Takip et
J. Todd McDonald
J. Todd McDonald
southalabama.edu üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions
P Carsten, TR Andel, M Yampolskiy, JT McDonald
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
1262015
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
1052014
Vulnerability analysis of desktop 3D printer software
S Moore, P Armstrong, T McDonald, M Yampolskiy
2016 Resilience Week (RWS), 46-51, 2016
562016
Machine learning-based android malware detection using manifest permissions
N Herron, WB Glisson, JT McDonald, RK Benton
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
512021
Comparing the effectiveness of commercial obfuscators against MATE attacks
R Manikyam, JT McDonald, WR Mahoney, TR Andel, SH Russ
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
392016
Neural network analysis of system call timing for rootkit detection
P Luckett, JT McDonald, J Dawson
2016 Cybersecurity Symposium (CYBERSEC), 1-6, 2016
372016
Compromising a medical mannequin
WB Glisson, T Andel, T McDonald, M Jacobs, M Campbell, J Mayr
arXiv preprint arXiv:1509.00065, 2015
342015
An application of deception in cyberspace: Operating system obfuscation1
S Murphy, T McDonald, R Mills
International Conference on Cyber Warfare and Security, 241, 2010
332010
Attack-graph threat modeling assessment of ambulatory medical devices
P Luckett, JT McDonald, WB Glisson
arXiv preprint arXiv:1709.05026, 2017
322017
Exploring security in ZigBee networks
LN Whitehurst, TR Andel, JT McDonald
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
322014
Detecting repackaged android applications using perceptual hashing
T Nguyen, JT McDonald, WB Glisson, TR Andel
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
282020
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis
JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
282018
Software issues in digital forensics
JT McDonald, YC Kim, A Yasinsac
ACM SIGOPS Operating Systems Review 42 (3), 29-40, 2008
262008
Functional polymorphism for intellectual property protection
JT McDonald, YC Kim, TR Andel, MA Forbes, J McVicar
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
252016
On SCADA PLC and fieldbus cyber-security
CC Davidson, T Andel, M Yampolskiy, JT McDonald, B Glisson, T Thomas
13th International Conference on Cyber Warfare and Security, 140-149, 2018
242018
Developing systems for cyber situational awareness
J Okolica, JT McDonald, GL Peterson, RF Mills, MW Haas
232009
Identifying stealth malware using CPU power consumption and learning algorithms
P Luckett, JT McDonald, WB Glisson, R Benton, J Dawson, BA Doyle
Journal of Computer Security 26 (5), 589-613, 2018
222018
Mobile Agent Data Integrity Using Multi-agent Architecture.
JT McDonald, A Yasinsac, WC Thompson III
PDCS, 536-542, 2004
222004
Semantic Encryption Transformation Scheme.
W Thompson, A Yasinsac, JT McDonald
PDCS, 516-521, 2004
212004
Heterogeneous database integration using agent oriented information systems
JT McDonald, ML Talbert, SA DeLoach
Proceedings of the International Conference on Artificial Intelligence 2000, 26, 2000
212000
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20