Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jessica C. Murillo is active.

Publication


Featured researches published by Jessica C. Murillo.


Archive | 2008

Method and apparatus for detecting port scans with fake source address

Susann Marie Keohane; Gerald Francis McBrearty; Shawn Patrick Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh


Archive | 2007

Rogue router hunter

Susann Marie Keohane; Gerald Francis McBrearty; Shawn Patrick Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh


Archive | 2007

Touch surface-sensitive edit system

Susann Marie Keohane; Gerald Francis McBrearty; Shawn Patrick Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh


Archive | 2008

Method, apparatus, and computer program product to manage battery needs in a portable device

Susann Marie Keohane; Gerald Francis McBrearty; Shawn Patrick Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh


Archive | 2006

METHOD AND APPARATUS FOR REDUCED REDUNDANT SECURITY SCREENING

Susann Marie Keohane; Gerald Francis McBrearty; Shawn Patrick Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh


Archive | 2007

PASSWORD EXPIRATION BASED ON VULNERABILITY DETECTION

Susann Marie Keohane; Gerald Francis McBrearty; Patrick Shawn Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh


Archive | 2006

Method to Enhance Calendar Event Management by Automating the Selection of Attendees Based on Grouping and Response

Jessica C. Murillo; Gerald Francis McBrearty; Susann Marie Keohane; Johnny Meng-Han Shieh; Shawn Patrick Mullen


Archive | 2010

Performance Tuning for Software as a Performance Level Service

Susann Marie Keohane; Gerald Francis McBrearty; Shawn Patrick Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh


Archive | 2008

System and method for providing last log-in screen shots for security confirmation

Johnny Meng-Han Shieh; Gerald Francis McBrearty; Shawn Patrick Mullen; Susann Marie Keohane; Jessica C. Murillo


Archive | 2007

Method of presenting feedback to user of chances of password cracking, as the password is being created

Susann Marie Keohane; Gerald Francis McBrearty; Shawn Patrick Mullen; Jessica C. Murillo; Johnny Meng-Han Shieh

Researchain Logo
Decentralizing Knowledge