Sumita Mishra

Sumita Mishra

Professor
Golisano College of Computing and Information Sciences
School of Information
Department of Cybersecurity

2021 Submissions

Published Conference Proceedings

Wagh, Gaurav S. and Sumita Mishra. "Divide & Conquer: A Privacy Safeguarding Framework for the Smart Grid." Proceedings of the ICC 2021 - IEEE International Conference on Communications. Ed. IEEE. Montreal, Canada: IEEE, 2021. Web. *

Twardokus, G., et al. "Targeted Discreditation Attack against Trust Management in Connected Vehicles." Proceedings of the ICC 2021 - IEEE International Conference on Communications. Ed. IEEE. Montreal, Canada: IEEE, 2021. Web. *

Alnemari, A., et al. "Interactive Range Queries for Healthcare Data under Differential Privacy." Proceedings of the 2021 IEEE 9th International Conference on Healthcare Informatics (ICHI),. Ed. IEEE. Victoria, Canada: IEEE, 2021. Print. «

2020 Submissions

Published Conference Proceedings

Wagh, Gaurav S., Sahil Gupta, and Sumita Mishra. "A Distributed Privacy Preserving Framework for the Smart Grid." Proceedings of the 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Washington DC, USA: IEEE, 2020. Web. *

Wagh, Gaurav S. and Sumita Mishra. "A Cyber-resilient Privacy Framework for the Smart Grid with Dynamic Billing Capabilities." Proceedings of the 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). Ed. IEEE. Tempre, AZ, USA: IEEE, 2020. Web. *

2019 Submissions

Book Chapter

Dongre, Siddharth, et al. "Quantifying the cost of data breaches." Critical Infrastructure Protection XIII), IFIP Advances in Information and Communication Technology. Ed. J. Staggs and S. Shenoi. Switzerland, AG: Springer, 2019. 3-16. Print. *

Published Conference Proceedings

Alnemari, Asma, et al. "Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy." Proceedings of the IEEE Symposium on Technologies for Homeland Security (IEEE HST 2019). Ed. IEEE. Woburn, MA: IEEE, Web. *

Dongre, Siddharth, et al. "Towards Quantifying the Cost to Privacy Resulting from Data Breaches." Proceedings of the Thirteenth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. IFIP. Arlington, VA: IFIP, Web. *

Peer Reviewed/Juried Poster Presentation or Conference Paper

Prasad, N., P. Talukdar, and S. Mishra. "Analysis of AES and PRESENT for encryption in IOT devices." Proceedings of the Women in Cybersecurity Conference (WiCYS 2019). Ed. WiCYS. Pittsburgh, PA: WiCYS. *

2018 Submissions

Book Chapter

Alnemari, A., et al. "Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy." Critical Infrastructure Protection XII. IFIP Advances in Information and Communication Technology, vol 542. Ed. Staggs J., Shenoi S.. Cham, Switzerland: Springer, 2018. 113-125. Web. *

Published Conference Proceedings

Schneider, J., et al. "Building Robust Risk Management as a Method of Situational Awareness at the Local Level." Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST),Woburn, MA, USA, Oct. 2018. Ed. IEEE. Woburn, MA: n.p., 2018. Web. *

Pan, Y., M. Yacci, and S. Mishra. "Assessing the Modular-based Digital Forensics Game for Entry Level Students." Proceedings of the 2018 ASEE Annual Conference and Exposition. Ed. ASEE. Salt Lake Cuty, UT: n.p., 2018. Web. *

Alnemari, A., et al. "Protecting Critical Infrastructure Data Through Enhanced Access Control, Blockchain, and Differential Privacy." Proceedings of the 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018. Ed. IFIP. Arlington, VA: n.p., 2018. Web. *

Peer Reviewed/Juried Poster Presentation or Conference Paper

Alnemari, A., et al. "Achieving Resiliency while Preserving Privacy in the Healthcare Sector." Proceedings of the 2018 International Symposium for Sustainable Systems and Technology (ISSST), June 25-28, 2018, Buffalo, New York. Ed. ISSST. Buffalo, NY: n.p.. *

2017 Submissions

Journal Paper

Mir, Darakhshan, et al. "How Do Faculty Partner While Teaching Interdisciplinary CS+X Courses: Models and Experiences." J. Comput. Sci. Coll. 32. 6 (2017): 24-33. Print. *

Published Conference Proceedings

Schneider, Jennifer, Carol Romanowski, Sumita Mishra, Rajendra K. Raj, M. McGuiness, and B. Swartz. "Building forward: Strategic Community Resilience." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE, 2017. Web. ˜

Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Course Modules for Entry Level Students." Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE). Ed. ACM. New York, NY: ACM, 2017. Print. *

Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Cybersecurity Course Content for Entry Level Students." Proceedings of the 2017 ASEE Annual Conference & Exposition. Ed. ASEE. Columbus, OH: ASEE, 2017. Web. ˜

Mishra, Sumita, Rajendra K. Raj, Paul Tymann, Jamie Fagan, and Sage Miller. "CyberCSP: Integrating Cybersecurity into the Computer Science Principles Course." Proceedings of the IEEE Frontiers in Education Conference. Ed. IEEE. Indianapolis, IN: IEEE, 2017. Print. *

Afrin, Sabrina and Sumita Mishra. "On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid (Best Paper Award)." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEE, 2017. Web. ˜

Peer Reviewed/Juried Poster Presentation or Conference Paper

Raj, Rajendra K., Sumita Mishra, Carol Romanowski, Jennifer Schneider, and Suhair Alshehri. "Modeling Threats: Insider Attacks on Critical Infrastructure Assets." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE. ˜

2016 Submissions

Published Conference Proceedings

Lipton, Ben and Sumita Mishra. "Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks." Proceedings of the 4th IEEE International Conference on Smart Energy Grid Engineering. Ed. IEEE. Oshawa, Canada: n.p., 2016. Print. *

Afrin, Sabrina and Sumita Mishra. "An Anonymized Authentication Framework for Smart Metering Data Privacy." Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Minneapolis, MN: n.p., 2016. Print. *

Schneider, Jennifer, Carol Romanowski, Rajendra Raj, Sumita Mishra, Jonathan Aleckna, and Kaiyue Wang. "Mapping a Community Resilience Management System: Building Operational Knowledge." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *

Romanowski, Carol, Jennifer Schneider, Sumita Mishra, Rajendra Raj, Rossi Rosario, Kent Stein and Bhargav Solanki. "Response and Recovery: A Quantitative Approach to Emergency Management." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *

Romanowski, Carol, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino,. "A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions." Proceedings of the Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016. Ed. Mason Rice, Sujeet Shenoi. Arlington, VA: Springer International Publishing, 2016. Print. *

Alshehri, Suhair, Sumita Mishra, Rajendra K. Raj,. "Using Access Control to Mitigate Insider Threats to Healthcare Systems." Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI). Ed. Wai-Tat Fu, Larry Hodges, Kai Zheng, Gregor Stiglic, Ann Blandford. Chicago, IL: IEEE, 2016. Print. *

Mishra, Sumita, Trudy Howles, Rajendra K. Raj, Carol J. Romanowski, Jennifer Schneider, Alicia McNett, Daryl J. Dates,. "A Modular Approach to Teaching Critical Infrastructure Protection Concepts to Engineering, Technology and Computing Students." Proceedings of the 2016 IEEE Frontiers in Education Conference (FIE). Ed. Steve Frezza, Dipo Onipede. Erie, PA: IEEE, 2016. Print. *

2015 Submissions

Journal Paper

Romanowski, Carol, et al. "Regional Response to Large-scale Emergency Events: Building on Historical Data." International Journal of Critical Infrastructure Protection 11. (2015): 12-21. Print. *

Published Conference Proceedings

Pan, Yin, Schwartz, David, and Mishra, Sumita. "Gamified Digital Forensics Course Modules for Undergraduates." Proceedings of the 5th IEEE Integrated STEM Conference (2015). Ed. IEEE. Princeton, NJ: n.p., 2015. Print. *

Romanowski, Carol, et al. "Regional Response to Large Scale Emergency Events: Building on Historical Data." Proceedings of the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. Sujeet Shenoi, Mason Rice. Arlington, VA: n.p., 2015. Print. *

Mishra, Sumita, et al. "On Building Cybersecurity Expertise in Critical Infrastructure Protection." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web. *

Schneider, Jennifer, et al. "Measurement of Locality Specific Resilience." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web. *

Invited Article/Publication

Association, Computing Research. "Innovative Approaches to Computing Education." Computing Education Final Report. (2015). Web.

2013 Submissions

Book Chapter

Oh, T., S. Mishra, and C. Hochgraf. "Smart Grid Security in the Last Mile." Security and Privacy in Smart Grids. Ed. Yang Xiao. Boca Raton, FL: CRC Press, 2013. 271-290. Print. *

Published Conference Proceedings

Huba, W., et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print. * «

Romanowski, C., et al. "Information Management and Decision Support in Critical Infrastructure Emergencies at the Local Level." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print. * «

Pan, Y. and S. Mishra. "Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements." Proceedings of the 17th Colloquium for Information Systems Security Education (CISSE 2013). Ed. CISSE. Mobile, AL: CISSE, 2013. Print. «

Mishra, S., et al. "A Curricular Framework for Critical Infrastructure Protection Education for Engineering, Technology and Computing Majors." Proceedings of the IEEE Frontiers in Education Conference (FIE 13). Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print. *

2012 Submissions

Journal Paper

Tuncer, Hasan, Sumita Mishra, and Nirmala Shenoy. "A Survey of Identity and Handoff Management Approaches for the Future Internet." Computer Communications - Elsevier 36. 1 (2012): 63-79. Print. *

Published Conference Proceedings

Pan, Yin, Sumita Mishra, Bo Yuan, Bill Stackpole, and David Schwartz. "Game-based Forensics Course For First Year Students." Proceedings of the 13th Annual ACM Special Interest Group for Information Technology Education (SIGITE 2012). Ed. ACM. Calgary, Canada: ACM, 2012. Print. *

Tuncer, Hasan, et al. "A Novel User-centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility Protocols." Proceedings of the IEEE Global Communications Conference (GLOBECOM 2012), Anaheim, CA. Ed. Z. Zhang. Anaheim, CA: IEEE, 2012. Print. *

Winemiller, Nathan, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the 2012 International Conference on Security and Management (SAM\'12). Ed. G. Markowsky. Monte Carlo, NV: SAM, 2012. Print. *

2011 Submissions

Book Chapter

Mishra, Sumita. "Wireless Sensor Networks: Emerging Applications and Security Solutions." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 217-236. Print. *

Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 131-157. Print. *

Published Conference Proceedings

Raj, Rajendra, Sumita Mishra, Carol Romanowski, and Trudy Howles. "CyberSecurity as General Education." Proceedings of the 15th Colloquium for Information Systems Security Education, June 13-15, 2011. Ed. CISSE. Fairborn, OH: 10 -15, Print. «

Polatcan, Onur, Sumita Mishra, and Yin Pan. "E-mail Behavior Profiling based on Attachment Type and Language." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. Sanjay Goel. Albany, NY: 6-10, Print. «

Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Threat-resistant Node Identification in Sensor Networks." Proceedings of the International Conference on Security and Management in 2011 World Congress in Computer Science, Computer Engineering and Applied Computing (WORLDCOMP). Ed. SAM 2011. Las Vegas, NV: UCMSS, 2011. Print. *

Howles, Trudy, Carol Romanowski, Sumita Mishra, and Rajendra Raj. "A Holistic, Modular Approach to Infuse CyberSecurity into Undergraduate Computing Degree Programs." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. S. Goel. Albany, NY: 67-70, Print. «

2010 Submissions

Formal Presentation

Pearson, David, Sumita Mishra, and Yin Pan. “Security Attacks and Defenses in Sensor Networks”, The 2010 International Conference on Security and Management (SAM’10), Las Vegas, NV. 12-15 July 2010. Presentation. " 

Published Article

Golen, Erik F., Sumita Mishra, and Nirmala Shenoy. “An Underwater Sensor Allocation Scheme for a Range Dependent Environment.” Computer Networks, 54.3 (2010): 404-415. Print. "  «

GoleGolen, Erik F., Sumita Mishra, and Nirmala Shenoy. “On the Effects of Deployment Imprecision on Underwater Sensor Connectivity.” Proceedings of the Fifth ACM International Workshop on UnderWater Networks, 2010. n.p. Print. "  *