Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
John Aycock
2010 – today
- 2012
[j10]
[c30]Chris Jarabek, David Barrera, John Aycock: ThinAV: truly lightweight mobile cloud-based anti-malware. ACSAC 2012: 209-218
[c29]David Williams-King, Jörg Denzinger, John Aycock, Ben Stephenson: The Gold Standard: Automatically Generating Puzzle Game Levels. AIIDE 2012
[c28]John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek: Babel: a secure computer is a polyglot. CCSW 2012: 43-54
[c27]
[c26]Eric Lin, John Aycock, Mohammad Mannan: Lightweight Client-Side Methods for Detecting Email Forgery. WISA 2012: 254-269- 2011
[b2]John Aycock: Spyware and Adware. Advances in Information Security 50, Springer 2011, ISBN 978-0-387-77740-5, pp. 1-128
[c25]Eric Lin, Saul Greenberg, Eileah Trotter, David Ma, John Aycock: Does domain highlighting help people identify phishing sites? CHI 2011: 2075-2084
[c24]Nick Nygren, Jörg Denzinger, Ben Stephenson, John Aycock: User-preference-based automated level generation for platform games. CIG 2011: 55-62
[c23]John Aycock, Elizabeth Buchanan, Scott Dexter, David Dittrich: Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research. Financial Cryptography Workshops 2011: 138-145- 2010
[c22]John Aycock, John Sullins: Ethical Proactive Threat Research. Financial Cryptography Workshops 2010: 231-239
[c21]David Williams-King, John Aycock, Daniel Medeiros Nunes de Castro: Enbug: when debuggers go bad. ITiCSE 2010: 28-32
[c20]Eric Lin, Daniel Medeiros Nunes de Castro, Mea Wang, John Aycock: SPoIM: A close look at pollution attacks in P2P live streaming. IWQoS 2010: 1-9
2000 – 2009
- 2009
[j9]
[c19]John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro: Code Obfuscation Using Pseudo-random Number Generators. CSE (3) 2009: 418-423
[c18]Nathan Friess, Heather Crawford, John Aycock: A Multi-Agent Approach to Testing Anti-Spam Software. DEXA Workshops 2009: 38-42
[c17]Heather Crawford, John Aycock: Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. Information Hiding 2009: 1-14- 2008
[j8]Heather Crawford, John Aycock: Kwyjibo: automatic domain name generation. Softw., Pract. Exper. 38(14): 1561-1567 (2008)
[c16]Margaret Nielsen, Dane Bertram, Sampson Pun, John Aycock, Nathan Friess: Global-scale Anti-spam Testing in Your Own Back Yard. CEAS 2008
[c15]John Aycock, Heather Crawford, Rennie deGraaf: Spamulator: the Internet on a laptop. ITiCSE 2008: 142-147
[c14]Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock: Image spam - ASCII to the rescue! MALWARE 2008: 65-68
[c13]Joe Szabo, John Aycock, Randal Acton, Jörg Denzinger: The tale of the weather worm. SAC 2008: 2097-2102- 2007
[c12]Alex Fink, Jörg Denzinger, John Aycock: Extracting NPC behavior from computer games using computer vision and machine learning techniques. CIG 2007: 24-31
[c11]Randal Acton, Nathan Friess, John Aycock: Inverse Geolocation: Worms with a Sense of Direction. IPCCC 2007: 487-493
[c10]- 2006
[b1]John Aycock: Computer Viruses and Malware. Advances in Information Security 22, Springer 2006, ISBN 978-0-387-30236-2, pp. 1-227
[j7]John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.: Anti-disassembly using Cryptographic Hash Functions. Journal in Computer Virology 2(1): 79-85 (2006)
[c9]- 2005
[j6]Nathan Friess, Ryan Vogt, John Aycock: Timing is everything. Computers & Security 24(8): 599-603 (2005)
[j5]
[c8]Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.: Improved Port Knocking with Strong Authentication. ACSAC 2005: 451-462
[c7]
[c6]- 2004
[c5]Kelly Wilson, John Aycock: NEST: NEtwork Server Tool. International Conference on Internet Computing 2004: 700
[c4]John Aycock: Extending Old Compiler Tools with Meta-Tools. Software Engineering Research and Practice 2004: 841-845- 2003
[j4]- 2002
[j3]- 2001
[j2]John Aycock, R. Nigel Horspool, Jan Janousek, Borivoj Melichar: Even faster generalized LR parsing. Acta Inf. 37(9): 633-651 (2001)
[j1]
[c3]- 2000
[c2]John Aycock, R. Nigel Horspool: Simple Generation of Static Single-Assignment Form. CC 2000: 110-124
1990 – 1999
- 1999
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:21 CEST by the dblp team



