Follow
Alec Yasinsac
Alec Yasinsac
Verified email at southalabama.edu
Title
Cited by
Cited by
Year
On the credibility of manet simulations
TR Andel, A Yasinsac
Computer 39 (7), 48-54, 2006
3202006
Computer forensics education
A Yasinsac, RF Erbacher, DG Marks, MM Pollitt, PM Sommer
IEEE Security & Privacy, 15-23, 2003
1932003
Policies to enhance computer and network forensics
A Yasinsac, Y Manzano
Proceedings of the 2001 IEEE workshop on information assurance and security …, 2001
1562001
Using 3d printers as weapons
M Yampolskiy, A Skjellum, M Kretzschmar, RA Overfelt, KR Sloan, ...
International Journal of Critical Infrastructure Protection 14, 58-71, 2016
1182016
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
992014
Surveying security analysis techniques in MANET routing protocols.
TR Andel, A Yasinsac
IEEE Communications Surveys and Tutorials 9 (1-4), 70-84, 2007
812007
Security challenges of additive manufacturing with metals and alloys
M Yampolskiy, L Schutzle, U Vaidya, A Yasinsac
Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015
652015
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
M Burmester, TV Le, A Yasinsac
Ad Hoc Networks 5 (3), 313-323, 2007
622007
An application of visual cryptography to financial documents
LW Hawkes, A Yasinsac, C Cline
Florida State University, Florida, 1-7, 2000
542000
Identifying flaws in the secure routing protocol
J Marshall, V Thakur, A Yasinsac
Performance, Computing, and Communications Conference, 2003. Conference …, 2003
502003
Honeytraps, a network forensic tool
A Yasinsac, Y Manzano
Sixth Multi-Conference on Systemics, Cybernetics and Informatics, 2002
432002
Honeytraps, a network forensic tool
A Yasinsac, Y Manzano
Sixth Multi-Conference on Systemics, Cybernetics and Informatics, 2002
432002
Software review and security analysis of the ES&S iVotronic 8.0. 1.2 voting machine firmware
A Yasinsac, D Wagner, M Bishop, T Baker, B de Medeiros, G Tyson, ...
Florida Department of State 66, 2007
382007
Metadata for anomaly-based security protocol attack deduction
T Leckie, A Yasinsac
IEEE Transactions on Knowledge and Data Engineering 16 (9), 1157-1168, 2004
382004
Adaptive threat modeling for secure ad hoc routing protocols
TR Andel, A Yasinsac
Electronic Notes in Theoretical Computer Science 197 (2), 3-14, 2008
352008
Ad hoc network security: Peer identification and authentication using signal properties
T Suen, A Yasinsac
Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth …, 2005
342005
A family of protocols for group key generation in ad hoc networks
A Yasinsac, V Thakur, S Carter, I Cubukcu
Proc. of IASTED International Conference on Communications and Computer …, 2002
342002
Accountable privacy
M Burmester, Y Desmedt, RN Wright, A Yasinsac
Lecture Notes in Computer Science 3957, 83-95, 2006
332006
The dynamics of counting and recounting votes
A Yasinsac, M Bishop
IEEE Security & Privacy 6 (3), 22-29, 2008
282008
A risk assessment model for voting systems using threat trees and monte carlo simulation
H Pardue, J Landry, A Yasinsac
2009 First International Workshop on Requirements Engineering for e-Voting …, 2009
272009
The system can't perform the operation now. Try again later.
Articles 1–20