Sumita Mishra Headshot

Sumita Mishra

Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences
Graduate Program Director, Cybersecurity

585-475-4475
Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Sumita Mishra

Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences
Graduate Program Director, Cybersecurity

Education

BS, Patna University (India); BS, Ph.D., State University of New York at Buffalo

Bio

Sumita Mishra is the Graduate Program Director and a Professor in the Department of Computing Security. She joined RIT in 2007 and has taught networking and security courses at both undergraduate and graduate levels. Her current research interests are in privacy for the smart grid and critical infrastructure protection. Recent awards include the cybersecurity best paper at the 2017 IEEE International Symposium on Technologies for Homeland Security (HST). Funding sources for Dr. Mishra's current and past projects include the National Science Foundation, Department of Homeland Security, Air Force Research Lab (Rome), Air Force Research Lab (Wright Patterson), NASA and Boeing. She has served on program committees of several IEEE and ACM conferences. She has published over 60 articles in national and international journals and conferences.

585-475-4475

Areas of Expertise

Select Scholarship

Published Conference Proceedings
Wagh, Gaurav S. and Sumita Mishra. "Divide & Conquer: A Privacy Safeguarding Framework for the Smart Grid." Proceedings of the ICC 2021 - IEEE International Conference on Communications. Ed. IEEE. Montreal, Canada: IEEE, 2021. Web.
Twardokus, G., et al. "Targeted Discreditation Attack against Trust Management in Connected Vehicles." Proceedings of the ICC 2021 - IEEE International Conference on Communications. Ed. IEEE. Montreal, Canada: IEEE, 2021. Web.
Alnemari, A., et al. "Interactive Range Queries for Healthcare Data under Differential Privacy." Proceedings of the 2021 IEEE 9th International Conference on Healthcare Informatics (ICHI),. Ed. IEEE. Victoria, Canada: IEEE, 2021. Print.
Wagh, Gaurav S., Sahil Gupta, and Sumita Mishra. "A Distributed Privacy Preserving Framework for the Smart Grid." Proceedings of the 2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Washington DC, USA: IEEE, 2020. Web.
Wagh, Gaurav S. and Sumita Mishra. "A Cyber-resilient Privacy Framework for the Smart Grid with Dynamic Billing Capabilities." Proceedings of the 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). Ed. IEEE. Tempre, AZ, USA: IEEE, 2020. Web.
Alnemari, Asma, et al. "Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy." Proceedings of the IEEE Symposium on Technologies for Homeland Security (IEEE HST 2019). Ed. IEEE. Woburn, MA: IEEE, Web.
Dongre, Siddharth, et al. "Towards Quantifying the Cost to Privacy Resulting from Data Breaches." Proceedings of the Thirteenth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. IFIP. Arlington, VA: IFIP, Web.
Schneider, J., et al. "Building Robust Risk Management as a Method of Situational Awareness at the Local Level." Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST),Woburn, MA, USA, Oct. 2018. Ed. IEEE. Woburn, MA: n.p., 2018. Web.
Pan, Y., M. Yacci, and S. Mishra. "Assessing the Modular-based Digital Forensics Game for Entry Level Students." Proceedings of the 2018 ASEE Annual Conference and Exposition. Ed. ASEE. Salt Lake Cuty, UT: n.p., 2018. Web.
Alnemari, A., et al. "Protecting Critical Infrastructure Data Through Enhanced Access Control, Blockchain, and Differential Privacy." Proceedings of the 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018. Ed. IFIP. Arlington, VA: n.p., 2018. Web.
Mishra, Sumita, Rajendra K. Raj, Paul Tymann, Jamie Fagan, and Sage Miller. "CyberCSP: Integrating Cybersecurity into the Computer Science Principles Course." Proceedings of the IEEE Frontiers in Education Conference. Ed. IEEE. Indianapolis, IN: IEEE, 2017. Print.
Afrin, Sabrina and Sumita Mishra. "On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid (Best Paper Award)." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEE, 2017. Web.
Schneider, Jennifer, Carol Romanowski, Sumita Mishra, Rajendra K. Raj, M. McGuiness, and B. Swartz. "Building forward: Strategic Community Resilience." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE, 2017. Web.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Course Modules for Entry Level Students." Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE). Ed. ACM. New York, NY: ACM, 2017. Print.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Cybersecurity Course Content for Entry Level Students." Proceedings of the 2017 ASEE Annual Conference & Exposition. Ed. ASEE. Columbus, OH: ASEE, 2017. Web.
Lipton, Ben and Sumita Mishra. "Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks." Proceedings of the 4th IEEE International Conference on Smart Energy Grid Engineering. Ed. IEEE. Oshawa, Canada: n.p., 2016. Print.
Afrin, Sabrina and Sumita Mishra. "An Anonymized Authentication Framework for Smart Metering Data Privacy." Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Minneapolis, MN: n.p., 2016. Print.
Schneider, Jennifer, Carol Romanowski, Rajendra Raj, Sumita Mishra, Jonathan Aleckna, and Kaiyue Wang. "Mapping a Community Resilience Management System: Building Operational Knowledge." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print.
Romanowski, Carol, Jennifer Schneider, Sumita Mishra, Rajendra Raj, Rossi Rosario, Kent Stein and Bhargav Solanki. "Response and Recovery: A Quantitative Approach to Emergency Management." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print.
Romanowski, Carol, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino,. "A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions." Proceedings of the Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016. Ed. Mason Rice, Sujeet Shenoi. Arlington, VA: Springer International Publishing, 2016. Print.
Alshehri, Suhair, Sumita Mishra, Rajendra K. Raj,. "Using Access Control to Mitigate Insider Threats to Healthcare Systems." Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI). Ed. Wai-Tat Fu, Larry Hodges, Kai Zheng, Gregor Stiglic, Ann Blandford. Chicago, IL: IEEE, 2016. Print.
Mishra, Sumita, Trudy Howles, Rajendra K. Raj, Carol J. Romanowski, Jennifer Schneider, Alicia McNett, Daryl J. Dates,. "A Modular Approach to Teaching Critical Infrastructure Protection Concepts to Engineering, Technology and Computing Students." Proceedings of the 2016 IEEE Frontiers in Education Conference (FIE). Ed. Steve Frezza, Dipo Onipede. Erie, PA: IEEE, 2016. Print.
Romanowski, Carol, et al. "Regional Response to Large Scale Emergency Events: Building on Historical Data." Proceedings of the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. Sujeet Shenoi, Mason Rice. Arlington, VA: n.p., 2015. Print.
Mishra, Sumita, et al. "On Building Cybersecurity Expertise in Critical Infrastructure Protection." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web.
Schneider, Jennifer, et al. "Measurement of Locality Specific Resilience." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web.
Pan, Yin, Schwartz, David, and Mishra, Sumita. "Gamified Digital Forensics Course Modules for Undergraduates." Proceedings of the 5th IEEE Integrated STEM Conference (2015). Ed. IEEE. Princeton, NJ: n.p., 2015. Print.
Huba, W., et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print.
Romanowski, C., et al. "Information Management and Decision Support in Critical Infrastructure Emergencies at the Local Level." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print.
Pan, Y. and S. Mishra. "Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements." Proceedings of the 17th Colloquium for Information Systems Security Education (CISSE 2013). Ed. CISSE. Mobile, AL: CISSE, 2013. Print.
Mishra, S., et al. "A Curricular Framework for Critical Infrastructure Protection Education for Engineering, Technology and Computing Majors." Proceedings of the IEEE Frontiers in Education Conference (FIE 13). Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print.
Pan, Yin, Sumita Mishra, Bo Yuan, Bill Stackpole, and David Schwartz. "Game-based Forensics Course For First Year Students." Proceedings of the 13th Annual ACM Special Interest Group for Information Technology Education (SIGITE 2012). Ed. ACM. Calgary, Canada: ACM, 2012. Print.
Tuncer, Hasan, et al. "A Novel User-centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility Protocols." Proceedings of the IEEE Global Communications Conference (GLOBECOM 2012), Anaheim, CA. Ed. Z. Zhang. Anaheim, CA: IEEE, 2012. Print.
Winemiller, Nathan, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the 2012 International Conference on Security and Management (SAM\'12). Ed. G. Markowsky. Monte Carlo, NV: SAM, 2012. Print.
Raj, Rajendra, Sumita Mishra, Carol Romanowski, and Trudy Howles. "CyberSecurity as General Education." Proceedings of the 15th Colloquium for Information Systems Security Education, June 13-15, 2011. Ed. CISSE. Fairborn, OH: 10 -15, Print.
Polatcan, Onur, Sumita Mishra, and Yin Pan. "E-mail Behavior Profiling based on Attachment Type and Language." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. Sanjay Goel. Albany, NY: 6-10, Print.
Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Threat-resistant Node Identification in Sensor Networks." Proceedings of the International Conference on Security and Management in 2011 World Congress in Computer Science, Computer Engineering and Applied Computing (WORLDCOMP). Ed. SAM 2011. Las Vegas, NV: UCMSS, 2011. Print.
Howles, Trudy, Carol Romanowski, Sumita Mishra, and Rajendra Raj. "A Holistic, Modular Approach to Infuse CyberSecurity into Undergraduate Computing Degree Programs." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. S. Goel. Albany, NY: 67-70, Print.
Book Chapter
Dongre, Siddharth, et al. "Quantifying the cost of data breaches." Critical Infrastructure Protection XIII), IFIP Advances in Information and Communication Technology. Ed. J. Staggs and S. Shenoi. Switzerland, AG: Springer, 2019. 3-16. Print.
Alnemari, A., et al. "Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy." Critical Infrastructure Protection XII. IFIP Advances in Information and Communication Technology, vol 542. Ed. Staggs J., Shenoi S.. Cham, Switzerland: Springer, 2018. 113-125. Web.
Oh, T., S. Mishra, and C. Hochgraf. "Smart Grid Security in the Last Mile." Security and Privacy in Smart Grids. Ed. Yang Xiao. Boca Raton, FL: CRC Press, 2013. 271-290. Print.
Mishra, Sumita. "Wireless Sensor Networks: Emerging Applications and Security Solutions." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 217-236. Print.
Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 131-157. Print.
Peer Reviewed/Juried Poster Presentation or Conference Paper
Prasad, N., P. Talukdar, and S. Mishra. "Analysis of AES and PRESENT for encryption in IOT devices." Proceedings of the Women in Cybersecurity Conference (WiCYS 2019). Ed. WiCYS. Pittsburgh, PA: WiCYS.
Alnemari, A., et al. "Achieving Resiliency while Preserving Privacy in the Healthcare Sector." Proceedings of the 2018 International Symposium for Sustainable Systems and Technology (ISSST), June 25-28, 2018, Buffalo, New York. Ed. ISSST. Buffalo, NY: n.p..
Raj, Rajendra K., Sumita Mishra, Carol Romanowski, Jennifer Schneider, and Suhair Alshehri. "Modeling Threats: Insider Attacks on Critical Infrastructure Assets." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE.
Journal Paper
Mir, Darakhshan, et al. "How Do Faculty Partner While Teaching Interdisciplinary CS+X Courses: Models and Experiences." J. Comput. Sci. Coll. 32. 6 (2017): 24-33. Print.
Romanowski, Carol, et al. "Regional Response to Large-scale Emergency Events: Building on Historical Data." International Journal of Critical Infrastructure Protection 11. (2015): 12-21. Print.
Tuncer, Hasan, Sumita Mishra, and Nirmala Shenoy. "A Survey of Identity and Handoff Management Approaches for the Future Internet." Computer Communications - Elsevier 36. 1 (2012): 63-79. Print.
Invited Article/Publication
Association, Computing Research. "Innovative Approaches to Computing Education." Computing Education Final Report. (2015). Web.
Published Article
Golen, Erik F., Sumita Mishra, and Nirmala Shenoy. “An Underwater Sensor Allocation Scheme for a Range Dependent Environment.” Computer Networks, 54.3 (2010): 404-415. Print. "  «
GoleGolen, Erik F., Sumita Mishra, and Nirmala Shenoy. “On the Effects of Deployment Imprecision on Underwater Sensor Connectivity.” Proceedings of the Fifth ACM International Workshop on UnderWater Networks, 2010. n.p. Print. "  *
Formal Presentation
Pearson, David, Sumita Mishra, and Yin Pan. “Security Attacks and Defenses in Sensor Networks”, The 2010 International Conference on Security and Management (SAM’10), Las Vegas, NV. 12-15 July 2010. Presentation. " 

Currently Teaching

CSEC-604
3 Credits
In this course, students will gain in depth knowledge of cryptography and authentication. Students will explore various cryptographic algorithms and authentication protocols, focusing on their design and implementation. Students will also work on a research or implementation project, based on cryptographic algorithms and/or authentication protocols. The applications of cryptography and authentication in the areas of computer networks and systems will also be investigated. This course requires prior knowledge in Discrete Mathematics.
CSEC-790
1 - 6 Credits
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded. As part of their original work, students are expected to write and submit an article for publication in a peer reviewed journal or conference.
CSEC-791
1 - 3 Credits
This course is one of the capstone options in the MS in Computing Security program. It offers students the opportunity to investigate a selected topic within the computing security domain. A project involves some type of practical development with a deliverable. This may include development with computer equipment, software packages, and programming/scripting languages. Alternately, it may be the development and demonstration of an innovative process that addresses a current computing security issue or problem. Students must submit an acceptable proposal to a project committee (chair, and reader) before they may be registered by the department for the MS in CSEC Project. Students must defend their work in an open project defense and complete a written report of their work before a letter grade is awarded. A well-written professional report is required that details current thinking on the topic in the professional literature, the design and implementation of development that was done, and a critical evaluation of the results.
CSEC-793
3 Credits
This course is one of the capstone options in the MS in Computing Security program. Students will apply their knowledge to solve real-world problems in the areas of computing security. Students will work on an individual semester-long project involving some type of practical development with a deliverable. This may include development with computer equipment, software packages, and programming or scripting languages. Alternately, it may be the development and demonstration of an innovative process that addresses a current computing security issue or problem. A well-written professional report is required that details current thinking on the topic in the professional literature, the design and implementation of development that was done, and a critical evaluation of the results. The students will also present their findings in an open forum. Students are expected to submit a short proposal before they can be enrolled in the class.
CSEC-909
0 Credits
This course is part of a capstone experience for graduate students who are beginning the capstone experience. Students will submit an accepted proposal as a prerequisite for the formal thesis.

In the News