Golden G. Richard III
Orcid: 0000-0001-8981-4446Affiliations:
- Louisiana State University, Applied Cybersecurity Lab, Baton Rouge, LA, USA
According to our database1,
Golden G. Richard III
authored at least 85 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on cct.lsu.edu
-
on orcid.org
On csauthors.net:
Bibliography
2024
Forensic Sci. Int. Digit. Investig., 2024
2023
Forensic Sci. Int. Digit. Investig., September, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Digit. Investig., 2021
2020
Comput. Secur., 2020
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.
Comput. Secur., 2020
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Digit. Investig., 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Blockchain - ICBC 2019, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
Digit. Investig., 2017
2016
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Digit. Investig., 2015
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015
2014
Digit. Investig., 2014
2013
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection.
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
2012
Digit. Investig., 2012
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
2010
Proceedings of the Handbook of Research on Computational Forensics, 2010
Digit. Investig., 2010
Digit. Investig., 2010
2009
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009
Proceedings of the Advances in Digital Forensics V, 2009
2008
Proceedings of the Advances in Digital Forensics IV, 2008
2007
Massive threading: Using GPUs to increase the performance of digital forensics tools.
Digit. Investig., 2007
2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006
Proceedings of the 44st Annual Southeast Regional Conference, 2006
2005
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
Proceedings of the Advances in Digital Forensics, 2005
A Reliable Extension to the ODMRP Ad Hoc Multicast Protocol.
Proceedings of the 2005 International Conference on Wireless Networks, 2005
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005
2004
Int. J. Digit. EVid., 2004
Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
2003
Comput. Commun., 2003
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003
2002
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002
2001
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001
2000
IEEE Internet Comput., 2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 2000
1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
J. Parallel Distributed Comput., 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998
1997
IEEE Concurrency, 1997
1994
1993
Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared Memory.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993