default search action
Jeffrey Todd McDonald
Person information
- affiliation: University of South Alabama, Mobile, Alabama USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c61]Jeffrey Todd McDonald, Philip Menard, William Glisson:
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics. HICSS 2024: 7375-7376 - [c60]Jordan Shropshire, Todd McDonald:
Assessing the Integrity of Mobile Platform-Based Sensor Data Pipelines. ISDFS 2024: 1-6 - 2023
- [c59]William Glisson, George Grispos, Jeffrey Todd McDonald:
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics. HICSS 2023: 6601-6602 - 2022
- [j8]Imano Williams, Xiaohong Yuan, Mohd Anwar, Jeffrey Todd McDonald:
An Automated Security Concerns Recommender Based on Use Case Specification Ontology. Autom. Softw. Eng. 29(2): 42 (2022) - [c58]Jeffrey Todd McDonald, Rebecca C. Clark, Lee M. Hively, Samuel H. Russ:
Phase space power analysis for PC-based rootkit detection. ACM Southeast Regional Conference 2022: 82-90 - [c57]William Glisson, George Grispos, Jeffrey Todd McDonald:
Introduction to the Minitrack on Cyber Operations, Defence, and Forensics. HICSS 2022: 1-2 - [c56]Mark Yampolskiy, Lynne Graves, Jacob Gatlin, Jeffrey Todd McDonald, Moti Yung:
Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files. ISC 2022: 40-52 - [c55]Jeffrey Todd McDonald, Jennifer Parnell, Todd R. Andel, Samuel H. Russ:
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs. SECRYPT 2022: 181-192 - 2021
- [j7]Dustin Mink, Jeffrey Todd McDonald, Sikha Bagui, William Bradley Glisson, Jordan Shropshire, Ryan Benton, Samuel H. Russ:
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B. Big Data Cogn. Comput. 5(2): 27 (2021) - [c54]Joshua Hightower, William Bradley Glisson, Ryan Benton, Jeffrey Todd McDonald:
Classifying Android Applications Via System Stats. IEEE BigData 2021: 5388-5394 - [c53]Alberto Alejandro Ceballos Delgado, William Bradley Glisson, Narasimha K. Shashidhar, Jeffrey Todd McDonald, George Grispos, Ryan Benton:
Deception Detection Using Machine Learning. HICSS 2021: 1-10 - [c52]Jeffrey Todd McDonald, Nathan Herron, William Bradley Glisson, Ryan Benton:
Machine Learning-Based Android Malware Detection Using Manifest Permissions. HICSS 2021: 1-10 - [c51]Jeffrey Todd McDonald, Ramya K. Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel, James Carambat:
Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction. ICETE (Selected Papers) 2021: 281-304 - [c50]Jeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel:
Program Protection through Software-based Hardware Abstraction. SECRYPT 2021: 247-258 - [c49]Colby Parker, Jeffrey Todd McDonald, Dimitrios Damopoulos:
Machine Learning Classification of Obfuscation using Image Visualization. SECRYPT 2021: 854-859 - 2020
- [c48]Bronwyn Hodges, Jeffrey Todd McDonald, William Glisson, Mike Jacobs, Maureen Van Devender, John Harold Pardue:
Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices. HICSS 2020: 1-10 - [c47]Thanh Nguyen, Jeffrey Todd McDonald, William Bradley Glisson, Todd R. Andel:
Detecting Repackaged Android Applications Using Perceptual Hashing. HICSS 2020: 1-10 - [c46]Jeffrey Todd McDonald, Trinity L. Stroud, Todd R. Andel:
Polymorphic circuit generation using random boolean logic expansion. SAC 2020: 1753-1762
2010 – 2019
- 2019
- [j6]Patrick Luckett, Elena Pavelescu, Todd McDonald, Lee M. Hively, Juan Ochoa:
Predicting state transitions in brain dynamics through spectral difference of phase-space graphs. J. Comput. Neurosci. 46(1): 91-106 (2019) - [c45]Patrick Luckett, Thomas Watts, Jeffrey Todd McDonald, Lee M. Hively, Ryan Benton:
A Deep Learning Approach to Phase-Space Analysis for Seizure Detection. BCB 2019: 190-196 - [c44]Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald:
Investigating 3D Printer Residual Data. HICSS 2019: 1-10 - [c43]Todd R. Andel, Jeffrey Todd McDonald, Adam J. Brown, Tyler H. Trigg, Paul W. Cartsten:
Towards Protection Mechanisms for Secure and Efficient CAN Operation. ICCE 2019: 1-6 - [i5]Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald:
Investigating 3D Printer Residual Data. CoRR abs/1901.07507 (2019) - 2018
- [j5]Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson, Ryan Benton, Joel A. Dawson, Blair A. Doyle:
Identifying stealth malware using CPU power consumption and learning algorithms. J. Comput. Secur. 26(5): 589-613 (2018) - [c42]William Mahoney, Joseph Franco, Greg Hoff, Jeffrey Todd McDonald:
Leave It to Weaver. SSPREW@ACSAC 2018: 6:1-6:9 - [c41]Katherine Seale, Jeffrey Todd McDonald, William Bradley Glisson, John Harold Pardue, Michael Jacobs:
MedDevRisk: Risk Analysis Methodology for Networked Medical Devices. HICSS 2018: 1-10 - [c40]Adam J. Brown, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
CAN Authorization Using Message Priority Bit-Level Access Control. ICDIS 2018: 1-8 - [c39]Joel A. Dawson, Jeffrey Todd McDonald, Lee M. Hively, Todd R. Andel, Mark Yampolskiy, Charles Hubbard:
Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis. ICDIS 2018: 159-167 - [c38]Todd R. Andel, Lindsey N. Whitehurst, Jeffrey Todd McDonald, Waleed Al-Assadi:
Enhancing Security Against Software Attacks with Reprogrammable Hardware. ICDIS 2018: 258-266 - [c37]Colby Parker, Jeffrey Todd McDonald, Tom Johnsten, Ryan G. Benton:
Android Malware Detection Using Step-Size Based Multi-layered Vector Space Models. MALWARE 2018: 49-58 - [c36]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. TrustCom/BigDataSE 2018: 498-503 - [e6]Jeffrey Todd McDonald, Sébastien Bardin, Natalia Stakhanova:
Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018. ACM 2018, ISBN 978-1-4503-6096-8 [contents] - [i4]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation into the Use of Bluetooth Protocols. CoRR abs/1808.02153 (2018) - 2017
- [c35]Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson:
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices. HICSS 2017: 1-10 - [c34]Thanh Nguyen, Jeffrey Todd McDonald, William Bradley Glisson:
Exploitation and Detection of a Malicious Mobile Application. HICSS 2017: 1-10 - [c33]Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively:
Rootkit detection through phase-space analysis of power voltage measurements. MALWARE 2017: 19-27 - [c32]Jeffrey Todd McDonald, Ramya Manikyam, William Bradley Glisson, Todd R. Andel, Yuan Xiang Gu:
Enhanced Operating System Protection to Support Digital Forensic Investigations. TrustCom/BigDataSE/ICESS 2017: 650-659 - [i3]Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson:
Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices. CoRR abs/1709.05026 (2017) - 2016
- [j4]Imano Williams, Xiaohong Yuan, Jeffrey Todd McDonald, Mohd Anwar:
A Method for Developing Abuse Cases and Its Evaluation. J. Softw. 11(5): 520-527 (2016) - [c31]Samuel Bennett Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey Todd McDonald, Todd R. Andel:
Buffer overflow attack's power consumption signatures. SSPREW@ACSAC 2016: 6:1-6:7 - [c30]Ramya Manikyam, Jeffrey Todd McDonald, William R. Mahoney, Todd R. Andel, Samuel H. Russ:
Comparing the effectiveness of commercial obfuscators against MATE attacks. SSPREW@ACSAC 2016: 8:1-8:11 - [c29]John Dombrowski, Todd R. Andel, Jeffrey Todd McDonald:
The Application of Moving Target Defense to Field Programmable Gate Arrays. CISRC 2016: 20:1-20:4 - [c28]Christos Kynigos, William Bradley Glisson, Todd R. Andel, Jeffrey Todd McDonald:
Utilizing the Cloud to Store Hijacked Camera Images. HICSS 2016: 5497-5506 - [c27]Jeffrey Todd McDonald, Yong C. Kim, Todd R. Andel, Miles A. Forbes, James McVicar:
Functional polymorphism for intellectual property protection. HOST 2016: 61-66 - [e5]Mila Dalla Preda, Natalia Stakhanova, Jeffrey Todd McDonald:
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California, USA, December 5-6, 2016. ACM 2016, ISBN 978-1-4503-4841-6 [contents] - [i2]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Towards Security of Additive Layer Manufacturing. CoRR abs/1602.07536 (2016) - 2015
- [c26]Todd R. Andel, Matt Campbell, William Bradley Glisson, Mike Jacobs, Johnny Mayr, Jeffrey Todd McDonald:
Compromising a Medical Mannequin. AMCIS 2015 - [c25]Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. CISR 2015: 1:1-1:8 - [c24]Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald, Samuel H. Russ:
A System to Recognize Intruders in Controller Area Network (CAN). ICS-CSR 2015 - [e4]Jeffrey Todd McDonald, Mila Dalla Preda, Natalia Stakhanova:
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015. ACM 2015, ISBN 978-1-4503-3642-0 [contents] - [i1]William Bradley Glisson, Todd R. Andel, Jeffrey Todd McDonald, Mike Jacobs, Matt Campbell, Johnny Mayr:
Compromising a Medical Mannequin. CoRR abs/1509.00065 (2015) - 2014
- [c23]Joshua Cazalas, Jeffrey Todd McDonald, Todd R. Andel, Natalia Stakhanova:
Probing the Limits of Virtualized Software Protection. PPREW@ACSAC 2014: 5:1-5:11 - [c22]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. PPREW@ACSAC 2014: 7:1-7:9 - [c21]Todd R. Andel, Lindsey N. Whitehurst, Jeffrey Todd McDonald:
Software Security and Randomization through Program Partitioning and Circuit Variation. MTD@CCS 2014: 79-86 - [c20]Lindsey N. Whitehurst, Todd R. Andel, Jeffrey Todd McDonald:
Exploring security in ZigBee networks. CISR 2014: 25-28 - [e3]Mila Dalla Preda, Jeffrey Todd McDonald:
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014. ACM 2014, ISBN 978-1-60558-637-3 [contents] - [e2]Robert K. Abercrombie, Jeffrey Todd McDonald:
Cyber and Information Security Research Conference, CISR '14, Oak Ridge, TN, USA, April 8-10, 2014. ACM 2014, ISBN 978-1-4503-2812-8 [contents] - 2013
- [c19]Jarilyn M. Hernández, Line Pouchard, Jeffrey Todd McDonald, Stacy J. Prowell:
Developing a power measurement framework for cyber defense. CSIIRW 2013: 28 - [c18]Lee M. Hively, Jeffrey Todd McDonald:
Theorem-based, data-driven, cyber event detection. CSIIRW 2013: 58 - [c17]Todd R. Andel, Jeffrey Todd McDonald:
A Systems Approach to Cyber Assurance Education. InfoSecCD 2013: 13-19 - [e1]Jeffrey Todd McDonald, Mila Dalla Preda:
Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy. ACM 2013, ISBN 978-1-4503-1857-0 [contents] - 2012
- [j3]Jeffrey Todd McDonald, Todd R. Andel:
Integrating Historical Security Jewels in Information Assurance Education. IEEE Secur. Priv. 10(6): 45-50 (2012) - [j2]Frederick T. Sheldon, Jeffrey Todd McDonald:
Introduction to the special issue on cyber security and management. Inf. Syst. E Bus. Manag. 10(4): 429-431 (2012) - [c16]Jeffrey Todd McDonald, Yong C. Kim, Daniel J. Koranek, James D. Parham:
Evaluating component hiding techniques in circuit topologies. ICC 2012: 1138-1143 - [c15]Jeffrey Todd McDonald:
Capturing the Essence of Practical Obfuscation. ICISTM 2012: 451-456 - 2011
- [c14]Jeffrey Todd McDonald, Yong C. Kim, Daniel J. Koranek:
Deterministic circuit variation for anti-tamper applications. CSIIRW 2011: 68 - 2010
- [c13]James D. Parham, Jeffrey Todd McDonald, Michael R. Grimaila, Yong C. Kim:
A Java based component identification tool for measuring the strength of circuit protections. CSIIRW 2010: 26 - [c12]Jeffrey Todd McDonald, Eric D. Trias, Yong C. Kim, Michael R. Grimaila:
Using logic-based reduction for adversarial component recovery. SAC 2010: 1993-2000
2000 – 2009
- 2009
- [c11]Hiren J. Patel, Yong C. Kim, Jeffrey Todd McDonald, LaVern A. Starman:
Increasing stability and distinguishability of the digital fingerprint in FPGAs through input word analysis. FPL 2009: 391-396 - [c10]Roy Porter, Samuel J. Stone, Yong C. Kim, Jeffrey Todd McDonald, LaVern A. Starman:
Dynamic Polymorphic Reconfiguration for anti-tamper circuits. FPL 2009: 493-497 - 2008
- [j1]Alec Yasinsac, Jeffrey Todd McDonald:
Tamper Resistant Software Through Intent Protection. Int. J. Netw. Secur. 7(3): 370-382 (2008) - [c9]James W. Crouch, Hiren J. Patel, Yong C. Kim, Jeffrey Todd McDonald, Tony C. Kim:
Creating digital fingerprints on commercial field programmable gate arrays. FPT 2008: 345-348 - 2007
- [c8]Jeffrey Todd McDonald, Alec Yasinsac:
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. ARES 2007: 286-293 - [c7]Alec Yasinsac, Jeffrey Todd McDonald:
Towards Working with Small Atomic Functions. Security Protocols Workshop 2007: 191-200 - 2006
- [c6]Alec Yasinsac, Jeffrey Todd McDonald:
Foundations for Security Aware Software Development Education. HICSS 2006 - 2005
- [c5]Alec Yasinsac, Jeffrey Todd McDonald:
Of unicorns and random programs. Communications and Computer Networks 2005: 24-30 - [c4]Jeffrey Todd McDonald:
Hybrid Approach for Secure Mobile Agent Computations. MADNES 2005: 38-53 - [c3]Jeffrey Todd McDonald, Alec Yasinsac:
Application Security Models for Mobile Agent Systems. STM 2005: 43-59 - 2004
- [c2]Willard Thompson, Alec Yasinsac, Jeffrey Todd McDonald:
Semantic Encryption Transformation Scheme. PDCS 2004: 516-521 - [c1]Jeffrey Todd McDonald, Alec Yasinsac, Willard C. Thompson III:
Mobile Agent Data Integrity Using Multi-agent Architecture. PDCS 2004: 536-542
Coauthor Index
aka: William Bradley Glisson
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint