关注
Todd R. Andel
Todd R. Andel
Dean, School of Computing, University of South Alabama
在 southalabama.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
On the credibility of manet simulations
TR Andel, A Yasinsac
Computer 39 (7), 48-54, 2006
3212006
In-vehicle networks: Attacks, vulnerabilities, and proposed solutions
P Carsten, TR Andel, M Yampolskiy, JT McDonald
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
1152015
Cybersecurity issues in robotics
GW Clark, MV Doran, TR Andel
2017 IEEE conference on cognitive and computational aspects of situation …, 2017
1142017
Intellectual property protection in additive layer manufacturing: Requirements for secure outsourcing
M Yampolskiy, TR Andel, JT McDonald, WB Glisson, A Yasinsac
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 1-9, 2014
1002014
Surveying security analysis techniques in MANET routing protocols
TR Andel, A Yasinsac
IEEE Communications Surveys & Tutorials 9 (4), 70-84, 2007
832007
Developing a virtualization platform for courses in networking, systems administration and cyber security education
KE Stewart, JW Humphries, TR Andel
Proceedings of the 2009 spring simulation multiconference, 1-7, 2009
632009
Adaptive threat modeling for secure ad hoc routing protocols
TR Andel, A Yasinsac
Electronic Notes in Theoretical Computer Science 197 (2), 3-14, 2008
352008
Compromising a medical mannequin
WB Glisson, T Andel, T McDonald, M Jacobs, M Campbell, J Mayr
arXiv preprint arXiv:1509.00065, 2015
322015
A trust-management toolkit for smart-grid protection systems
JE Fadul, KM Hopkinson, TR Andel, CA Sheffield
IEEE transactions on power delivery 29 (4), 1768-1779, 2013
322013
Comparing the effectiveness of commercial obfuscators against MATE attacks
R Manikyam, JT McDonald, WR Mahoney, TR Andel, SH Russ
Proceedings of the 6th Workshop on Software Security, Protection, and …, 2016
312016
Exploring security in ZigBee networks
LN Whitehurst, TR Andel, JT McDonald
Proceedings of the 9th Annual Cyber and Information Security Research …, 2014
312014
Legal aspects of protecting intellectual property in additive manufacturing
A Brown, M Yampolskiy, J Gatlin, T Andel
Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016
302016
Trust management and security in the future communication-based" smart" electric power grid
J Fadul, K Hopkinson, C Sheffield, J Moore, T Andel
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
302011
Detecting repackaged android applications using perceptual hashing
T Nguyen, JT McDonald, WB Glisson, TR Andel
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
252020
Automated evaluation of secure route discovery in MANET protocols
TR Andel, A Yasinsac
International SPIN Workshop on Model Checking of Software, 26-41, 2008
252008
Functional polymorphism for intellectual property protection
JT McDonald, YC Kim, TR Andel, MA Forbes, J McVicar
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
242016
The invisible node attack revisited
TR Andel, A Yasinsac
Proceedings 2007 IEEE SoutheastCon, 686-691, 2007
242007
Phase space detection of virtual machine cyber events through hypervisor-level system call analysis
JA Dawson, JT McDonald, L Hively, TR Andel, M Yampolskiy, C Hubbard
2018 1st International Conference on Data Intelligence and Security (ICDIS …, 2018
232018
Cloud forecasting: Legal visibility issues in saturated environments
AJ Brown, WB Glisson, TR Andel, KKR Choo
Computer Law & Security Review 34 (6), 1278-1290, 2018
192018
On SCADA PLC and fieldbus cyber-security
CC Davidson, T Andel, M Yampolskiy, JT McDonald, B Glisson, T Thomas
13th International Conference on Cyber Warfare and Security, 140-149, 2018
192018
系统目前无法执行此操作,请稍后再试。
文章 1–20