Jeffrey Todd McDonald
Orcid: 0000-0001-5266-7470Affiliations:
- University of South Alabama, Mobile, Alabama USA
According to our database1,
Jeffrey Todd McDonald
authored at least 70 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
Autom. Softw. Eng., 2022
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022
2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
Predicting state transitions in brain dynamics through spectral difference of phase-space graphs.
J. Comput. Neurosci., 2019
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the 10th ACM International Conference on Bioinformatics, 2019
2018
J. Comput. Secur., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
2015
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Proceedings of the Cyber and Information Security Research Conference, 2014
Software Security and Randomization through Program Partitioning and Circuit Variation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014
2013
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
2012
Inf. Syst. E Bus. Manag., 2012
IEEE Secur. Priv., 2012
Proceedings of the Information Systems, Technology and Management, 2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
A Java based component identification tool for measuring the strength of circuit protections.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009
Increasing stability and distinguishability of the digital fingerprint in FPGAs through input word analysis.
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009
2008
Proceedings of the 2008 International Conference on Field-Programmable Technology, 2008
2007
Proceedings of the Security Protocols, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
2005
Proceedings of the First International Workshop on Security and Trust Management, 2005
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Of unicorns and random programs.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005
2004
Semantic Encryption Transformation Scheme.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
Mobile Agent Data Integrity Using Multi-agent Architecture.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004