default search action
John Aycock
- > Home > Persons > John Aycock
Publications
- 2025
- [c50]John Aycock, Katie Biittner, Syeda Zainab Khaleel, Carl Therrien, Allie Querengesser
, Hailey Sikstrom:
AI vs. AI: Comparing Artificial Intelligence with Actual Intelligence for a Gameplay Task. CoG 2025: 1-4 - 2023
- [c49]Shankar Ganesh
, John Aycock, Katie Biittner:
FrAG: A Framework for the Analysis of Games. CoG 2023: 1-4 - [c47]Tyson Kendon
, Leanne Wu
, John Aycock
:
AI-Generated Code Not Considered Harmful. WCCCE 2023: 3:1-3:7 - 2022
- [c45]John Aycock
, Shankar Ganesh
, Katie Biittner
, Paul Allen Newell
, Carl Therrien
:
The Sincerest Form of Flattery: Large-Scale Analysis of Code Re-Use in Atari 2600 Games. FDG 2022: 26:1-26:10 - 2020
- [c43]John Aycock, Katie Biittner:
LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator. FDG 2020: 23:1-23:7 - 2016
- [c37]Ben Stephenson
, Mark James, Nigel Brooke, John Aycock:
An Industrial Partnership Game Development Capstone Course. SIGITE 2016: 136-141 - 2015
- [j15]John Aycock, Daniel Medeiros Nunes de Castro:
Permutation Steganography in FAT Filesystems. Trans. Data Hiding Multim. Secur. 10: 92-105 (2015) - 2014
- [c33]Sarah Laing, Michael E. Locasto, John Aycock:
An Experience Report on Extracting and Viewing Memory Events via Wireshark. WOOT 2014 - 2013
- [c32]Anton Mosunov
, Vineet Sinha, Heather Crawford
, John Aycock, Daniel Medeiros Nunes de Castro, Rashmi Kumari:
Assured Supraliminal Steganography in Computer Games. WISA 2013: 245-259 - 2012
- [c31]Chris Jarabek, David Barrera, John Aycock:
ThinAV: truly lightweight mobile cloud-based anti-malware. ACSAC 2012: 209-218 - [c30]David Williams-King, Jörg Denzinger, John Aycock, Ben Stephenson:
The Gold Standard: Automatically Generating Puzzle Game Levels. AIIDE 2012 - [c29]John Aycock, Daniel Medeiros Nunes de Castro, Michael E. Locasto, Chris Jarabek:
Babel: a secure computer is a polyglot. CCSW 2012: 43-54 - [c27]Eric Lin, John Aycock, Mohammad Mannan:
Lightweight Client-Side Methods for Detecting Email Forgery. WISA 2012: 254-269 - 2011
- [c26]Eric Lin, Saul Greenberg, Eileah Trotter, David Ma, John Aycock:
Does domain highlighting help people identify phishing sites? CHI 2011: 2075-2084 - [c25]Nick Nygren, Jörg Denzinger
, Ben Stephenson, John Aycock:
User-preference-based automated level generation for platform games. CIG 2011: 55-62 - 2010
- [c22]David Williams-King, John Aycock, Daniel Medeiros Nunes de Castro:
Enbug: when debuggers go bad. ITiCSE 2010: 28-32 - [c21]Eric Lin, Daniel Medeiros Nunes de Castro, Mea Wang, John Aycock:
SPoIM: A close look at pollution attacks in P2P live streaming. IWQoS 2010: 1-9 - 2009
- [c20]John Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiros Nunes de Castro:
Code Obfuscation Using Pseudo-random Number Generators. CSE (3) 2009: 418-423 - [c19]Nathan Friess, Heather Crawford
, John Aycock:
A Multi-Agent Approach to Testing Anti-Spam Software. DEXA Workshops 2009: 38-42 - [c18]Heather Crawford
, John Aycock:
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles. Information Hiding 2009: 1-14 - 2008
- [j11]Heather Crawford
, John Aycock:
Kwyjibo: automatic domain name generation. Softw. Pract. Exp. 38(14): 1561-1567 (2008) - [c17]Margaret Nielsen, Dane Bertram, Sampson Pun, John Aycock, Nathan Friess:
Global-scale Anti-spam Testing in Your Own Back Yard. CEAS 2008 - [c16]John Aycock, Heather Crawford
, Rennie deGraaf:
Spamulator: the Internet on a laptop. ITiCSE 2008: 142-147 - [c15]Jordan Nielson, Daniel Medeiros Nunes de Castro, John Aycock:
Image spam - ASCII to the rescue! MALWARE 2008: 65-68 - [c14]Joe Szabo, John Aycock, Randal Acton, Jörg Denzinger
:
The tale of the weather worm. SAC 2008: 2097-2102 - 2007
- [c13]Alex Fink, Jörg Denzinger
, John Aycock:
Extracting NPC behavior from computer games using computer vision and machine learning techniques. CIG 2007: 24-31 - [c12]Randal Acton, Nathan Friess, John Aycock:
Inverse Geolocation: Worms with a Sense of Direction. IPCCC 2007: 487-493 - [c11]Ryan Vogt, John Aycock, Michael J. Jacobson Jr.:
Army of Botnets. NDSS 2007 - 2006
- [j10]John Aycock, Rennie deGraaf, Michael J. Jacobson Jr.:
Anti-disassembly using Cryptographic Hash Functions. J. Comput. Virol. 2(1): 79-85 (2006) - 2005
- [j9]Nathan Friess, Ryan Vogt, John Aycock:
Timing is everything. Comput. Secur. 24(8): 599-603 (2005) - [c9]Rennie deGraaf, John Aycock, Michael J. Jacobson Jr.:
Improved Port Knocking with Strong Authentication. ACSAC 2005: 451-462 - [c7]John Aycock, Ken Barker:
Viruses 101. SIGCSE 2005: 152-156
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-16 02:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint