Site-wide links

B. Thomas Golisano College of Computing & Information Sciences

B. Thomas Golisano College of Computing & Information Sciences

DEPARTMENT OF COMPUTING SECURITY

To view listing from a different department, select department name from the right.

click to expandclick to closeDaryl Johnson

Daryl Johnson

Associate Professor
Department of Computing Security
B. Thomas Golisano College of Computing & Information Sciences

2016 Submissions

Journal Paper

Heard, Timothy and Daryl G Johnson. "An Extended Discussion on a High-Capacity Covert Channel for the Android Operating System." International Journal of Computing 15. 3 (2016): 191-199. Web. ∆

Published Conference Proceedings

Johnson, Matthew R, Peter H Lutz, and Daryl G Johnson. "Covert Channel using Man-In-The-Middle over HTTPS." Proceedings of the The 2016 International Conference on Computational Science and Computational Intelligence(CSCI’16)(2016, December). Ed. Unknown. Las Vegaas, NV: n.p., 2016. Print. *

Heilman, Susan, Jonathan Williams, and Daryl G Johnson. "Covert Channel in HTTP User-Agents." Proceedings of the 11th Annual Symposium on Information Assurance (ASIA’16) (2016, June)Albany, NY USA. Ed. Sanjay Goel. Albany, NY: n.p., 2016. Web. £

Waggoner, Jonathan, William Stackpole, and Daryl G Johnson. "A Hands-On Approach to Computing Security Education: Metasploit Module Development." Proceedings of the The 20th Colloquium for Information Systems Security Education (CISSE2016) (Philadelphia, PA, USA 2016). Ed. ?. Philadelphia, PA: n.p., 2016. Web. «

Daneault, Gregory and Daryl G Johnson. "Client-Initiated HTTP Covert Channels Using Relays." Proceedings of the The 4th International Symposium on Digital Forensic and Security (ISDFS)’2016)(p.32-37) (Little Rock, Arkansas-April 2016)Best Student Paper Award. Ed. Piroska Haller. Little Rock, AK: n.p., 2016. Print. «

Bogaard, Dan, et al. "Producing and Evaluating Crowdsourced Computer Security Attack Trees." Proceedings of the 2016 IEEE International Symposium on Technologies for Homeland Security(HST)’2016) (Waltham, Ma-May 2016). Ed. Claire Applegarth & Mark Peters. Waltham, MA: n.p., 2016. Print. *

View All Works ►

click to expandclick to closeSumita Mishra

Sumita Mishra

Associate Professor
Department of Computing Security
B. Thomas Golisano College of Computing & Information Sciences

2016 Submissions

Published Conference Proceedings

Lipton, Ben and Sumita Mishra. "Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks." Proceedings of the 4th IEEE International Conference on Smart Energy Grid Engineering. Ed. IEEE. Oshawa, Canada: n.p., 2016. Print. *

Afrin, Sabrina and Sumita Mishra. "An Anonymized Authentication Framework for Smart Metering Data Privacy." Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Minneapolis, MN: n.p., 2016. Print. *

Schneider, Jennifer, Carol Romanowski, Rajendra Raj, Sumita Mishra, Jonathan Aleckna, and Kaiyue Wang. "Mapping a Community Resilience Management System: Building Operational Knowledge." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *

Romanowski, Carol, Jennifer Schneider, Sumita Mishra, Rajendra Raj, Rossi Rosario, Kent Stein and Bhargav Solanki. "Response and Recovery: A Quantitative Approach to Emergency Management." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *

Romanowski, Carol, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino,. "A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions." Proceedings of the Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016. Ed. Mason Rice, Sujeet Shenoi. Arlington, VA: Springer International Publishing, 2016. Print. *

Alshehri, Suhair, Sumita Mishra, Rajendra K. Raj,. "Using Access Control to Mitigate Insider Threats to Healthcare Systems." Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI). Ed. Wai-Tat Fu, Larry Hodges, Kai Zheng, Gregor Stiglic, Ann Blandford. Chicago, IL: IEEE, 2016. Print. *

Mishra, Sumita, Trudy Howles, Rajendra K. Raj, Carol J. Romanowski, Jennifer Schneider, Alicia McNett, Daryl J. Dates,. "A Modular Approach to Teaching Critical Infrastructure Protection Concepts to Engineering, Technology and Computing Students." Proceedings of the 2016 IEEE Frontiers in Education Conference (FIE). Ed. Steve Frezza, Dipo Onipede. Erie, PA: IEEE, 2016. Print. *

View All Works ►

click to expandclick to closeYin Pan

Yin Pan

Associate Professor
Department of Computing Security
B. Thomas Golisano College of Computing & Information Sciences

2016 Submissions

Published Conference Proceedings

Mosli, Rayan, et al. "Automated malware detection using artifacts in forensic memory images." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. IEEE Conference. Waltham, Massachusetts: n.p., 2016. Print. «

View All Works ►

click to expandclick to closeMatthew Wright

Matthew Wright

Department of Computing Security
B. Thomas Golisano College of Computing & Information Sciences

2016 Submissions

Journal Paper

Al-Ameen, Mahdi Nasrullah and Matthew Wright. "A Comprehensive Study of the GeoPass User Authentication Scheme." Interacting with Computers. (2016): 1-1. Web. *

Al-Ameen, Mahdi Nasrullah and Matthew Wright. "iPersea: Towards Improving the Sybil-resilience of Social DHT." Journal of Network and Computer Applications 71. (2016): 1-10. Web. *

Al-Ameen, Mahdi Nasrullah, S M Taiabul Haque, and Matthew Wright. "Leveraging Autobiographical Memory for Two-factor Online Authentication." Information and Computer Security 24. 4 (2016): 386-399. Print. *

Barton, Armon and Matthew Wright. "DeNASA: Destination-Naive AS-Awareness in Anonymous Communications." Proceedings on Privacy Enhancing Technologies 2016. 4 (2016): 356–372. Web. «

Published Conference Proceedings

Juarez, Marc, et al. "WTF-PAD: Toward an Efficient Website Fingerprinting Defense." Proceedings of the European Symposium on Research in Computer Security (ESORICS). Ed. Ioannis Askoxylakis, et al. Heraklion, Greece: Springer, 2016. Print. *

View All Works ►