Segui
J. Todd McDonald
Titolo
Citata da
Citata da
Anno
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions
P Carsten, TR Andel, M Yampolskiy, JT McDonald
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
1132015
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
982014
Vulnerability analysis of desktop 3D printer software
S Moore, P Armstrong, T McDonald, M Yampolskiy
2016 Resilience Week (RWS), 46-51, 2016
482016
Machine learning-based android malware detection using manifest permissions
N Herron, WB Glisson, JT McDonald, RK Benton
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
362021
Neural network analysis of system call timing for rootkit detection
P Luckett, JT McDonald, J Dawson
2016 Cybersecurity Symposium (CYBERSEC), 1-6, 2016
342016
Attack-graph threat modeling assessment of ambulatory medical devices
P Luckett, JT McDonald, WB Glisson
arXiv preprint arXiv:1709.05026, 2017
322017
Compromising a medical mannequin
WB Glisson, T Andel, T McDonald, M Jacobs, M Campbell, J Mayr
arXiv preprint arXiv:1509.00065, 2015
322015
An application of deception in cyberspace: Operating system obfuscation1
S Murphy, T McDonald, R Mills
International Conference on Cyber Warfare and Security, 241, 2010
302010
Comparing the effectiveness of commercial obfuscators against MATE attacks
R Manikyam, JT McDonald, WR Mahoney, TR Andel, SH Russ
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
292016
Exploring security in ZigBee networks
LN Whitehurst, TR Andel, JT McDonald
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
292014
Functional polymorphism for intellectual property protection
JT McDonald, YC Kim, TR Andel, MA Forbes, J McVicar
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
242016
Software issues in digital forensics
JT McDonald, YC Kim, A Yasinsac
ACM SIGOPS Operating Systems Review 42 (3), 29-40, 2008
242008
Detecting repackaged android applications using perceptual hashing
T Nguyen, JT McDonald, WB Glisson, TR Andel
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
232020
Developing systems for cyber situational awareness
J Okolica, JT McDonald, GL Peterson, RF Mills, MW Haas
232009
Heterogeneous database integration using agent oriented information systems
JT McDonald, ML Talbert, SA DeLoach
Proceedings of the International Conference on Artificial Intelligence 2000, 26, 2000
232000
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis
JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
222018
Semantic Encryption Transformation Scheme.
W Thompson, A Yasinsac, JT McDonald
PDCS, 516-521, 2004
212004
Mobile Agent Data Integrity Using Multi-agent Architecture.
JT McDonald, A Yasinsac, WC Thompson III
PDCS, 536-542, 2004
212004
On SCADA PLC and fieldbus cyber-security
CC Davidson, T Andel, M Yampolskiy, JT McDonald, B Glisson, T Thomas
13th International Conference on Cyber Warfare and Security, 140-149, 2018
192018
A systems approach to cyber assurance education
TR Andel, JT McDonald
Proceedings of the 2013 on InfoSecCD'13: Information Security Curriculum …, 2013
182013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20