Jonathan Oakley
Title
Cited by
Cited by
Year
A brief survey of cryptocurrency systems
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016
1662016
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications
C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ...
Blockchain Cybersecurity, Trust and Privacy, 51-67, 2020
102020
Scrybe: A Blockchain ledger for clinical trials
RR Brooks, KC Wang, L Yu, J Oakley, A Skjellum, JS Obeid, L Lenert, ...
IEEE Blockchain in Clinical Trials Forum: Whiteboard challenge winner, 1-2, 2018
102018
TARN: A SDN-based traffic analysis resistant network architecture
L Yu, Q Wang, G Barrineau, J Oakley, RR Brooks, KC Wang
2017 12th International Conference on Malicious and Unwanted Software …, 2017
92017
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions
J Oakley, C Worley, L Yu, R Brooks, A Skjellum
2018 13th International Conference on Malicious and Unwanted Software …, 2018
72018
Provenance threat modeling
O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum
2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016
72016
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing
H Li, F Zhang, L Yu, J Oakley, H Hu, RR Brooks
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
42018
Internet security liberated via software defined exchanges
KC Wang, RR Brooks, G Barrineau, J Oakley, L Yu, Q Wang
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
32018
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data
RR Brooks, L Yu, Y Fu, G Cordone, J Oakley, X Zhong
International Symposium on Sensor Networks, Systems and Security, 265-283, 2017
22017
Protocol Proxy: An FTE-based covert channel
J Oakley, L Yu, X Zhong, GK Venayagamoorthy, R Brooks
Computers & Security 92, 101777, 2020
12020
Privacy Preserving Count Statistics
L Yu, O Hambolu, Y Fu, J Oakley, RR Brooks
arXiv preprint arXiv:1910.07020, 2019
12019
Traffic Analysis Resistant Network (TARN) Anonymity Analysis
N Tusing, J Oakley, G Barrineau, L Yu, KC Wang, RR Brooks
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
12019
Traffic Analysis Countermeasures Using Software-Defined Internet Exchanges
RR Brooks, KC Wang, L Yu, G Barrineau, Q Wang, J Oakley
2018 International Scientific and Technical Conference Modern Computer …, 2018
12018
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect
RR Brooks, L Yu, Y Fu, G Cordone, J Oakley, X Zhong
Proceedings of International Symposium on Sensor Networks, Systems and …, 2018
12018
On Accuracy and Anonymity of Privacy-Preserving Negative Survey (NS) Algorithms
L Yu, Y Fu, J Oakley, O Hambolu, R Brooks
Computers & Security, 102206, 2021
2021
Global Internet Traffic Routing and Privacy
R Brooks, KC Wang, J Oakley, N Tusing
2020 International Scientific and Technical Conference Modern Computer …, 2020
2020
Traffic Analysis Resistant Infrastructure
J Oakley
2020
The system can't perform the operation now. Try again later.
Articles 1–17