Site-wide links

Scholarly Works

Sumita Mishra
Assistant Professor

2011 Submissions

Book Chapter

Mishra, Sumita. "Wireless Sensor Networks: Emerging Applications and Security Solutions." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 217-236. Print. *

Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 131-157. Print. *

Published Conference Proceedings

Raj, Rajendra, Sumita Mishra, Carol Romanowski, and Trudy Howles. "CyberSecurity as General Education." Proceedings of the 15th Colloquium for Information Systems Security Education, June 13-15, 2011. Ed. CISSE. Fairborn, OH: 10 -15, Print. «

Polatcan, Onur, Sumita Mishra, and Yin Pan. "E-mail Behavior Profiling based on Attachment Type and Language." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. Sanjay Goel. Albany, NY: 6-10, Print. «

Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Threat-resistant Node Identification in Sensor Networks." Proceedings of the International Conference on Security and Management in 2011 World Congress in Computer Science, Computer Engineering and Applied Computing (WORLDCOMP). Ed. SAM 2011. Las Vegas, NV: n.p., 2011. Print. *

Howles, Trudy, Carol Romanowski, Sumita Mishra, and Rajendra Raj. "A Holistic, Modular Approach to Infuse CyberSecurity into Undergraduate Computing Degree Programs." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. S. Goel. Albany, NY: 67-70, Print. «

2012 Submissions

Published Conference Proceedings

Pan, Yin, Sumita Mishra, Bo Yuan, Bill Stackpole, and David Schwartz. "Game-based Forensics Course For First Year Students." Proceedings of the 13th Annual ACM Special Interest Group for Information Technology Education (SIGITE 2012). Ed. ACM. Calgary, Canada: n.p., 2012. Print. *

Tuncer, Hasan, et al. "A Novel User-centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility Protocols." Proceedings of the IEEE Global Communications Conference (GLOBECOM 2012), Anaheim, CA. Ed. Z. Zhang. Anaheim, CA: IEEE, 2012. Print. *

Winemiller, Nathan, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the The 2012 International Conference on Security and Management (SAM'12). Ed. G. Markowsky. Monte Carlo, NV: n.p., 2012. Print. *

Journal Paper

Tuncer, Hasan, Sumita Mishra, and Nirmala Shenoy. "A Survey of Identity and Handoff Management Approaches for the Future Internet." Computer Communications - Elsevier 36. 1 (2012): 63-79. Print. *

Invited Presentations/Keynotes

Mishra, Sumita. "iDAWG: Intelligent Deployable Augmented Wireless Gateway and Disaster Response." The 2012 Joint Workshop on Disaster Response Presented by the Information Products Laboratory for Emergency Response & Center for Geo-hazards Studies. NSF Partnerships for Innovation (RIT and SUNY Buffalo). Rochester, NY. 31 May 2012. Conference Presentation. ∆

2010 Submissions

Published Article

Golen, Erik F., Sumita Mishra, and Nirmala Shenoy. “An Underwater Sensor Allocation Scheme for a Range Dependent Environment.” Computer Networks, 54.3 (2010): 404-415. Print. † «

GoleGolen, Erik F., Sumita Mishra, and Nirmala Shenoy. “On the Effects of Deployment Imprecision on Underwater Sensor Connectivity.” Proceedings of the Fifth ACM International Workshop on UnderWater Networks, 2010. n.p. Print. † *

Formal Presentation

Pearson, David, Sumita Mishra, and Yin Pan. “Security Attacks and Defenses in Sensor Networks”, The 2010 International Conference on Security and Management (SAM’10), Las Vegas, NV. 12-15 July 2010. Presentation. †