Jeffrey Todd McDonald

Orcid: 0000-0001-5266-7470

Affiliations:
  • University of South Alabama, Mobile, Alabama USA


According to our database1, Jeffrey Todd McDonald authored at least 69 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
An Automated Security Concerns Recommender Based on Use Case Specification Ontology.
Autom. Softw. Eng., 2022

Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.
Proceedings of the Information Security - 25th International Conference, 2022

Introduction to the Minitrack on Cyber Operations, Defence, and Forensics.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Phase space power analysis for PC-based rootkit detection.
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022

2021
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B.
Big Data Cogn. Comput., 2021

Machine Learning Classification of Obfuscation using Image Visualization.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Program Protection through Software-based Hardware Abstraction.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

Machine Learning-Based Android Malware Detection Using Manifest Permissions.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Deception Detection Using Machine Learning.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Classifying Android Applications Via System Stats.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Polymorphic circuit generation using random boolean logic expansion.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Detecting Repackaged Android Applications Using Perceptual Hashing.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Predicting state transitions in brain dynamics through spectral difference of phase-space graphs.
J. Comput. Neurosci., 2019

Towards Protection Mechanisms for Secure and Efficient CAN Operation.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Investigating 3D Printer Residual Data.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Deep Learning Approach to Phase-Space Analysis for Seizure Detection.
Proceedings of the 10th ACM International Conference on Bioinformatics, 2019

2018
Identifying stealth malware using CPU power consumption and learning algorithms.
J. Comput. Secur., 2018

Digital Blues: An Investigation Into the Use of Bluetooth Protocols.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

CAN Authorization Using Message Priority Bit-Level Access Control.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Enhancing Security Against Software Attacks with Reprogrammable Hardware.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

MedDevRisk: Risk Analysis Methodology for Networked Medical Devices.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Leave It to Weaver.
Proceedings of the 8th Software Security, 2018

2017
Enhanced Operating System Protection to Support Digital Forensic Investigations.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Rootkit detection through phase-space analysis of power voltage measurements.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Exploitation and Detection of a Malicious Mobile Application.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
A Method for Developing Abuse Cases and Its Evaluation.
J. Softw., 2016

Towards Security of Additive Layer Manufacturing.
CoRR, 2016

Functional polymorphism for intellectual property protection.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Utilizing the Cloud to Store Hijacked Camera Images.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

The Application of Moving Target Defense to Field Programmable Gate Arrays.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

Buffer overflow attack's power consumption signatures.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

Comparing the effectiveness of commercial obfuscators against MATE attacks.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
A System to Recognize Intruders in Controller Area Network (CAN).
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Compromising a Medical Mannequin.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Exploring security in ZigBee networks.
Proceedings of the Cyber and Information Security Research Conference, 2014

Software Security and Randomization through Program Partitioning and Circuit Variation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

Probing the Limits of Virtualized Software Protection.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

2013
A Systems Approach to Cyber Assurance Education.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

Theorem-based, data-driven, cyber event detection.
Proceedings of the Cyber Security and Information Intelligence, 2013

Developing a power measurement framework for cyber defense.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Introduction to the special issue on cyber security and management.
Inf. Syst. E Bus. Manag., 2012

Integrating Historical Security Jewels in Information Assurance Education.
IEEE Secur. Priv., 2012

Capturing the Essence of Practical Obfuscation.
Proceedings of the Information Systems, Technology and Management, 2012

Evaluating component hiding techniques in circuit topologies.
Proceedings of IEEE International Conference on Communications, 2012

2011
Deterministic circuit variation for anti-tamper applications.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Using logic-based reduction for adversarial component recovery.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Java based component identification tool for measuring the strength of circuit protections.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Dynamic Polymorphic Reconfiguration for anti-tamper circuits.
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009

Increasing stability and distinguishability of the digital fingerprint in FPGAs through input word analysis.
Proceedings of the 19th International Conference on Field Programmable Logic and Applications, 2009

2008
Tamper Resistant Software Through Intent Protection.
Int. J. Netw. Secur., 2008

Creating digital fingerprints on commercial field programmable gate arrays.
Proceedings of the 2008 International Conference on Field-Programmable Technology, 2008

2007
Towards Working with Small Atomic Functions.
Proceedings of the Security Protocols, 2007

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs.
Proceedings of the The Second International Conference on Availability, 2007

2006
Foundations for Security Aware Software Development Education.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Application Security Models for Mobile Agent Systems.
Proceedings of the First International Workshop on Security and Trust Management, 2005

Hybrid Approach for Secure Mobile Agent Computations.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Of unicorns and random programs.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

2004
Semantic Encryption Transformation Scheme.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

Mobile Agent Data Integrity Using Multi-agent Architecture.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004


  Loading...