Jon Oakley

Orcid: 0000-0002-8140-428X

Affiliations:
  • Clemson University, SC, USA


According to our database1, Jon Oakley authored at least 14 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Distributed Denial of Service (DDoS): A History.
IEEE Ann. Hist. Comput., 2022

2021
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion.
CoRR, 2021

On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms.
Comput. Secur., 2021

2020
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Protocol Proxy: An FTE-based covert channel.
Comput. Secur., 2020

2019
Privacy Preserving Count Statistics.
CoRR, 2019

Traffic Analysis Resistant Network (TARN) Anonymity Analysis.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

2018
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Internet Security Liberated via Software Defined Exchanges.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data.
CoRR, 2017

TARN: A SDN-based traffic analysis resistant network architecture.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

2016
A brief survey of Cryptocurrency systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Provenance threat modeling.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016


  Loading...