J. Todd McDonald
Title
Cited by
Cited by
Year
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
582014
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions
P Carsten, TR Andel, M Yampolskiy, JT McDonald
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
412015
An application of deception in cyberspace: Operating system obfuscation
S Murphy, JT McDonald, R Mills
Proceedings of the 5th International Conference on Information Warfare and …, 2010
232010
Compromising a medical mannequin
WB Glisson, T Andel, T McDonald, M Jacobs, M Campbell, J Mayr
arXiv preprint arXiv:1509.00065, 2015
222015
Software issues in digital forensics
JT McDonald, YC Kim, A Yasinsac
ACM SIGOPS Operating Systems Review 42 (3), 29-40, 2008
212008
Vulnerability analysis of desktop 3D printer software
S Moore, P Armstrong, T McDonald, M Yampolskiy
2016 Resilience Week (RWS), 46-51, 2016
202016
Design and analysis of a dynamically configured log-based distributed security event detection methodology
MR Grimaila, J Myers, RF Mills, G Peterson
The Journal of Defense Modeling and Simulation 9 (3), 219-241, 2012
202012
Semantic Encryption Transformation Scheme.
W Thompson, A Yasinsac, JT McDonald
ISCA PDCS, 516-521, 2004
202004
Mobile agent data integrity using multi-agent architecture
JT McDonald, A Yasinsac, WC Thompson III
AIR FORCE INST OF TECH WRIGHT-PATTERSONAFB OH, 2004
202004
Heterogeneous database integration using agent-oriented information systems
JT McDonald, ML Talbert, SA DeLoach
AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH DEPT OF ELECTRICAL AND …, 2000
182000
Application security models for mobile agent systems
JT McDonald, A Yasinsac
Electronic Notes in Theoretical Computer Science 157 (3), 43-59, 2006
172006
Attack-graph threat modeling assessment of ambulatory medical devices
P Luckett, JT McDonald, WB Glisson
arXiv preprint arXiv:1709.05026, 2017
162017
Developing systems for cyber situational awareness
J Okolica, JT McDonald, GL Peterson, RF Mills, MW Haas
2nd Cyberspace Research Workshop 46, 2009
162009
Program intent protection using circuit encryption
JT McDonald, A Yasinsac
Proc of the 8th Intl Symposium on System and Information Security, 2006
152006
A systems approach to cyber assurance education
TR Andel, JT McDonald
Proceedings of the 2013 on InfoSecCD'13: Information Security Curriculum …, 2013
142013
Forewarning of epileptic events from scalp EEG
LM Hively, JT McDonald, N Munro, E Cornelius
2013 Biomedical Sciences and Engineering Conference (BSEC), 1-4, 2013
132013
Increasing stability and distinguishability of the digital fingerprint in FPGAs through input word analysis
H Patel, Y Kim, JT McDonald, LV Starman
2009 International Conference on Field Programmable Logic and Applications …, 2009
132009
Agent-based architecture for modeling and simulation integration
JT McDONALD, ML Talbert
Proceedings of the IEEE 2000 National Aerospace and Electronics Conference …, 2000
132000
Protecting reprogrammable hardware with polymorphic circuit variation
JT McDonald, YC Kim, MR Grimaila
Proceedings of the 2nd Cyberspace Research Workshop, 63-78, 2009
122009
Functional polymorphism for intellectual property protection
JT McDonald, YC Kim, TR Andel, MA Forbes, J McVicar
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
112016
The system can't perform the operation now. Try again later.
Articles 1–20