Daryl Johnson

According to our database1, Daryl Johnson authored at least 13 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Minecraft Altered Skin Channel (MASC).
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
Visualization for Spectators in Cybersecurity Competitions.
Proceedings of the 17th IEEE Symposium on Visualization for Cyber Security, VizSec 2020, 2020

Leveraging a Music Streaming Platform in Establishing a Novel Storage Covert Channel.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

2017
Covert Channel over Network Time Protocol.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2016
An Extended Discussion on a High-Capacity Covert channel for the Android Operating System.
Int. J. Comput., 2016

2015
A New Covert Channel over Cellular Voice Channel in Smartphones.
CoRR, 2015

Exploring a high-capacity covert channel on the Android operating system.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2014
Leveraging public posts and comments as covert channels.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2014

Vehicle classification accuracy of AVC and WIM sites in Oklahoma.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014

2011
A HTTP cookie covert channel.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Third Party Application Forensics on Apple Mobile Devices.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
A Re-examination of Network Address Translation Security.
Proceedings of the 2010 International Conference on Security & Management, 2010

2004
Network and systems security, a collaborative approach.
Proceedings of the 5th Conference on Information Technology Education, 2004


  Loading...