Jonathan Oakley
Jonathan Oakley
Graduate Student, Clemson University
Verified email at g.clemson.edu
Title
Cited by
Cited by
Year
A brief survey of cryptocurrency systems
U Mukhopadhyay, A Skjellum, O Hambolu, J Oakley, L Yu, R Brooks
2016 14th annual conference on privacy, security and trust (PST), 745-752, 2016
1422016
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications
C Worley, L Yu, R Brooks, J Oakley, A Skjellum, A Altarawneh, S Medury, ...
Blockchain Cybersecurity, Trust and Privacy, 51-67, 2020
82020
TARN: A SDN-based traffic analysis resistant network architecture
L Yu, Q Wang, G Barrineau, J Oakley, RR Brooks, KC Wang
2017 12th International Conference on Malicious and Unwanted Software …, 2017
82017
Scrybe: A Blockchain Ledger for Clinical Trials
RR Brooks, KC Wang, L Yu, J Oakley, A Skjellum, JS Obeid, L Lenert, ...
IEEE Blockchain in Clinical Trials Forum: Whiteboard challenge winner, 2018
72018
Provenance threat modeling
O Hambolu, L Yu, J Oakley, RR Brooks, U Mukhopadhyay, A Skjellum
2016 14th Annual Conference on Privacy, Security and Trust (PST), 384-387, 2016
62016
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions
J Oakley, C Worley, L Yu, R Brooks, A Skjellum
2018 13th International Conference on Malicious and Unwanted Software …, 2018
32018
Internet security liberated via software defined exchanges
KC Wang, RR Brooks, G Barrineau, J Oakley, L Yu, Q Wang
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
22018
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing
H Li, F Zhang, L Yu, J Oakley, H Hu, RR Brooks
Proceedings of the 2018 ACM International Workshop on Security in Software …, 2018
22018
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data
RR Brooks, L Yu, Y Fu, G Cordone, J Oakley, X Zhong
International Symposium on Sensor Networks, Systems and Security, 265-283, 2017
22017
Protocol Proxy: An FTE-based Covert Channel
J Oakley, L Yu, X Zhong, GK Venayagamoorthy, R Brooks
Computers & Security, 101777, 2020
12020
Privacy Preserving Count Statistics
L Yu, O Hambolu, Y Fu, J Oakley, RR Brooks
arXiv preprint arXiv:1910.07020, 2019
12019
Traffic Analysis Resistant Network (TARN) Anonymity Analysis
N Tusing, J Oakley, G Barrineau, L Yu, KC Wang, RR Brooks
2019 IEEE 27th International Conference on Network Protocols (ICNP), 1-2, 2019
12019
Traffic Analysis Countermeasures Using Software-Defined Internet Exchanges
RR Brooks, KC Wang, L Yu, G Barrineau, Q Wang, J Oakley
2018 International Scientific and Technical Conference Modern Computer …, 2018
12018
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect
RR Brooks, L Yu, Y Fu, G Cordone, J Oakley, X Zhong
Proceedings of International Symposium on Sensor Networks, Systems and …, 2018
12018
Traffic Analysis Resistant Infrastructure
J Oakley
2020
The system can't perform the operation now. Try again later.
Articles 1–15