Site-wide links

B. Thomas Golisano College of Computing & Information Sciences

B. Thomas Golisano College of Computing & Information Sciences

NETWORKING, SECURITY, AND SYSTEMS ADMINISTRATION

To view listing from a different department, select department name from the right.

click to expandclick to closeBruce Hartpence

Bruce Hartpence

Associate Professor
Networking, Security, and Systems Administration
B. Thomas Golisano College of Computing & Information Sciences

2011 Submissions

Full Length Book

Hartpence, Bruce. Packet Guide to Core Network Protocols. 1st ed. Sebastopol, CA: O'Reilly Media, 2011. Print. ˆ

Hartpence, Bruce. Packet Guide to Routing and Switching. 1st ed. Sebastopol, CA: O'Reilly Media, 2011. Print. ˆ

Book Chapter

Hartpence, Bruce. "Basic Device and Protocol Security." Network Security, Administration and Management. Ed. Dulal Kar and Mahbubur Syed. Hershey, PA: IGI Global, 2010. 1-19. Print. ˜

Published Conference Proceedings

Hartpence, Bruce. "Wegmans and RIT: A Case Study in Industrial/Academic Collaboration and the Resulting Benefits." Proceedings of the EISTA. Ed. Nagib Callaos. Orlando, FL: IIIS, 2011. Print. *

View All Works ►

click to expandclick to closeSharon Mason

Sharon Mason

Associate Professor
Networking, Security, and Systems Administration
B. Thomas Golisano College of Computing & Information Sciences

2011 Submissions

Published Conference Proceedings

Bailey, M., et al. "Establishing the Foundation for Future Organizational Reform and Transformation at a Large Private University to Expand the Representation of Women Faculty." Proceedings of the American Society for Engineering Education Annual Conference & Exposition. Ed. American Society for Engineering Education Annual Conference & Exposition. Vancouver, BC: n.p., 2011. Print. *

View All Works ►

click to expandclick to closeSumita Mishra

Sumita Mishra

Associate Professor
Networking, Security, and Systems Administration
B. Thomas Golisano College of Computing & Information Sciences

2011 Submissions

Book Chapter

Mishra, Sumita. "Wireless Sensor Networks: Emerging Applications and Security Solutions." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 217-236. Print. *

Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 131-157. Print. *

Published Conference Proceedings

Raj, Rajendra, Sumita Mishra, Carol Romanowski, and Trudy Howles. "CyberSecurity as General Education." Proceedings of the 15th Colloquium for Information Systems Security Education, June 13-15, 2011. Ed. CISSE. Fairborn, OH: 10 -15, Print. «

Polatcan, Onur, Sumita Mishra, and Yin Pan. "E-mail Behavior Profiling based on Attachment Type and Language." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. Sanjay Goel. Albany, NY: 6-10, Print. «

Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Threat-resistant Node Identification in Sensor Networks." Proceedings of the International Conference on Security and Management in 2011 World Congress in Computer Science, Computer Engineering and Applied Computing (WORLDCOMP). Ed. SAM 2011. Las Vegas, NV: n.p., 2011. Print. *

Howles, Trudy, Carol Romanowski, Sumita Mishra, and Rajendra Raj. "A Holistic, Modular Approach to Infuse CyberSecurity into Undergraduate Computing Degree Programs." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. S. Goel. Albany, NY: 67-70, Print. «

View All Works ►

click to expandclick to closeTae Oh

Tae Oh

Associate Professor
Networking, Security, and Systems Administration
B. Thomas Golisano College of Computing & Information Sciences

2011 Submissions

Journal Paper

Oh, Tae, et al. "Security Management Protocols and their Applications in Wireless Sensor Networks for Healthcare." International Journal of Mobile Communications. (2011): 187-207. Print. «

Book Chapter

Choi, Young, Tae Oh, and Rajath Chouta. "RFID Implementation and Security Issues." Lecture Notes in Computer Science. Boca Raton, FL: Springer-Verlag Berlin Heidelberg, 2011. 236-249. Print. ∆

Published Conference Proceedings

Sajan, Susan and Tae Oh. "Simulation and Performance Evaluation in Neighborhood Area Network for Smart Grid Using Zigbee." Proceedings of the OPNETWORK 2011. Ed. OPNET. OPNET: n.p., Print. *

Oh, Tae, Young Choi, and Rajath Chouta. "RFID & Supply Chain Management: Generic and Military Applications." Proceedings of the Future Generation Communication and Networking 2011. Ed. SCIE. Jeju Island, Korea: n.p., Print. *

Tang, Emma, et al. "Effect of Web Caching on Load Time." Proceedings of the AHList 2011. Ed. Association of HLST. Houston, TX: n.p., Web. * «

Choi, Young, Yong Choe, and Tae Oh. "Future Direction for a Next Generation Web." Proceedings of the AHList 2011. Ed. Association of HLST. Houston, TX: n.p., Print. «

Lim, Shinyoung, Tae Oh, and Young Choe. "Assistive Technology for the People with Disabilities to Enhance Accessibility of Emergency Communications." Proceedings of the UKC 2011. Ed. UKC 2011. Salt Lake City, Utah: n.p., 2011. Print. * «

View All Works ►

click to expandclick to closeYin Pan

Yin Pan

Associate Professor
Networking, Security, and Systems Administration
B. Thomas Golisano College of Computing & Information Sciences

2011 Submissions

Book Chapter

Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. Dulal Chandra Kar and Mahbubur Rahman Syed. Hershey, PA: IGI Global, 2011. 131-157. Print. «

Published Conference Proceedings

Polatcan, Onur, Sumita Mishra, and Yin Pan. "Invisible Witness Tool for Email Behavior Profiling." Proceedings of the 6th Annual Symposium on Information Assurance (ASIA '11), June, 2011, Albany, NY. Ed. ASIA '11. USA: n.p., 2011. Print. *

Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Treat-resistant Node Identification in Sensor Networks." Proceedings of the Cyber Security Education - 2011 International Conference on Security & Management World Congress in Computer Science, July, 2011, Las Vegas, NV. Ed. unknown. Las Vegas, NV: n.p., 2011. Print. *

View All Works ►

click to expandclick to closeBill Stackpole

Bill Stackpole

Associate Professor
Networking, Security, and Systems Administration
B. Thomas Golisano College of Computing & Information Sciences

2011 Submissions

Published Conference Proceedings

Levinson, Alex, Bill Stackpole, and Daryl Johnson. "Third Party Application Forensics on Apple Mobile Devices." Proceedings of the Hawaii International Conference on System Sciences. Ed. Ralph H. Sprague, Jr. Kauai, HI: n.p., 2011. Print. *

View All Works ►

click to expandclick to closeBo Yuan

Bo Yuan

Associate Professor
Networking, Security, and Systems Administration
B. Thomas Golisano College of Computing & Information Sciences

2011 Submissions

Journal Paper

Brown, Erik, et al. "Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks." The Journal of Information Warfare 9. 3 (2010): 26-38. Print. *

Book Chapter

Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technology and Practice. Ed. Dulal Chandra Kar and Mahbubur Rahman Syed. Hershey: IGI Global, 2011. 131-157. Print. *

Published Conference Proceedings

Huba, William, et al. "A HTTP Cookie Covert Channel." Proceedings of the SIN '11 4th International Conference on Security of Information and Networks, 14-19 November 2011, Sydney, Australia. Ed. Mehmet A. Orgun, et al. New York, NY: ACM, 2011. Print. «

Zanibbi, Richard and Bo Yuan. "Keyword and image-based retrieval for mathematical expressions." Proceedings of the Proc. Document Recognition and Retrieval XVIII. Ed. Gady Agam and Christian Viard-Gaudin. San Francisco, CA: SPIE, 2011. Print. «

View All Works ►