Search form

Recent Research Publications

2013

S. Reddy, S. Shetty, and K. Xiong, Security risk assessment of cloud carriers, Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2013


K. Xiong and Y. He, Power-efficient resource allocation in MapReduce clusters, Proceedings of the 13th IEEE/IFIP Integrated Network Management Symposium (IM), 2013


K. Xiong and Y. Pan, Understanding ProtoGENi resources in networking courses for research and education, Processing of the GENI Research and Education Experimental Workshop (GREE), 2013.


Bill Huba, Bo Yuan, Yin Pan and Sumita Mishra, Towards A Web Tracking Profiling Algorithm, Proc. of the 2013 IEEE International Conference on Technologies for Homeland Security, Waltham, Massachusetts, 2013


Kaiqi Xiong and Yin Pan, Understanding ProtoGENI in Networking Courses for Research and Education, Proc. of the Second GENI Research and Educational Experiment Workshop (GREE2013), co-located with GENI Engineering Conference (GEC16), Salt Lake City, Utah, 2013


Y. Pan and S. Mishra, Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements, Proc. of the 17th Colloquium for Information Systems Security Education, Mobile, Alabama, 2013
 

2012
K. Xiong, K. Han, and P. Ratazzi, Service Level Agreement (SLA)-based resource management for high-performance cloud auditing (book chapter), Springer Verlag, accepted, 2012


B. Choi, S. Song, K. Xiong, and K. Han, Large file transfer in cloud computing (book chapter), Springer Verlag, accepted, 2012


K. Xiong, R. Wang, W. Du, and P. Ning, Containing bogus packet insertion attacks for broadcast authentication in sensor networks, ACM Transactions on Sensor Networks, 2012


K. Xiong, The performance of public-key based authentication protocols, Proceedings of the International Conference on Network and System Security (NSS), 2012


S. Shetty, N. Luna and K. Xiong, Assessing network path vulnerabilities for secure cloud computing, Proceedings of the Cloud Nets Data Centers, in conjunction with IEEE International Conference on Communications (ICC), 2012


K. Xiong, Energy-efficient resource management for QoS-guaranteed computing clusters, Proceedings of the 20th IEEE International Symposium and Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), short paper, 2012


K. Xiong and D. Thuente, Locating jamming attackers in malicious wireless sensor networks, Proceedings of the 31rd IEEE International Performance Computing and Communication Conferences (IPCCC), 2012


K. Xiong and H. Perros, SLA-guaranteed composite cloud services, Proceedings of the International IBM Cloud Academy Conference (ICACON), 2012


N. Luna, S. Shetty, T. Rogers, and K. Xiong, Assessment of router vulnerabilities on PlanetLab infrastructure for secure cloud computing, Proceedings of the First GENI Research and Educational Experiment Workshop, 2012


Y. Pan, S. Mishra, B. Yuan, B. Stackpole and D. Schwartz (2012). Game-based Forensics Course For First Year Students, Proc. of 13th Annual ACM Special Interest Group for Information Technology Education (SIGITE 2012), Calgray, Alberta, Canada.


Sanders, Y. Pan, B. Yuan and T. Sun (2012). Correlating Risk Findings to Quantify Risk, Proc. of 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2012), Amsterdam, Netherlands.


Katz, E., Mislan, R., Lee, B. (April 2012). Over-the-Air Penetration Testing. CERIAS Annual Information Security Symposium 2012.
 

2011

T. Howles, C. Romanowski, S. Mishra and R. Raj [2011], “A Holistic, Modular Approach to Infuse Cyber Security into Undergraduate Computing Degree Programs”, Annual Symposium on Information Assurance (ASIA 2011), Albany NY, June 2011. Accepted for publication.

R. Raj, S. Mishra, C. Romanowski, T. Howles [2011], “CyberSecurity as General Education”, 15th Colloquium for Information Systems Security Education (CISSE 2011), Fairborn, Ohio, June 2011. Accepted for publication.

Onur Polatcan, Sumita Mishra and Yin Pan [2011], "Invisible Witness Tool for Email Behavior Profiling", To appear in Proc. of 6th Annual Symposium on Information Assurance (ASIA '11), June, Albany, NY.

S. Mishra [2011], “Wireless Sensor Networks: Emerging Applications and Security Solutions”, Network Security, Administration and Management: Advancing Technologies and Practices (D. Kar & M. Syed, Editors) IGI Global Publishers, 2011.Accepted for publication.

David Pearson, Sumita Mishra and Yin Pan [2011], "Dynamic Treat-resistant Node Identification in Sensor Networks", To appear in Proc. of Cyber security Education – 2011 International Conference on Security & Management World Congress in Computer Science, July, Las Vegas, Nevada.

Yin Pan, Bo Yuan and Sumita Mishra [2011], “Network Security Auditing”, Book Chapter, in NETWORK SECURITY, ADMINISTRATION AND MANAGEMENT: ADVANCING TECHNOLOGIES AND PRACTICES, IGI Global publication, 2011.

2010

Bruce Hartpence and Daryl Johnson [2010], "A Reexamination of Network Address Translation Security," SAM'10 - The 2010 International Conference on Security and Management

David Pearson, Sumita Mishra and Yin Pan [2010], "Security attacks and defenses in sensor networks", Cyber security Education – 2010 International Conference on Security & Management World Congress in Computer Science, July, Las Vegas, Nevada.

Yin Pan, Bill Stackpole and Luther Troell [2010], "Computer Forensics Technologies For Personal Identifiable Information Detection and Audits", Journal of Information Systems Audit and Control Association (ISACA), vol. 2, pp. 44-48.

Michael Robertson, Yin Pan and Bo Yuan [2010], "A Social Approach to Security: Using Social Networks to Help Detect Malicious Web Content." In: Proceedings of 2010 International Conference on Intelligent Systems and Knowledge Engineering (ISKE2010), Nov., 2010, Hangzhou, China.

Christopher Forbes, Bo Yuan, Daryl Johnson and Peter Lutz [2010], "A Covert Channel in RTP Protocol." In: Proceedings of the 9th International FLINS Conference on Foundations and Applications of Computational Intelligence, August 2-4, 2010 Chengdu, China.

Erik Brown, Bo Yuan, Daryl Johnson and Peter Lutz [2010], "Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks." In: Proceedings of the 5th International Conference on Information-Warfare & Security, April 8-9, Ohio, USA, pp.56—64.

Kristian Stroke, Bo Yuan, Daryl Johnson and Peter Lutz [2009], "ICMP Covert Channel Resiliency." In: Proceedings of the International Joint Conference on Computer, Information, and Systems Sciences and Engineering (CISSE 09), December 4-12, 2009.

T. Oh, S. Mishra and Y. Pan [2009], “Teaching High-Assurance Internet Protocol Encryption (HAIPE) using OPNET Modeler Simulation Tool”, Proc. of ACM-SIGITE 2009 conference, Fairfax, VA, pp. 161-165.

S. Mishra, Y. Pan and T. Oh [2009], “Undergraduate Research in Wireless Sensor Security Course”, Proc. of the 13th Colloquium for Information Systems Security Education, Seattle, Washington.