DEPARTMENT OF CYBERSECURITY

To view listing from a different department, select department name from the right.

Daryl Johnson

Associate Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2013 Submissions

Published Conference Proceedings

Hartpence, Bruce, et al. "Natural Selection in Virtualization Environments: A Decade of Lessons from Academia." Proceedings of the EISTA'13: The 11th International Conference on Education and Information Systems, Technologies and Applications. Orlando, FL: n.p., 2013. Print. *

Johnson, Daryl, et al. "Designing, Constructing and Implementing a Low-Cost Virtualization Cluster for Education." Proceedings of the EISTA'13: The 11th International Conference on Education and Information Systems, Technologies and Applications. Orlando, FL: n.p., 2013. Print. *

Markowsky, George, et al. "The 2013 NECCDC - Lessons Learned." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

Feeney, Kyle and Daryl Johnson. "XSS Cookie Injection Covert Channel." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

Radford, Ross and Daryl Johnson. "Composite Covert Channels through EVE Online." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

Delva, Wesley and Daryl Johnson. "SSDP Covert Channel." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

View All Submissions

Sumita Mishra

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2013 Submissions

Book Chapter

Oh, T., S. Mishra, and C. Hochgraf. "Smart Grid Security in the Last Mile." Security and Privacy in Smart Grids. Ed. Yang Xiao. Boca Raton, FL: CRC Press, 2013. 271-290. Print. *

Published Conference Proceedings

Huba, W., et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print. * «

Romanowski, C., et al. "Information Management and Decision Support in Critical Infrastructure Emergencies at the Local Level." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print. * «

Pan, Y. and S. Mishra. "Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements." Proceedings of the 17th Colloquium for Information Systems Security Education (CISSE 2013). Ed. CISSE. Mobile, AL: CISSE, 2013. Print. «

Mishra, S., et al. "A Curricular Framework for Critical Infrastructure Protection Education for Engineering, Technology and Computing Majors." Proceedings of the IEEE Frontiers in Education Conference (FIE 13). Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print. *

View All Submissions

Rick Mislan

Senior Lecturer
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2013 Submissions

Full Length Book

(2013). Encyclopedia of Forensic Sciences. Kessler, G., & Mislan, R.

Book Chapter

(2013). Cellular Phones. Encyclopedia of Forensic Sciences. 298-302. Kessler, G., & Mislan, R.

Published Conference Proceedings

Mislan, Richard P. and Tae Oh. "Mobile Security and Vulnerability Exploitation as a Flipped Classroom Security Curriculum." Proceedings of the 8th Annual Symposium on Information Assurance (ASIA-13). Ed. Sanjay Goel. Albany, NY: n.p., 2013. Print. *

Embling, Eric, Sheena Gilbert, and Richard P. Mislan. "Designing and Implementing a Wireless Carrier Topology in a Lab Environment." Proceedings of the IEEE Global Wireless Summit - PRISMS 2013. Atlantic City, NJ: n.p., 2013. Print. *

Szost, C., et al. "Android Malware Behaviors for Android Platform Using Interactive Labs." Proceedings of the 8th Annual Symposium on Information Assurance (ASIA-13). Ed. Sanjay Goel. Albany, NY: n.p., 2013. Print. *

Embling, E., Hensen, R., Gilbert, S., & Mislan, R. (2013). Designing and Implementing a Wireless Carrier Topology in a Lab Environment. Global Wireless Summit - PRISMS 2013.

Mislan, R., & Oh, T. (2013). Mobile Security and Vulnerability Exploitation as a Flipped Classroom Security Curriculum. 8th Annual Symposium on Information Assurance.

Provisional Patent

Mislan, Richard P. and Sean Lane. "Apparatus and System for Electronic Device Interrogation and Data Extraction." Patent 8425258. 23 Apr. 2013.

View All Submissions

Yin Pan

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2013 Submissions

Published Conference Proceedings

Pan, Yin and Sumita Mishra. "Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements." Proceedings of the 17th Colloquium for Information Systems Security Education. Mobile, Alabama: CISSE, 2013. Print. «

Huba, Bill, et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the 2013 IEEE International Conference on Technologies for Homeland Security. Waltham, Massachusetts: IEEE, 2013. Print. «

Xiong, Kaiqi and Yin Pan. "Understanding ProtoGENI in Networking Courses for Research and Education." Proceedings of the Second GENI Research and Educational Experiment Workshop (GREE2013). Ed. Conference. Salt Lake City, Utah: n.p., 2013. Print. *

View All Submissions

Bill Stackpole

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2013 Submissions

Published Conference Proceedings

Hartpence, Bruce, et al. "Natural Selection in Virtualization Environments: A Decade of Lessons from Academia." Proceedings of the 11th International Conference on Education and Information Systems, Technologies and Applications: EISTA, Orlando Florida, July 2013. Orlando, Fl: n.p., Print. *

Johnson, Daryl, et al. "Designing, Constructing and Implementing a Low-Cost Virtualization Cluster for Education." Proceedings of the 11th International Conference on Education and Information Systems, Technologies and Applications: EISTA, Orlando, FL July 2013. Orlando, FL: n.p., Print. *

Markowsky, George, et al. "The 2013 NECCDC - Lessons Learned." Proceedings of the 2013 International Conference on Security and Management. Las Vegas, NV: n.p., Print. *

Szost, Colin, et al. "Teaching Android Malware Behaviors for Android Platform using Interactive Labs." Proceedings of the Annual Symposium on Information Assurance, Albany, NY June 2013. Albany, NY: n.p., Print. *

Sharma, Kriti, et al. "Malware Analysis for Android Operating System." Proceedings of the Annual Symposium on Information Assurance, Albany, NY June 2013. Albany, NY: n.p., Print. *

Andrews, Benjamin, Tom Oh, and Bill Stackpole. "Android Malware Analysis Platform." Proceedings of the Annual Symposium on Information Assurance, Albany, NY June 2013. Albany, NY: n.p., Print. *

Shows/Exhibits/Installations

Szost, Colin. Teaching Android Malware Behavior for the Android Platform Using Interactive Labs. By Colin Szost, Tom Oh, and Bill Stackpole. May 2013. ImagineRIT, Rochester. Exhibit. ˜

View All Submissions

Kaiqi Xiong

Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2013 Submissions

Full Length Book

Kolodziej, J., et al. Algorithms and Architectures for Parallel Processing. Cham, Heidelberg, New York, and Dordrecht London, Heidelberg: Springer, 2013. Print. *

Journal Paper

Xiong, K. and H. Perros. "Resilient and Performance-guaranteed Composite Services in Cloud Computing." International Journal of Cloud Computing. (2013): 1-15. Print. £

Published Conference Proceedings

Reddy, S., S. Shetty, and K. Xiong. "Security Risk Assessment of Cloud Carriers." Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). Ed. T Fahringer. Delft, The Netherlands: n.p., 2013. Print. £

Xiong, K. and Y. He. "Power-efficient Resource Allocation in MapReduce Clusters." Proceedings of the 13th IEEE/IFIP Integrated Network Management Symposium (IM). Ed. F. Turck. Ghent, BE: n.p., 2013. Print. £

Xiong, K. and Y. Pan. "Understanding ProtoGENI Resources in Networking Courses for Research and Education." Proceedings of the GENI Research and Education Experimental Workshop (GREE). Ed. GPO. Salt Lake City, UT: IEEE, 2013. Web. £

View All Submissions

Bo Yuan

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2013 Submissions

Published Conference Proceedings

Huba, William, et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. Israel Soibelman. Waltham, MA: n.p., 2013. Print. *

View All Submissions