Jeffrey Todd McDonald
Orcid: 0000-0001-5266-7470Affiliations:
- University of South Alabama, Mobile, Alabama USA
  According to our database1,
  Jeffrey Todd McDonald
  authored at least 71 papers
  between 2004 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
    Proceedings of the 58th Hawaii International Conference on System Sciences, 2025
    
  
  2024
    Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
    
  
    Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
    
  
  2023
    Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
    
  
  2022
    Autom. Softw. Eng., 2022
    
  
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs.
    
  
    Proceedings of the 19th International Conference on Security and Cryptography, 2022
    
  
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.
    
  
    Proceedings of the Information Security - 25th International Conference, 2022
    
  
    Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
    
  
    Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022
    
  
  2021
    Proceedings of the 18th International Conference on Security and Cryptography, 2021
    
  
    Proceedings of the 18th International Conference on Security and Cryptography, 2021
    
  
    Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021
    
  
    Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
    
  
    Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
    
  
    Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
    
  
  2020
    Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
    
  
    Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
    
  
Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices.
    
  
    Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
    
  
  2019
Predicting state transitions in brain dynamics through spectral difference of phase-space graphs.
    
  
    J. Comput. Neurosci., 2019
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics, 2019
    
  
    Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
    
  
    Proceedings of the 10th ACM International Conference on Bioinformatics, 2019
    
  
  2018
    J. Comput. Secur., 2018
    
  
    Proceedings of the 17th IEEE International Conference On Trust, 2018
    
  
    Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018
    
  
Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis.
    
  
    Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
    
  
    Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
    
  
    Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
    
  
    Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
    
  
  2017
    Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
    
  
    Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
    
  
    Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
    
  
    Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
    
  
  2016
    Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
    
  
    Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
    
  
    Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016
    
  
    Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
    
  
    Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016
    
  
  2015
    Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015
    
  
    Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015
    
  
    Proceedings of the 21st Americas Conference on Information Systems, 2015
    
  
  2014
    Proceedings of the Cyber and Information Security Research Conference, 2014
    
  
Software Security and Randomization through Program Partitioning and Circuit Variation.
    
  
    Proceedings of the First ACM Workshop on Moving Target Defense, 2014
    
  
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing.
    
  
    Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014
    
  
    Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014
    
  
  2013
    Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
    
  
    Proceedings of the Cyber Security and Information Intelligence, 2013
    
  
    Proceedings of the Cyber Security and Information Intelligence, 2013
    
  
  2012
    Inf. Syst. E Bus. Manag., 2012
    
  
    IEEE Secur. Priv., 2012
    
  
    Proceedings of the Information Systems, Technology and Management, 2012
    
  
    Proceedings of IEEE International Conference on Communications, 2012
    
  
  2011
    Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
    
  
  2010
    Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
    
  
A Java based component identification tool for measuring the strength of circuit protections.
    
  
    Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
    
  
  2009
    Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009
    
  
Increasing stability and distinguishability of the digital fingerprint in FPGAs through input word analysis.
    
  
    Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009
    
  
  2008
    Proceedings of the 2008 International Conference on Field-Programmable Technology, 2008
    
  
  2007
    Proceedings of the Security Protocols, 2007
    
  
    Proceedings of the The Second International Conference on Availability, 2007
    
  
  2006
    Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
    
  
  2005
    Proceedings of the First International Workshop on Security and Trust Management, 2005
    
  
    Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
    
  
Of unicorns and random programs.
  
    Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005
    
  
  2004
Semantic Encryption Transformation Scheme.
  
    Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
    
  
Mobile Agent Data Integrity Using Multi-agent Architecture.
  
    Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004