Todd R. Andel

According to our database1, Todd R. Andel authored at least 53 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
Program Protection through Software-based Hardware Abstraction.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction.
Proceedings of the E-Business and Telecommunications - 18th International Conference, 2021

Medical Internet of Things: A Survey of the Current Threat and Vulnerability Landscape.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Polymorphic circuit generation using random boolean logic expansion.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Detecting Repackaged Android Applications Using Perceptual Hashing.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
What's in your honeypot: a privacy compliance perspective.
Int. J. Inf. Comput. Secur., 2019

Towards Protection Mechanisms for Secure and Efficient CAN Operation.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Simulation-Based Reduction of Operational and Cybersecurity Risks in Autonomous Vehicles.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2019

2018
Cloud forecasting: Legal visibility issues in saturated environments.
Comput. Law Secur. Rev., 2018

Digital Blues: An Investigation Into the Use of Bluetooth Protocols.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

CAN Authorization Using Message Priority Bit-Level Access Control.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Enhancing Security Against Software Attacks with Reprogrammable Hardware.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

On-Device Detection via Anomalous Environmental Factors.
Proceedings of the 8th Software Security, 2018

2017
Enhanced Operating System Protection to Support Digital Forensic Investigations.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Rootkit detection through phase-space analysis of power voltage measurements.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Cybersecurity issues in robotics.
Proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management, 2017

2016
Towards Security of Additive Layer Manufacturing.
CoRR, 2016

Legal Aspects of Protecting Intellectual Property in Additive Manufacturing.
Proceedings of the Critical Infrastructure Protection X, 2016

Functional polymorphism for intellectual property protection.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Utilizing the Cloud to Store Hijacked Camera Images.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

The Application of Moving Target Defense to Field Programmable Gate Arrays.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

Buffer overflow attack's power consumption signatures.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

Comparing the effectiveness of commercial obfuscators against MATE attacks.
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, 2016

2015
Investigating the Applicability of a Moving Target Defense for SCADA systems.
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

A System to Recognize Intruders in Controller Area Network (CAN).
Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research 2015, 2015

In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Compromising a Medical Mannequin.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Exploring security in ZigBee networks.
Proceedings of the Cyber and Information Security Research Conference, 2014

Software Security and Randomization through Program Partitioning and Circuit Variation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

Probing the Limits of Virtualized Software Protection.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

2013
A Systems Approach to Cyber Assurance Education.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

2012
Integrating Historical Security Jewels in Information Assurance Education.
IEEE Secur. Priv., 2012

Secure Internet Voting Protocol for Overseas Military Voters.
Proceedings of the Security Protocols XX, 2012

Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Modeling the optimized link-state routing protocol for verification.
Proceedings of the 2012 Spring Simulation Multiconference, 2012

An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration.
Proceedings of the Information Systems, Technology and Management, 2012

Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks.
Proceedings of the Information Systems, Technology and Management, 2012

2011
Automating the security analysis process of secure ad hoc routing protocols.
Simul. Model. Pract. Theory, 2011

Subjective audio quality over a secure IEEE 802.11n network.
Int. J. Secur. Networks, 2011

Measuring the performance of network virtualization tool N2N in the design of a cyber warfare training and education platform.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
SCADA Trust Management System.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Enhancing realistic hands-on network training in a virtual environment.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Developing a virtualization platform for courses in networking, systems administration and cyber security education.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Evaluation of an OPNET model for unmanned aerial vehicle (UAV) networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

2008
Automated Evaluation of Secure Route Discovery in MANET Protocols.
Proceedings of the Model Checking Software, 2008

Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks.
Proceedings of the 2008 IEEE International Performance, 2008

2007
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Surveying security analysis techniques in MANET routing protocols.
IEEE Commun. Surv. Tutorials, 2007

2006
On the Credibility of Manet Simulations.
Computer, 2006


  Loading...