default search action
Todd R. Andel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c45]Jeffrey Todd McDonald, Jennifer Parnell, Todd R. Andel, Samuel H. Russ:
Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs. SECRYPT 2022: 181-192 - 2021
- [c44]Aleise H. McGowan, Scott M. Sittig, Todd R. Andel:
Medical Internet of Things: A Survey of the Current Threat and Vulnerability Landscape. HICSS 2021: 1-9 - [c43]Jeffrey Todd McDonald, Ramya K. Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel, James Carambat:
Evaluating Defensive Countermeasures for Software-Based Hardware Abstraction. ICETE (Selected Papers) 2021: 281-304 - [c42]Jeffrey Todd McDonald, Ramya Manikyam, Sébastien Bardin, Richard Bonichon, Todd R. Andel:
Program Protection through Software-based Hardware Abstraction. SECRYPT 2021: 247-258 - 2020
- [c41]Thanh Nguyen, Jeffrey Todd McDonald, William Bradley Glisson, Todd R. Andel:
Detecting Repackaged Android Applications Using Perceptual Hashing. HICSS 2020: 1-10 - [c40]Jeffrey Todd McDonald, Trinity L. Stroud, Todd R. Andel:
Polymorphic circuit generation using random boolean logic expansion. SAC 2020: 1753-1762
2010 – 2019
- 2019
- [j7]Adam J. Brown, Todd R. Andel:
What's in your honeypot: a privacy compliance perspective. Int. J. Inf. Comput. Secur. 11(3): 289-309 (2019) - [c39]George W. Clark, Todd R. Andel, Michael V. Doran:
Simulation-Based Reduction of Operational and Cybersecurity Risks in Autonomous Vehicles. CogSIMA 2019: 140-146 - [c38]Todd R. Andel, Jeffrey Todd McDonald, Adam J. Brown, Tyler H. Trigg, Paul W. Cartsten:
Towards Protection Mechanisms for Secure and Efficient CAN Operation. ICCE 2019: 1-6 - 2018
- [j6]Adam J. Brown, William Bradley Glisson, Todd R. Andel, Kim-Kwang Raymond Choo:
Cloud forecasting: Legal visibility issues in saturated environments. Comput. Law Secur. Rev. 34(6): 1278-1290 (2018) - [c37]Adam M. Gautier, Todd R. Andel, Ryan Benton:
On-Device Detection via Anomalous Environmental Factors. SSPREW@ACSAC 2018: 5:1-5:8 - [c36]Adam J. Brown, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
CAN Authorization Using Message Priority Bit-Level Access Control. ICDIS 2018: 1-8 - [c35]Joel A. Dawson, Jeffrey Todd McDonald, Lee M. Hively, Todd R. Andel, Mark Yampolskiy, Charles Hubbard:
Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis. ICDIS 2018: 159-167 - [c34]Todd R. Andel, Lindsey N. Whitehurst, Jeffrey Todd McDonald, Waleed Al-Assadi:
Enhancing Security Against Software Attacks with Reprogrammable Hardware. ICDIS 2018: 258-266 - [c33]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation Into the Use of Bluetooth Protocols. TrustCom/BigDataSE 2018: 498-503 - [i3]William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo:
Digital Blues: An Investigation into the Use of Bluetooth Protocols. CoRR abs/1808.02153 (2018) - 2017
- [c32]George W. Clark, Michael V. Doran, Todd R. Andel:
Cybersecurity issues in robotics. CogSIMA 2017: 1-5 - [c31]Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively:
Rootkit detection through phase-space analysis of power voltage measurements. MALWARE 2017: 19-27 - [c30]Jeffrey Todd McDonald, Ramya Manikyam, William Bradley Glisson, Todd R. Andel, Yuan Xiang Gu:
Enhanced Operating System Protection to Support Digital Forensic Investigations. TrustCom/BigDataSE/ICESS 2017: 650-659 - 2016
- [c29]Samuel Bennett Moore, Mark Yampolskiy, Jacob Gatlin, Jeffrey Todd McDonald, Todd R. Andel:
Buffer overflow attack's power consumption signatures. SSPREW@ACSAC 2016: 6:1-6:7 - [c28]Ramya Manikyam, Jeffrey Todd McDonald, William R. Mahoney, Todd R. Andel, Samuel H. Russ:
Comparing the effectiveness of commercial obfuscators against MATE attacks. SSPREW@ACSAC 2016: 8:1-8:11 - [c27]John Dombrowski, Todd R. Andel, Jeffrey Todd McDonald:
The Application of Moving Target Defense to Field Programmable Gate Arrays. CISRC 2016: 20:1-20:4 - [c26]Christos Kynigos, William Bradley Glisson, Todd R. Andel, Jeffrey Todd McDonald:
Utilizing the Cloud to Store Hijacked Camera Images. HICSS 2016: 5497-5506 - [c25]Jeffrey Todd McDonald, Yong C. Kim, Todd R. Andel, Miles A. Forbes, James McVicar:
Functional polymorphism for intellectual property protection. HOST 2016: 61-66 - [c24]Adam J. Brown, Mark Yampolskiy, Jacob Gatlin, Todd R. Andel:
Legal Aspects of Protecting Intellectual Property in Additive Manufacturing. Critical Infrastructure Protection 2016: 63-79 - [i2]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Towards Security of Additive Layer Manufacturing. CoRR abs/1602.07536 (2016) - 2015
- [c23]Todd R. Andel, Matt Campbell, William Bradley Glisson, Mike Jacobs, Johnny Mayr, Jeffrey Todd McDonald:
Compromising a Medical Mannequin. AMCIS 2015 - [c22]Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald:
In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions. CISR 2015: 1:1-1:8 - [c21]Paul Carsten, Todd R. Andel, Mark Yampolskiy, Jeffrey Todd McDonald, Samuel H. Russ:
A System to Recognize Intruders in Controller Area Network (CAN). ICS-CSR 2015 - [c20]Cordell C. Davidson, Joel A. Dawson, Paul Carsten, Mark Yampolskiy, Todd R. Andel:
Investigating the Applicability of a Moving Target Defense for SCADA systems. ICS-CSR 2015 - [i1]William Bradley Glisson, Todd R. Andel, Jeffrey Todd McDonald, Mike Jacobs, Matt Campbell, Johnny Mayr:
Compromising a Medical Mannequin. CoRR abs/1509.00065 (2015) - 2014
- [c19]Joshua Cazalas, Jeffrey Todd McDonald, Todd R. Andel, Natalia Stakhanova:
Probing the Limits of Virtualized Software Protection. PPREW@ACSAC 2014: 5:1-5:11 - [c18]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. PPREW@ACSAC 2014: 7:1-7:9 - [c17]Todd R. Andel, Lindsey N. Whitehurst, Jeffrey Todd McDonald:
Software Security and Randomization through Program Partitioning and Circuit Variation. MTD@CCS 2014: 79-86 - [c16]Lindsey N. Whitehurst, Todd R. Andel, Jeffrey Todd McDonald:
Exploring security in ZigBee networks. CISR 2014: 25-28 - 2013
- [c15]Todd R. Andel, Jeffrey Todd McDonald:
A Systems Approach to Cyber Assurance Education. InfoSecCD 2013: 13-19 - 2012
- [j5]Jeffrey Todd McDonald, Todd R. Andel:
Integrating Historical Security Jewels in Information Assurance Education. IEEE Secur. Priv. 10(6): 45-50 (2012) - [c14]Brandon A. Brown, Todd R. Andel, Yong Kim:
An FPGA Noise Resistant Digital Temperature Sensor with Auto Calibration. ICISTM 2012: 325-335 - [c13]John Barron, Todd R. Andel, Yong Kim:
Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis Attacks. ICISTM 2012: 372-383 - [c12]Matthew F. Steele, Todd R. Andel:
Modeling the optimized link-state routing protocol for verification. SpringSim (TMS-DEVS) 2012: 35 - [c11]Todd R. Andel, Alec Yasinsac:
Secure Internet Voting Protocol for Overseas Military Voters. Security Protocols Workshop 2012: 3-14 - [c10]Todd R. Andel:
Secure Internet Voting Protocol for Overseas Military Voters (Transcript of Discussion). Security Protocols Workshop 2012: 15-22 - 2011
- [j4]Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:
Subjective audio quality over a secure IEEE 802.11n network. Int. J. Secur. Networks 6(1): 53-63 (2011) - [j3]Todd R. Andel, Greg Back, Alec Yasinsac:
Automating the security analysis process of secure ad hoc routing protocols. Simul. Model. Pract. Theory 19(9): 2032-2049 (2011) - [c9]Jose Fadul, Kenneth M. Hopkinson, Christopher Sheffield, James T. Moore, Todd R. Andel:
Trust Management and Security in the Future Communication-Based "Smart" Electric Power Grid. HICSS 2011: 1-10 - [c8]Kyle E. Stewart, Todd R. Andel, Jeffrey W. Humphries:
Measuring the performance of network virtualization tool N2N in the design of a cyber warfare training and education platform. SpringSim (MMS) 2011: 28-35 - 2010
- [c7]Jose Fadul, Kenneth M. Hopkinson, James T. Moore, Todd R. Andel, Stuart H. Kurkowski:
SCADA Trust Management System. Security and Management 2010: 548-554
2000 – 2009
- 2009
- [c6]Clifton M. Durham, Todd R. Andel, Kenneth M. Hopkinson, Stuart H. Kurkowski:
Evaluation of an OPNET model for unmanned aerial vehicle (UAV) networks. SpringSim 2009 - [c5]Kyle E. Stewart, Jeffrey W. Humphries, Todd R. Andel:
Developing a virtualization platform for courses in networking, systems administration and cyber security education. SpringSim 2009 - [c4]Michael G. Wabiszewski Jr., Todd R. Andel, Barry E. Mullins, Ryan W. Thomas:
Enhancing realistic hands-on network training in a virtual environment. SpringSim 2009 - 2008
- [c3]Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:
Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks. IPCCC 2008: 469-474 - [c2]Todd R. Andel, Alec Yasinsac:
Automated Evaluation of Secure Route Discovery in MANET Protocols. SPIN 2008: 26-41 - 2007
- [j2]Todd R. Andel, Alec Yasinsac:
Surveying security analysis techniques in MANET routing protocols. IEEE Commun. Surv. Tutorials 9(1-4): 70-84 (2007) - [c1]Todd R. Andel, Alec Yasinsac:
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols. STM@ESORICS 2007: 3-14 - 2006
- [j1]Todd R. Andel, Alec Yasinsac:
On the Credibility of Manet Simulations. Computer 39(7): 48-54 (2006)
Coauthor Index
aka: William Bradley Glisson
aka: Todd McDonald
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint