Third Party Application Forensics on Apple Mobile Devices A Levinson, B Stackpole, D Johnson System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-9, 2011 | 59 | 2011 |
Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks D Johnson, B Yuan, P Lutz, E Brown | 58* | 2010 |
Covert channels in the HTTP network protocol: Channel characterization and detecting Man-in-the-Middle attacks E Brown, B Yuan, D Johnson, P Lutz The Proceedings of the 5th International Conference on Information Warfare …, 2010 | 46 | 2010 |
Forensic Acquisition and Analysis of VMware Virtual Hard Disks M Hirwani, Y Pan, B Stackpole, D Johnson The 2012 International Conference on Security and Management, 2012 | 28 | 2012 |
Behavior-based covert channel in cyberspace D Johnson, P Lutz, B Yuan Intelligent decision making systems, 311-318, 2010 | 23 | 2010 |
Developing Small Team-based Cyber Security Exercises B Mauer, W Stackpole, D Johnson Proceedings of the International Conference on Security and Management (SAM), 1, 2012 | 20 | 2012 |
Covert Channel over Network Time Protocol A Ameri, D Johnson International Conference on Cryptography, Security, and Privacy Proceedings …, 2017 | 19 | 2017 |
MODBUS Covert channel C Leonardo, D Johnson Proceedings of the International Conference on Security and Management (SAM), 1, 2014 | 12 | 2014 |
Covert Channel in the BitTorrent Tracker Protocol J Desimone, D Johnson, B Yuan, P Lutz The 2012 International Conference on Security and Management (SAM'12), 2012 | 11 | 2012 |
Covert Channel in the BitTorrent Tracker Protocol J Desimone, D Johnson, B Yuan, P Lutz The 2012 International Conference on Security and Management, 2012 | 11 | 2012 |
A HTTP cookie covert channel W Huba, B Yuan, D Johnson, P Lutz Proceedings of the 4th international conference on Security of information …, 2011 | 11 | 2011 |
A New Covert Channel over Cellular Voice Channel in Smartphones B Aloraini, D Johnson, B Stackpole, S Mishra arXiv preprint arXiv:1504.05647, 2015 | 10 | 2015 |
Crowdsourcing Computer Security Attack Trees M Tentilucci, N Roberts, S Kandari, D Johnson, D Bogaard, B Stackpole, ... 10th Annual Symposium on Information Assurance (ASIA’15), 19, 2015 | 9 | 2015 |
Covert Channels in SSL Session Negotiation Headers J Merrill, D Johnson Proceedings of the International Conference on Security and Management (SAM), 70, 2015 | 9 | 2015 |
ICMP covert channel resiliency K Stokes, B Yuan, D Johnson, P Lutz Technological Developments in Networking, Education and Automation, 503-506, 2010 | 9 | 2010 |
Covert Channel using Man-In-The-Middle over HTTPS M Johnson, P Lutz, D Johnson The 2016 International Conference on Computational Science and Computational …, 2016 | 8 | 2016 |
Client-initiated HTTP covert channels using relays G Daneault, D Johnson 2016 4th International Symposium on Digital Forensic and Security (ISDFS), 32-37, 2016 | 8 | 2016 |
Covert Channel using the IP Timestamp Option of an IPv4 Packet H Alsaffar, D Johnson The International Conference on Electrical and Bio-medical Engineering …, 2015 | 7 | 2015 |
A Covert Channel in TTL Field of DNS Packets C Hoffman, D Johnson, B Yuan, P Lutz The 2012 International Conference on Security and Management, 2012 | 7 | 2012 |
Audio Steganography Using High Frequency Noise Introduction D Wheeler, D Johnson, B Yuan, P Lutz The 2012 International Conference on Security and Management, 2012 | 7 | 2012 |