J. Todd McDonald
University of South Alabama
H-index: 19
North America-United States
Top articles of J. Todd McDonald
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Effectiveness of Image-Based Deep Learning on Token-Level Software Vulnerability Detection | Dylan Johnson Jeffrey T McDonald Ryan G Benton David Bourrie | 2024/3/15 | |
Introduction to the Minitrack on Cyber Operations, Defense, and Forensics | Jeffrey Mcdonald Philip Menard William Glisson | 2024/1/3 | |
A Taxonomy of Side-Channels | Tristan Clark Jeffrey T McDonald Todd R Andel Brandon Baggett Tristen Mullens | 2024/3/15 | |
A Quantitative Risk Assessment Framework for the Cybersecurity of Networked Medical Devices | International Conference on Cyber Warfare and Security | Maureen Van Devender Jeffrey Todd McDonald | 2023/2/28 |
Improvements on Hiding x86-64 Instructions by Interleaving | International Conference on Cyber Warfare and Security | William Mahoney J Todd McDonald George Grispos Sayonnha Mandal | 2023/2/28 |
Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction | James Eugene Carambat | 2023 | |
Argon: A toolbase for evaluating software protection techniques against symbolic execution attacks | Deepak Adhikari J Todd McDonald Todd R Andel Joseph D Richardson | 2022/3/26 | |
Crypto-steganographic validity for additive manufacturing (3d printing) design files | Mark Yampolskiy Lynne Graves Jacob Gatlin J Todd McDonald Moti Yung | 2022/12/9 | |
Evaluating security of executable steganography for digital software watermarking | J Alex Mullins J Todd McDonald William R Mahoney Todd R Andel | 2022/3/26 | |
An Automated Security Concerns Recommender Based on Use Case Specification Ontology | Automated Software Engineering | Imano Williams Xiaohong Yuan Mohd Anwar J Todd McDonald | 2022/11 |
Circuit-Variant Moving Target Defense for Side-Channel Attacks | International Conference on Cyber Warfare and Security | Tristen Mullins Brandon Baggett Todd Andel Todd McDonald | 2022/3/2 |
Phase space power analysis for PC-based rootkit detection | J Todd McDonald Rebecca C Clark Lee M Hively Samuel H Russ | 2022/4/18 | |
Analyzing the Performance of Block-Splitting in LLVM Fingerprinting | International Conference on Cyber Warfare and Security | William Mahoney Philip Sigillito Jeff Smolinski J Todd McDonald George Grispos | 2022/3/2 |
Profiling cpu behavior for detection of android ransomware | Reeve Cabral J Todd McDonald Lee M Hively Ryan G Benton | 2022/3/26 | |
Looking at a Moving Target Defense of EthernetIP | Cordell C Davidson Todd R Andel J Todd McDonald | 2022/3/26 | |
Detection and defense of cyberattacks on the machine learning control of robotic systems | The Journal of Defense Modeling and Simulation | George W Clark Jr Todd R Andel J Todd McDonald Tom Johnsten Tom Thomas | 2021/11/21 |
Machine Learning Classification of Obfuscation using Image Visualization. | Colby Parker Jeffrey Todd McDonald Dimitrios Damopoulos | 2021 | |
Program Encryption Toolkit: A Tool for Digital Logic Education and Undergraduate Research | Jeffrey Todd McDonald Dawn McKinney Todd R Andel | 2021/7/26 | |
Program Protection through Software-based Hardware Abstraction. | Jeffrey Todd McDonald Ramya Manikyam Sébastien Bardin Richard Bonichon Todd R Andel | 2021 | |
Near-Real-Time IDS for the US FAA’s NextGen ADS-B | Big data and cognitive computing | Dustin M Mink Jeffrey McDonald Sikha Bagui William B Glisson Jordan Shropshire | 2021/6/16 |