Seguir
J. Todd McDonald
Título
Citado por
Citado por
Año
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions
P Carsten, TR Andel, M Yampolskiy, JT McDonald
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
1192015
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
1022014
Vulnerability analysis of desktop 3D printer software
S Moore, P Armstrong, T McDonald, M Yampolskiy
2016 Resilience Week (RWS), 46-51, 2016
512016
Machine learning-based android malware detection using manifest permissions
N Herron, WB Glisson, JT McDonald, RK Benton
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
442021
Neural network analysis of system call timing for rootkit detection
P Luckett, JT McDonald, J Dawson
2016 Cybersecurity Symposium (CYBERSEC), 1-6, 2016
352016
Attack-graph threat modeling assessment of ambulatory medical devices
P Luckett, JT McDonald, WB Glisson
arXiv preprint arXiv:1709.05026, 2017
332017
Compromising a medical mannequin
WB Glisson, T Andel, T McDonald, M Jacobs, M Campbell, J Mayr
arXiv preprint arXiv:1509.00065, 2015
332015
Exploring security in ZigBee networks
LN Whitehurst, TR Andel, JT McDonald
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
322014
Comparing the effectiveness of commercial obfuscators against MATE attacks
R Manikyam, JT McDonald, WR Mahoney, TR Andel, SH Russ
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
312016
An application of deception in cyberspace: Operating system obfuscation1
S Murphy, T McDonald, R Mills
International Conference on Cyber Warfare and Security, 241, 2010
302010
Detecting repackaged android applications using perceptual hashing
T Nguyen, JT McDonald, WB Glisson, TR Andel
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
262020
Software issues in digital forensics
JT McDonald, YC Kim, A Yasinsac
ACM SIGOPS Operating Systems Review 42 (3), 29-40, 2008
252008
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis
JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
242018
Functional polymorphism for intellectual property protection
JT McDonald, YC Kim, TR Andel, MA Forbes, J McVicar
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
242016
Developing systems for cyber situational awareness
J Okolica, JT McDonald, GL Peterson, RF Mills, MW Haas
232009
On SCADA PLC and fieldbus cyber-security
CC Davidson, T Andel, M Yampolskiy, JT McDonald, B Glisson, T Thomas
13th International Conference on Cyber Warfare and Security, 140-149, 2018
212018
Semantic Encryption Transformation Scheme.
W Thompson, A Yasinsac, JT McDonald
PDCS, 516-521, 2004
212004
Mobile Agent Data Integrity Using Multi-agent Architecture.
JT McDonald, A Yasinsac, WC Thompson III
PDCS, 536-542, 2004
212004
Heterogeneous database integration using agent oriented information systems
JT McDonald, ML Talbert, SA DeLoach
Proceedings of the International Conference on Artificial Intelligence 2000, 26, 2000
212000
A systems approach to cyber assurance education
TR Andel, JT McDonald
Proceedings of the 2013 on InfoSecCD'13: Information Security Curriculum …, 2013
192013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20