Name
Affiliation
Papers
JOHN AYCOCK
Department of Computer Science|University of Calgary
46
Collaborators
Citations 
PageRank 
62
351
33.03
Referers 
Referees 
References 
861
886
434
Search Limit
100886
Title
Citations
PageRank
Year
S 4 LVE: shareable videogame analysis and visualization00.342019
Adapting The "Unessay" For Use In Computer Science00.342019
Exercises for teaching reverse engineering.00.342018
Entombed: An archaeological examination of an Atari 2600 game.00.342018
Stick to the script: lightweight recording and playback of live coding.10.372018
Code Protection: When Abstinence is not an Option.20.492016
An Industrial Partnership Game Development Capstone Course.00.342016
A Game Engine in Pure Python for CS1: Design, Experience, and Limits00.342015
Stringlish: improved English string searching in binary files00.342015
Applied Computer History: Experience Teaching Systems Topics through Retrogames20.452015
Assured Supraliminal Steganography in Computer Games10.352013
μPython: non-majors programming from the very first lecture10.482012
Lightweight Client-Side Methods for Detecting Email Forgery.40.402012
Babel: a secure computer is a polyglot00.342012
ThinAV: truly lightweight mobile cloud-based anti-malware210.942012
What's in a name. . . generator?00.342012
The Gold Standard: Automatically Generating Puzzle Game Levels.40.472012
Human subjects, agents, or bots: current issues in ethics and computer security research30.482011
User-preference-based automated level generation for platform games.70.492011
Does domain highlighting help people identify phishing sites?301.152011
SPoIM: A close look at pollution attacks in P2P live streaming60.452010
Enbug: when debuggers go bad10.382010
Ethical proactive threat research00.342010
Early action in an Earley parser10.362009
Supraliminal Audio Steganography: Audio Files Tricking Audiophiles10.362009
A Multi-Agent Approach to Testing Anti-Spam Software00.342009
Code Obfuscation Using Pseudo-random Number Generators10.372009
Kwyjibo: automatic domain name generation70.922008
Global-scale Anti-spam Testing in Your Own Back Yard00.342008
Image spam - ASCII to the rescue!10.352008
Spamulator: the Internet on a laptop10.382008
The tale of the weather worm30.532008
Army of Botnets323.392007
Anti-disassembly using Cryptographic Hash Functions90.712006
Timing is everything20.392005
Improved Port Knocking with Strong Authentication171.552005
Choice in the classroom20.462005
NEST: NEtwork Server Tool10.362004
A brief history of just-in-time934.152003
Practical Earley Parsing161.202002
Even faster generalized LR parsing201.532001
Directly-Executable Earley Parsing70.832001
Schrödinger's token.121.312001
Simple Generation of Static Single-Assignment Form180.832000
Analysis of Equation Structure using Least Cost Parsing00.342000
Faster Generalized LR Parsing241.751999