DEPARTMENT OF CYBERSECURITY

To view listing from a different department, select department name from the right.

Daryl Johnson

Associate Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2014 Submissions

Journal Paper

Sharma, Kuhu, et al. "Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks." The International Journal on Advances in Networks and Services 7. 3&4 (2014): 228-239. Web. ∆

Published Conference Proceedings

Assayari, Hashem and Daryl G Johnson. "A Channel for Exchanging Information Covertly using Game Save File in Prison Architect." Proceedings of the 9th Annual Symposium on Information Assurance (ASIA 14). Ed. Sanjay Goel. Albany, NY: n.p., 2014. Print. *

Sabernick, Allen and Daryl G Johnson. "Google Maps KML Covert Channel." Proceedings of the 9th Annual Symposium on Information Assurance (ASIA 14). Ed. Sanja Goel. Albany, NY: n.p., 2014. Print. *

Leonardo, Carlos and Daryl G Johnson. "MODBUS Covert Channel." Proceedings of the 2014 International Conference on Security and Management (SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *

Sharma, Kuhu, et al. "Meshed Tree Protocol for Faster Convergence in Switched Networks." Proceedings of the Tenth International Conference on Networking and Services (The Tenth International Conference on Networking and Services (The Tenth International Conference on Networking and Services. Ed. Sasha Pan. Shanghai, China: n.p., 2014. Print. *

Farmer, Douglas and Daryl G Johnson. "Audio Steganography Using Stereo Wav Channels." Proceedings of the 2014 International Conference on Security and Management(SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *

Rowe, Brian and Daryl G Johnson. "A Behavior-Based Covert Channel in a MMQ." Proceedings of the 2014 International Conference on Security and Management (SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *

Dearstyne, Steven and Daryl G Johnson. "Leveraging Public Posts and Comments as Covert Channels." Proceedings of the Systems, Signals and Image Processing (IWSSIP), 2014 International Conference. Ed. Mislav Grgic. Dubrovnik, Croatia: n.p., 2014. Print. *

Madiraju, Tarun, et al. "Passwords in Public: Dictionary Attacks, Password Selection and Password Meters." Proceedings of the Proceedings of the International Joint Conference on Computer, Information, and Systems Sciences and Engineering (CISSE 14). Ed. Srinivas Ramaswamy. San Diego, CA: n.p., 2014. Print. *

View All Submissions

Yin Pan

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2014 Submissions

Published Conference Proceedings

Madiraju, Tarun, et al. "Passwords in Public: Dictionary Attacks, Password Selection and Password Meters." Proceedings of the 18th Colloquium for Information Systems Security Education. Ed. CISSE. San Diego, CA: n.p., 2014. Web. *

View All Submissions

Bill Stackpole

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2014 Submissions

Published Conference Proceedings

Kim, Youngho, Bill Stackpole, and Tae Oh. "Analysis of Mobile Malware Based on User Awareness." Proceedings of the 3rd Annual Conference on Research in Information Technology, Atlanta, GA. Ed. Rob Friedman. Atlanta, GA: n.p., 2014. Web. *

Sharma, Kuhu, et al. "Meshed Tree Protocol for Faster Convergence in Switched Networks." Proceedings of the ICNS 2014: The Tenth International Conference on Networking and Services. Chamonix, France: n.p., 2014. Web. *

View All Submissions

Kaiqi Xiong

Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2014 Submissions

Full Length Book

Xiong, Kaiqi. Resource Optimization and Security for Cloud Services. 1st ed. New York, NY: Wiley-ISTE, 192 pages., 2014. Print. £

Journal Paper

Xiong, K. and H. Perros. "Resilient and Performance-guaranteed Composite Services in Cloud Computing." International Journal of Cloud Computing. (2014): 315-325. Print. £

Published Conference Proceedings

Shen, X. Chen, Z. Jiang, K. Xiong, and J. "Practical Routing Protocol for Impromptu Mobile Social Networks." Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC). Ed. Eli Bozorgzadeh, Eduardo de la Torre, and Pao Ann-Hsiung. Milano, Italy: IEEE, 2014. Print. £

Xiong, Kaiqi. "Service-level Agreement (SLA)-based Resource Management for Improving Cloud Services." Proceedings of the 16th IEEE International Conference on High Performance Computing and Communications The Workshop on Cloud Technologies. Ed. Julien Bourgeois, et al. Pairs, France: n.p., Print. £

Akella, Anand V. and Kaiqi Xiong. "Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN)." Proceedings of the IEEE 12th International Conference on Dependable, Autonomic and Secure Computing. Ed. Tharam Dillon, et al. New York, NY: n.p., Print. £

View All Submissions