2020 - ACM Senior Member
Damon McCoy is involved in relevant fields of research such as Bandwidth (computing) and Router in the field of Computer network. His study deals with a combination of Bandwidth (computing) and The Internet. His The Internet study frequently intersects with other fields, such as Deep Web. As part of his studies on Router, Damon McCoy frequently links adjacent subjects like Computer network. Damon McCoy integrates Computer security and Internet privacy in his studies. He performs integrative study on Internet privacy and Computer security in his works. While working in this field, Damon McCoy studies both Anonymity and World Wide Web. Damon McCoy undertakes multidisciplinary studies into World Wide Web and Anonymity in his work. Sample (material) is closely attributed to Chromatography in his research.
Damon McCoy links relevant scientific disciplines such as Reputation and Thriving in the realm of Social science. He undertakes multidisciplinary studies into Reputation and Advertising in his work. He integrates several fields in his works, including Advertising and Online advertising. His study on Thriving is mostly dedicated to connecting different topics, such as Social science. His Computer security study often links to related topics such as Network packet. Damon McCoy undertakes multidisciplinary investigations into Network packet and Network congestion in his work. He merges The Internet with Online advertising in his research. In his works, he undertakes multidisciplinary study on Internet privacy and Computer security. His multidisciplinary approach integrates Computer network and Real-time computing in his work.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Experimental Security Analysis of a Modern Automobile
Karl Koscher;Alexei Czeskis;Franziska Roesner;Shwetak Patel.
ieee symposium on security and privacy (2010)
Comprehensive experimental analyses of automotive attack surfaces
Stephen Checkoway;Damon McCoy;Brian Kantor;Danny Anderson.
usenix security symposium (2011)
A fistful of bitcoins: characterizing payments among men with no names
Sarah Meiklejohn;Marjori Pomarole;Grant Jordan;Kirill Levchenko.
internet measurement conference (2013)
Low-resource routing attacks against tor
Kevin Bauer;Damon McCoy;Dirk Grunwald;Tadayoshi Kohno.
workshop on privacy in the electronic society (2007)
Shining Light in Dark Places: Understanding the Tor Network
Damon Mccoy;Kevin Bauer;Dirk Grunwald;Tadayoshi Kohno.
privacy enhancing technologies (2008)
Click Trajectories: End-to-End Analysis of the Spam Value Chain
Kirill Levchenko;Andreas Pitsillidis;Neha Chachra;Brandon Enright.
ieee symposium on security and privacy (2011)
An analysis of underground forums
Marti Motoyama;Damon McCoy;Kirill Levchenko;Stefan Savage.
internet measurement conference (2011)
Passive data link layer 802.11 wireless device driver fingerprinting
Jason Franklin;Damon McCoy;Parisa Tabriz;Vicentiu Neagoe.
usenix security symposium (2006)
Trafficking fraudulent accounts: the role of the underground market in Twitter spam and abuse
Kurt Thomas;Damon McCoy;Chris Grier;Alek Kolcz.
usenix security symposium (2013)
Re: CAPTCHAs: understanding CAPTCHA-solving services in an economic context
Marti Motoyama;Kirill Levchenko;Chris Kanich;Damon McCoy.
usenix security symposium (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: