John Aycock

According to our database1, John Aycock
  • authored at least 52 papers between 1999 and 2016.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2016
Code Protection: When Abstinence is not an Option.
Proceedings of the 21st Western Canadian Conference on Computing Education, 2016

An Industrial Partnership Game Development Capstone Course.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Retrogame Archeology - Exploring Old Computer Games
Springer, ISBN: 978-3-319-30004-7, 2016

2015
Permutation Steganography in FAT Filesystems.
Trans. Data Hiding and Multimedia Security, 2015

Stringlish: improved English string searching in binary files.
Softw., Pract. Exper., 2015

A Game Engine in Pure Python for CS1: Design, Experience, and Limits.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

Applied Computer History: Experience Teaching Systems Topics through Retrogames.
Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, 2015

2014
An Experience Report on Extracting and Viewing Memory Events via Wireshark.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

2013
Assured Supraliminal Steganography in Computer Games.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
What's in a name. . . generator?
Journal in Computer Virology, 2012

Lightweight Client-Side Methods for Detecting Email Forgery.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

μPython: non-majors programming from the very first lecture.
Proceedings of the Annual Conference on Innovation and Technology in Computer Science Education, 2012

Babel: a secure computer is a polyglot.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

The Gold Standard: Automatically Generating Puzzle Game Levels.
Proceedings of the Eighth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, 2012

ThinAV: truly lightweight mobile cloud-based anti-malware.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Spyware and Adware
Advances in Information Security 50, Springer, ISBN: 978-0-387-77740-5, 2011

Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research.
Proceedings of the Financial Cryptography and Data Security, 2011

User-preference-based automated level generation for platform games.
Proceedings of the 2011 IEEE Conference on Computational Intelligence and Games, 2011

Does domain highlighting help people identify phishing sites?
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
SPoIM: A close look at pollution attacks in P2P live streaming.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Enbug: when debuggers go bad.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

Ethical Proactive Threat Research.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Early action in an Earley parser.
Acta Inf., 2009

Supraliminal Audio Steganography: Audio Files Tricking Audiophiles.
Proceedings of the Information Hiding, 11th International Workshop, 2009

A Multi-Agent Approach to Testing Anti-Spam Software.
Proceedings of the Database and Expert Systems Applications, 2009

Code Obfuscation Using Pseudo-random Number Generators.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Kwyjibo: automatic domain name generation.
Softw., Pract. Exper., 2008

"Good" worms and human rights.
SIGCAS Computers and Society, 2008

The tale of the weather worm.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Image spam - ASCII to the rescue!
Proceedings of the 3rd International Conference on Malicious and Unwanted Software, 2008

Spamulator: the Internet on a laptop.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

Global-scale Anti-spam Testing in Your Own Back Yard.
Proceedings of the CEAS 2008, 2008

2007
Army of Botnets.
Proceedings of the Network and Distributed System Security Symposium, 2007

Inverse Geolocation: Worms with a Sense of Direction.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Extracting NPC behavior from computer games using computer vision and machine learning techniques.
Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Games, 2007

2006
Anti-disassembly using Cryptographic Hash Functions.
Journal in Computer Virology, 2006

Teaching Spam and Spyware at the University of C@1g4ry.
Proceedings of the CEAS 2006, 2006

Computer Viruses and Malware
Advances in Information Security 22, Springer, ISBN: 978-0-387-30236-2, 2006

2005
Choice in the classroom.
SIGCSE Bulletin, 2005

Timing is everything.
Computers & Security, 2005

Viruses 101.
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005

An Exceptional Programming Language.
Proceedings of The 2005 International Conference on Programming Languages and Compilers, 2005

Improved Port Knocking with Strong Authentication.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Extending Old Compiler Tools with Meta-Tools.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

NEST: NEtwork Server Tool.
Proceedings of the International Conference on Internet Computing, 2004

2003
A brief history of just-in-time.
ACM Comput. Surv., 2003

2002
Practical Earley Parsing.
Comput. J., 2002

2001
Schrödinger's token.
Softw., Pract. Exper., 2001

Even faster generalized LR parsing.
Acta Inf., 2001

Directly-Executable Earley Parsing.
Proceedings of the Compiler Construction, 10th International Conference, 2001

2000
Simple Generation of Static Single-Assignment Form.
Proceedings of the Compiler Construction, 9th International Conference, 2000

1999
Faster Generalized LR Parsing.
Proceedings of the Compiler Construction, 8th International Conference, 1999


  Loading...