John Aycock
According to our database1, John Aycock
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepage:
On csauthors.net:
Bibliography
2016
Code Protection: When Abstinence is not an Option.
Proceedings of the 21st Western Canadian Conference on Computing Education, 2016
An Industrial Partnership Game Development Capstone Course.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016
Retrogame Archeology - Exploring Old Computer Games
Springer, ISBN: 978-3-319-30004-7, 2016
2015
Permutation Steganography in FAT Filesystems.
Trans. Data Hiding and Multimedia Security, 2015
Stringlish: improved English string searching in binary files.
Softw., Pract. Exper., 2015
A Game Engine in Pure Python for CS1: Design, Experience, and Limits.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015
Applied Computer History: Experience Teaching Systems Topics through Retrogames.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015
2014
An Experience Report on Extracting and Viewing Memory Events via Wireshark.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014
2013
Assured Supraliminal Steganography in Computer Games.
Proceedings of the Information Security Applications - 14th International Workshop, 2013
2012
What's in a name. . . generator?
Journal in Computer Virology, 2012
Lightweight Client-Side Methods for Detecting Email Forgery.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
μPython: non-majors programming from the very first lecture.
Proceedings of the Annual Conference on Innovation and Technology in Computer Science Education, 2012
Babel: a secure computer is a polyglot.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
The Gold Standard: Automatically Generating Puzzle Game Levels.
Proceedings of the Eighth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2012
ThinAV: truly lightweight mobile cloud-based anti-malware.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Spyware and Adware
Advances in Information Security 50, Springer, ISBN: 978-0-387-77740-5, 2011
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research.
Proceedings of the Financial Cryptography and Data Security, 2011
User-preference-based automated level generation for platform games.
Proceedings of the 2011 IEEE Conference on Computational Intelligence and Games, 2011
Does domain highlighting help people identify phishing sites?
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
SPoIM: A close look at pollution attacks in P2P live streaming.
Proceedings of the 18th International Workshop on Quality of Service, 2010
Enbug: when debuggers go bad.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010
Ethical Proactive Threat Research.
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Early action in an Earley parser.
Acta Inf., 2009
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
Proceedings of the Information Hiding, 11th International Workshop, 2009
A Multi-Agent Approach to Testing Anti-Spam Software.
Proceedings of the Database and Expert Systems Applications, 2009
Code Obfuscation Using Pseudo-random Number Generators.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Kwyjibo: automatic domain name generation.
Softw., Pract. Exper., 2008
"Good" worms and human rights.
SIGCAS Computers and Society, 2008
The tale of the weather worm.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Image spam - ASCII to the rescue!
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008
Spamulator: the Internet on a laptop.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008
Global-scale Anti-spam Testing in Your Own Back Yard.
Proceedings of the CEAS 2008, 2008
2007
Army of Botnets.
Proceedings of the Network and Distributed System Security Symposium, 2007
Inverse Geolocation: Worms with a Sense of Direction.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Extracting NPC behavior from computer games using computer vision and machine learning techniques.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Games, 2007
2006
Anti-disassembly using Cryptographic Hash Functions.
Journal in Computer Virology, 2006
Teaching Spam and Spyware at the University of C@1g4ry.
Proceedings of the CEAS 2006, 2006
Computer Viruses and Malware
Advances in Information Security 22, Springer, ISBN: 978-0-387-30236-2, 2006
2005
Choice in the classroom.
SIGCSE Bulletin, 2005
Timing is everything.
Computers & Security, 2005
Viruses 101.
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005
An Exceptional Programming Language.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005
Improved Port Knocking with Strong Authentication.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Extending Old Compiler Tools with Meta-Tools.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004
NEST: NEtwork Server Tool.
Proceedings of the International Conference on Internet Computing, 2004
2003
A brief history of just-in-time.
ACM Comput. Surv., 2003
2002
Practical Earley Parsing.
Comput. J., 2002
2001
Schrödinger's token.
Softw., Pract. Exper., 2001
Even faster generalized LR parsing.
Acta Inf., 2001
Directly-Executable Earley Parsing.
Proceedings of the Compiler Construction, 10th International Conference, 2001
2000
Simple Generation of Static Single-Assignment Form.
Proceedings of the Compiler Construction, 9th International Conference, 2000
1999
Faster Generalized LR Parsing.
Proceedings of the Compiler Construction, 8th International Conference, 1999