Követés
Daryl Johnson
Daryl Johnson
Associate Professor in Computing Security, Rochester Institute of Technology
E-mail megerősítve itt: rit.edu
Cím
Hivatkozott rá
Hivatkozott rá
Év
Third Party Application Forensics on Apple Mobile Devices
A Levinson, B Stackpole, D Johnson
System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-9, 2011
592011
Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks
D Johnson, B Yuan, P Lutz, E Brown
59*2010
Covert channels in the HTTP network protocol: Channel characterization and detecting Man-in-the-Middle attacks
E Brown, B Yuan, D Johnson, P Lutz
The Proceedings of the 5th International Conference on Information Warfare …, 2010
462010
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
M Hirwani, Y Pan, B Stackpole, D Johnson
The 2012 International Conference on Security and Management, 2012
282012
Behavior-based covert channel in cyberspace
D Johnson, P Lutz, B Yuan
Intelligent decision making systems, 311-318, 2010
232010
Developing Small Team-based Cyber Security Exercises
B Mauer, W Stackpole, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
202012
Covert Channel over Network Time Protocol
A Ameri, D Johnson
International Conference on Cryptography, Security, and Privacy Proceedings …, 2017
192017
MODBUS Covert channel
C Leonardo, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
122014
Covert Channel in the BitTorrent Tracker Protocol
J Desimone, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management (SAM'12), 2012
112012
Covert Channel in the BitTorrent Tracker Protocol
J Desimone, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
112012
A HTTP cookie covert channel
W Huba, B Yuan, D Johnson, P Lutz
Proceedings of the 4th international conference on Security of information …, 2011
112011
A New Covert Channel over Cellular Voice Channel in Smartphones
B Aloraini, D Johnson, B Stackpole, S Mishra
arXiv preprint arXiv:1504.05647, 2015
102015
Crowdsourcing Computer Security Attack Trees
M Tentilucci, N Roberts, S Kandari, D Johnson, D Bogaard, B Stackpole, ...
10th Annual Symposium on Information Assurance (ASIA’15), 19, 2015
92015
Covert Channels in SSL Session Negotiation Headers
J Merrill, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 70, 2015
92015
ICMP covert channel resiliency
K Stokes, B Yuan, D Johnson, P Lutz
Technological Developments in Networking, Education and Automation, 503-506, 2010
92010
Covert Channel using Man-In-The-Middle over HTTPS
M Johnson, P Lutz, D Johnson
The 2016 International Conference on Computational Science and Computational …, 2016
82016
Client-initiated HTTP covert channels using relays
G Daneault, D Johnson
2016 4th International Symposium on Digital Forensic and Security (ISDFS), 32-37, 2016
82016
Covert Channel using the IP Timestamp Option of an IPv4 Packet
H Alsaffar, D Johnson
The International Conference on Electrical and Bio-medical Engineering …, 2015
72015
A Covert Channel in TTL Field of DNS Packets
C Hoffman, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
72012
Audio Steganography Using High Frequency Noise Introduction
D Wheeler, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
72012
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20