Follow
Albert H. Carlson
Albert H. Carlson
Professor of Computer Science, Austin Community College
Verified email at austincc.edu
Title
Cited by
Cited by
Year
Generative adversarial networks in security: A survey
IK Dutta, B Ghosh, A Carlson, M Totaro, M Bayoumi
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020
312020
Railway security issues: A survey of developing railway technology
Albert H. Carlson, Deborah Frincke, Marc J. Laude
Proc. Intl. Conf. Comput., Commun., Control Technol. (CCCT 2003), 1 - 6, 2003
28*2003
Set theoretic estimation applied to the information content of ciphers and decryption
AH Carlson
University of Idaho, 2012
192012
A design for a cryptographically secure pseudo random number generator
B Williams, RE Hiromoto, A Carlson
2019 10th IEEE International Conference on Intelligent Data Acquisition and …, 2019
132019
Dynamic key generation for polymorphic encryption
DD Booher, B Cambou, AH Carlson, C Philabaum
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
122019
An empirical analysis of generative adversarial network training times with varying batch sizes
B Ghosh, IK Dutta, A Carlson, M Totaro, M Bayoumi
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020
112020
Group-Oriented Software Development
JD Taylor, AH Carlson, JB Harris
US Patent App. 14/299,998, 2015
102015
Digital watermarking for secure transmission between a source component and a node device
A Carlson, SB Cohen, HS Johnson
US Patent 8,924,730, 2014
92014
Lightweight Polymorphic Encryption for the Data Associated with Constrained Internet of Things Devices
IK Dutta, B Ghosh, AH Carlson, M Bayoumi
2020 IEEE 6th World Forum on Internet of Things (WF-IoT), 2020
72020
Breaking cbc, or randomness never was happiness
A Carlson, P Doherty, I Eichen, J Gall
Internet Video, 2015
62015
Using Set Theoretic Estimation to Implement Shannon Secrecy
AH Carlson, RB Wells, RE Hiromoto
2005 IEEE Intelligent Data Acquisition and Advanced Computing Systems …, 2005
62005
Railroads and the cyber terror threat
A Carlson, D Frincke, M Laude
Technical Report CSDS-DF-TR-03–14, Center for Secure and Dependable Systems …, 2003
62003
Evaluating True Cryptographic Key Space Size
A Carlson, G Gang, T Gang, B Ghosh, IK Dutta
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile …, 2021
52021
Generative adversarial networks in security: A survey. In 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
IK Dutta, B Ghosh, A Carlson, M Totaro, M Bayoumi
IEEE, 0399ś0405, 2020
52020
Isomorphic cipher reduction
B Ghosh, IK Dutta, S Khare, A Carlson, M Totaro
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
42021
Virtual polymorphic hardware engine
AH Carlson, R LeBlanc
US Patent 10,162,985, 2018
42018
Polymorphic one time pad matrix
AH Carlson, R LeBlanc, R Carlson, P Doherty, C Gonzales
US Patent 10,069,805, 2018
42018
Polymorphic hardware engine
AH Carlson, R LeBlanc
US Patent 9,178,514, 2015
42015
Breaking block and product ciphers applied across byte boundaries
AH Carlson, RE Hiromoto, RB Wells
Proceedings of the 6th IEEE International Conference on Intelligent Data …, 2011
42011
Key space reduction using isomorphs
A Carlson, B Ghosh, IK Dutta, S Khare, M Totaro
2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021
32021
The system can't perform the operation now. Try again later.
Articles 1–20