Golden G. Richard III

According to our database1, Golden G. Richard III authored at least 61 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Proteus: A Scalable BFT Consesus Protocol for Blockchains.
CoRR, 2019

DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

An Experimental Evaluation of BFT Protocols for Blockchains.
Proceedings of the Blockchain - ICBC 2019, 2019

Consistent BFT Performance for Blockchains.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Proteus: A Scalable BFT Consensus Protocol for Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Memory forensics and the Windows Subsystem for Linux.
Digital Investigation, 2018

Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018

Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Modern windows hibernation file analysis.
Digital Investigation, 2017

Memory forensics: The path forward.
Digital Investigation, 2017

2016
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016

Development of Peer Instruction Questions for Cybersecurity Education.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

AspectDroid: Android App Analysis System.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Rapid forensic imaging of large disks with sifting collectors.
Digital Investigation, 2015

Advancing Mac OS X rootkit detection.
Digital Investigation, 2015

OpSeq: Android Malware Fingerprinting.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2014
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux.
Digital Investigation, 2014

2013
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection.
Proceedings of the Information Security, 16th International Conference, 2013

Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Acquisition and analysis of volatile memory from android devices.
Digital Investigation, 2012

SCADA Systems: Challenges for Forensic Investigators.
IEEE Computer, 2012

ModChecker: Kernel Module Integrity Checking in the Cloud Environment.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

2010
Massively Threaded Digital Forensics Tools.
Proceedings of the Handbook of Research on Computational Forensics, 2010

2009
A Highly Immersive Approach to Teaching Reverse Engineering.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

A Cloud Computing Platform for Large-Scale Forensic Computing.
Proceedings of the Advances in Digital Forensics V, 2009

2008
Class-Aware Similarity Hashing for Data Classification.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Forensic discovery auditing of digital evidence containers.
Digital Investigation, 2007

In-Place File Carving.
Proceedings of the Advances in Digital Forensics III, 2007

2006
md5bloom: Forensic filesystem hashing revisited.
Digital Investigation, 2006

Next-generation digital forensics.
Commun. ACM, 2006

dRamDisk: efficient RAM sharing on a commodity cluster.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

File System Support for Digital Evidence Bags.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

TouchSync: Lightweight Synchronization for Ad-Hoc Mobile Collaboration.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

Some new approaches for preventing software tampering.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Physically Locating Wireless Intruders.
J. UCS, 2005

Reliable ad hoc group communication using local neighborhoods.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Content-Based Image Retrieval for Digital Forensics.
Proceedings of the Advances in Digital Forensics, 2005

A Reliable Extension to the ODMRP Ad Hoc Multicast Protocol.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Scalpel: A Frugal, High Performance File Carver.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

Automatically Creating Realistic Targets for Digital Forensics Investigation.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

2004
Bluepipe: A Scalable Architecture for On-the-Spot Digital Forensics.
IJDE, 2004

Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Message from the Program Co-Chairs.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2003
Distributed multicast tree generation with dynamic group membership.
Comput. Commun., 2003

Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

2002
Reliable Group Communication in an Ad Hoc Network.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

A User Level Framework for Ad Hoc Routing.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

2001
Adaptive Header Compression for Wireless Networks.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

2000
Service Advertisement and Discovery: Enabling Universal Device Cooperation.
IEEE Internet Computing, 2000

An architecture for wireless LAN/WAN integration.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Julep: an environment for the evaluation of distributed process recovery protocols.
Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 2000

1999
Building Dynamic Multicast Trees in Mobile Networks.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
Efficient Vector Time with Dynamic Process Creation and Termination.
J. Parallel Distrib. Comput., 1998

On Patterns for Practical Fault Tolerant Software in Java.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Bessie: Portable Generation of Network Topologies for Simulation.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Using vector time to handle multiple failures in distributed systems.
IEEE Concurrency, 1997

1994
A Distributed Graphics Library System.
Softw., Pract. Exper., 1994

1993
Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared Memory.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993


  Loading...