팔로우
Daryl Johnson
Daryl Johnson
Associate Professor in Computing Security, Rochester Institute of Technology
rit.edu의 이메일 확인됨
제목
인용
인용
연도
Third Party Application Forensics on Apple Mobile Devices
A Levinson, B Stackpole, D Johnson
System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-9, 2011
592011
Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks
D Johnson, B Yuan, P Lutz, E Brown
59*2010
Covert channels in the HTTP network protocol: Channel characterization and detecting Man-in-the-Middle attacks
E Brown, B Yuan, D Johnson, P Lutz
The Proceedings of the 5th International Conference on Information Warfare …, 2010
462010
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
M Hirwani, Y Pan, B Stackpole, D Johnson
The 2012 International Conference on Security and Management, 2012
282012
Behavior-based covert channel in cyberspace
D Johnson, P Lutz, B Yuan
Intelligent decision making systems, 311-318, 2010
232010
Covert Channel over Network Time Protocol
A Ameri, D Johnson
International Conference on Cryptography, Security, and Privacy Proceedings …, 2017
202017
Developing Small Team-based Cyber Security Exercises
B Mauer, W Stackpole, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
202012
MODBUS Covert channel
C Leonardo, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
122014
Covert Channel in the BitTorrent Tracker Protocol
J Desimone, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management (SAM'12), 2012
112012
Covert Channel in the BitTorrent Tracker Protocol
J Desimone, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
112012
A HTTP cookie covert channel
W Huba, B Yuan, D Johnson, P Lutz
Proceedings of the 4th international conference on Security of information …, 2011
112011
A New Covert Channel over Cellular Voice Channel in Smartphones
B Aloraini, D Johnson, B Stackpole, S Mishra
arXiv preprint arXiv:1504.05647, 2015
102015
ICMP covert channel resiliency
K Stokes, B Yuan, D Johnson, P Lutz
Technological Developments in Networking, Education and Automation, 503-506, 2010
102010
Crowdsourcing Computer Security Attack Trees
M Tentilucci, N Roberts, S Kandari, D Johnson, D Bogaard, B Stackpole, ...
10th Annual Symposium on Information Assurance (ASIA’15), 19, 2015
92015
Covert Channels in SSL Session Negotiation Headers
J Merrill, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 70, 2015
92015
Covert Channel using Man-In-The-Middle over HTTPS
M Johnson, P Lutz, D Johnson
The 2016 International Conference on Computational Science and Computational …, 2016
82016
Client-initiated HTTP covert channels using relays
G Daneault, D Johnson
2016 4th International Symposium on Digital Forensic and Security (ISDFS), 32-37, 2016
82016
Covert Channel using the IP Timestamp Option of an IPv4 Packet
H Alsaffar, D Johnson
The International Conference on Electrical and Bio-medical Engineering …, 2015
72015
A Covert Channel in TTL Field of DNS Packets
C Hoffman, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
72012
Audio Steganography Using High Frequency Noise Introduction
D Wheeler, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
72012
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20