of the First Workshop on Automated Control for Datacenters and Clouds (ACDC09 ), June 2009.
PDF

J. Matthews
Restructuring desktops to support prevention, detection and recovery
Work-In-Progress presentation at the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET09 ), April 2009.
PDF

W. Hu, T. Deshane, J. Matthews
Solaris Virtualization Options
;login: The USENIX Magazine, Volume 33, Number 5, p. 7-17, October 2008.
PDF

T. Deshane, Z. Shepherd, J. Matthews, M. Ben-Yehuda, A. Shah, B. Rao
Quantitative Comparison of Xen and KVM
Xen Summit Boston 2008 , June 23-24 2008.
PDF

J. Owens and J. Matthews
A Study of Passwords and Methods Used in Brute-Force SSH Attacks
Submitted to LEET08, February 2008.
Related SANS report
[PDF ]

J. Owens and J. Matthews
CyberCivics - A Novel Approach to Reaching K-12 Students with the Social Relevance of Computer Science
Proceedings of SIGCSE 2008, March 2008.
[PDF ]

M. Mueter, F. Freiling, T. Holz, and Jeanna Matthews
A Generic Toolkit for Converting Web Applications Into High-Interaction Honeypots
[PDF ]

J. Matthews, W. Hu, M. Hapauarachchi, T. Deshane, D. Dimatos, G. Hamilton, M. McCabe, J. Owens
Quantifying the Performance Isolation Properties of Virtualization Systems
ExpCS 2007, June 2007. [PDF ]
Earlier version of this paper: [PDF ]

S. Soltesz, M. Fiuczynski, L. Peterson, M. McCabe, J. Matthews
Virtual Doppelg(anger: On the Performance, Isolation, and Scalability of Para- and Paene- Virtualized Systems
[PDF ]

J. Matthews, J. Herne, T. Deshane, P. Jablonski, L. Cherian, M McCabe
Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances
Proceedings of the IASTED International Conference on Communication, Network and Information Security ( CNIS 2005), p. 170-181, November 2005. [PDF ]

J. Matthews
Hands-on Approach to Teaching Computer Networking Using Packet Traces
Proceedings of the ACM SIGITE Conference 2005, p. 361-367, October 2005. [PDF]

J. Matthews
Common Sense Computing: An Approach to Community Outreach with IT
Proceedings of the ACM SIGITE Conference 2005, p. 375-376, October 2005. [PDF]

T. Deshane, P.Jablonski, K. Roberts, J. Matthews
Web-Based Collaborative Exploration and Characterization of Large Databases
International Journal of Technology, Knowledge and Society, Volume 1, 2005.
[PDF]

B. Clark and J. Matthews
Adaptive Composition of Layers in a Multi-Layer User Interface
Proceedings of 11th International Conference on Human-Computer Interaction, Volume 7, July 2005. [PDF]

J. Matthews
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Teacher Enrichment for Computer Science Module,
College Board and Computer Science Teachers Association, July 2005.

T. Deshane, P.Jablonski, K. Roberts and J. Matthews
Web-Based Collaborative Exploration and Characterization of Large Databases
Virtual Presentation, International Conference on Technology, Knowledge and Society, February 2005.

J. Matthews
Computer Networking Internet Protocols In Action
John Wiley & Sons, ISBN 0-471-66186-4, December 2004.

B. Clark, T. Deshane, E. Dow, S. Evanchik, M. Finlayson, J. Herne and J. Matthews
Xen and the Art of Repeated Research
Proceedings of the USENIX 2004 Annual Technical Conference, FREENIX Track, p. 135-144, June 2004.
[PDF]

B. Clark and J. Matthews
Deciding Layers in a Multi-Layer User Interface
Accepted for the 8th ERCIM UI4All Workshop, June 2004.
[ PDF ]

K. Marzullo, G. Muller, J. Matthews, W. Waite, G. Voelker
New Types of Content in Operating Systems Review?
Operating System Review, Volume 38, Number 3, July 2004.

J. Matthews
The Case for Repeated Research In Operating Systems
Operating System Review, Volume 38, Number 2, p.5 - 7, April 2004.
[PDF]

J. Matthews
Hands-on experience and historical perspective on research are key to teaching Linux
IBM developerWorks, June 2002.

J. Matthews
How One Small Class Produced Three Huge Winners
Clarkson Magazine, MMI(2), Winter 2002, p. 13-14.

T. Anderson, M. Dahlin, J. Matthews, D. Patterson, D. Roselli and R. Wang
Serverless Network File Systems
Chapter in High Performance Mass Storage and Parallel I/O: Technologies and Applications
Edited by Hai Jin, Toni Cortes, and Rajkumar Buyya,
John Wiley & Sons, ISBN 047120894, November 2001.

Network of Workstations Project
U.C. Berkeley NOW Project, Collected Publications 1994-1996
University of California, Berkeley, Computer Science Division.

J. Matthews
Improving File System Performance With Adaptive Methods,
University of California, Berkeley, Ph.D. Dissertation, December 1999. [PDF]

J. Matthews, D. Roselli, A. Costello, R. Wang, and T. Anderson
Improving the Performance of Log-Structured File Systems With Adaptive Methods
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, Saint Malo, France, Volume 31, Issue 5, p. 238-251, October 1997. [PDF]

T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli and R. Wang
Serverless Network File Systems
ACM Transactions on Computer Systems, Volume 14, Issue 1, p. 41-79, February 1996.

T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli and R. Wang
Serverless Network File Systems
Proceedings of the Fifteenth ACM Symposium on Operating System Principles, Copper Mountain, Colorado, Volume 29, Issue 5, p. 109-126, December 1995.

T. Anderson, D. Culler, D. Patterson and the NOW Team
A Case for Network of Workstations
IEEE Micro, Volume 15, Issue 1, p. 54-64, February 1995.