DEPARTMENT OF CYBERSECURITY

To view listing from a different department, select department name from the right.

Daryl Johnson

Associate Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2016 Submissions

Journal Paper

Heard, Timothy and Daryl G Johnson. "An Extended Discussion on a High-Capacity Covert Channel for the Android Operating System." International Journal of Computing 15. 3 (2016): 191-199. Web. ∆

Published Conference Proceedings

Johnson, Matthew R, Peter H Lutz, and Daryl G Johnson. "Covert Channel using Man-In-The-Middle over HTTPS." Proceedings of the 2016 International Conference on Computational Science and Computational Intelligence(CSCI’16)(2016, December). Las Vegaas, NV: CPS, 2016. Print. *

Heilman, Susan, Jonathan Williams, and Daryl G Johnson. "Covert Channel in HTTP User-Agents." Proceedings of the 11th Annual Symposium on Information Assurance (ASIA’16) (2016, June)Albany, NY USA. Ed. Sanjay Goel. Albany, NY: ASIA, 2016. Web. £

Waggoner, Jonathan, William Stackpole, and Daryl G Johnson. "A Hands-On Approach to Computing Security Education: Metasploit Module Development." Proceedings of the 20th Colloquium for Information Systems Security Education (CISSE 2016) (Philadelphia, PA, USA 2016). Ed. ?. Philadelphia, PA: CISSE, 2016. Web. «

Daneault, Gregory and Daryl G Johnson. "Client-Initiated HTTP Covert Channels Using Relays." Proceedings of the 4th International Symposium on Digital Forensic and Security (ISDFS)’2016)(p.32-37) (Little Rock, Arkansas-April 2016)Best Student Paper Award. Ed. Piroska Haller. Little Rock, AK: IEEE, 2016. Print. «

Bogaard, Dan, et al. "Producing and Evaluating Crowdsourced Computer Security Attack Trees." Proceedings of the 2016 IEEE International Symposium on Technologies for Homeland Security(HST)’2016) (Waltham, Ma-May 2016). Ed. Claire Applegarth & Mark Peters. Waltham, MA: IEEE, 2016. Print. *

View All Submissions

Sumita Mishra

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2016 Submissions

Published Conference Proceedings

Lipton, Ben and Sumita Mishra. "Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks." Proceedings of the 4th IEEE International Conference on Smart Energy Grid Engineering. Ed. IEEE. Oshawa, Canada: n.p., 2016. Print. *

Afrin, Sabrina and Sumita Mishra. "An Anonymized Authentication Framework for Smart Metering Data Privacy." Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Minneapolis, MN: n.p., 2016. Print. *

Schneider, Jennifer, Carol Romanowski, Rajendra Raj, Sumita Mishra, Jonathan Aleckna, and Kaiyue Wang. "Mapping a Community Resilience Management System: Building Operational Knowledge." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *

Romanowski, Carol, Jennifer Schneider, Sumita Mishra, Rajendra Raj, Rossi Rosario, Kent Stein and Bhargav Solanki. "Response and Recovery: A Quantitative Approach to Emergency Management." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *

Romanowski, Carol, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino,. "A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions." Proceedings of the Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016. Ed. Mason Rice, Sujeet Shenoi. Arlington, VA: Springer International Publishing, 2016. Print. *

Alshehri, Suhair, Sumita Mishra, Rajendra K. Raj,. "Using Access Control to Mitigate Insider Threats to Healthcare Systems." Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI). Ed. Wai-Tat Fu, Larry Hodges, Kai Zheng, Gregor Stiglic, Ann Blandford. Chicago, IL: IEEE, 2016. Print. *

Mishra, Sumita, Trudy Howles, Rajendra K. Raj, Carol J. Romanowski, Jennifer Schneider, Alicia McNett, Daryl J. Dates,. "A Modular Approach to Teaching Critical Infrastructure Protection Concepts to Engineering, Technology and Computing Students." Proceedings of the 2016 IEEE Frontiers in Education Conference (FIE). Ed. Steve Frezza, Dipo Onipede. Erie, PA: IEEE, 2016. Print. *

View All Submissions

Yin Pan

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2016 Submissions

Published Conference Proceedings

Mosli, Rayan, et al. "Automated malware detection using artifacts in forensic memory images." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. IEEE Conference. Waltham, Massachusetts: n.p., 2016. Print. «

View All Submissions

Matthew Wright

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2016 Submissions

Journal Paper

Al-Ameen, Mahdi Nasrullah and Matthew Wright. "A Comprehensive Study of the GeoPass User Authentication Scheme." Interacting with Computers. (2016): 1-1. Web. *

Al-Ameen, Mahdi Nasrullah and Matthew Wright. "iPersea: Towards Improving the Sybil-resilience of Social DHT." Journal of Network and Computer Applications 71. (2016): 1-10. Web. *

Al-Ameen, Mahdi Nasrullah, S M Taiabul Haque, and Matthew Wright. "Leveraging Autobiographical Memory for Two-factor Online Authentication." Information and Computer Security 24. 4 (2016): 386-399. Print. *

Barton, Armon and Matthew Wright. "DeNASA: Destination-Naive AS-Awareness in Anonymous Communications." Proceedings on Privacy Enhancing Technologies 2016. 4 (2016): 356—372. Web. «

Published Conference Proceedings

Juarez, Marc, et al. "WTF-PAD: Toward an Efficient Website Fingerprinting Defense." Proceedings of the European Symposium on Research in Computer Security (ESORICS). Ed. Ioannis Askoxylakis, et al. Heraklion, Greece: Springer, 2016. Print. *

View All Submissions

Bo Yuan

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2016 Submissions

Published Conference Proceedings

Mosli, Rayan, et al. "Automated Malware Detection Using Artifacts in Forensic Memory Images." Proceedings of the IEEE Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE, 2016. Print. *

View All Submissions

Ziming Zhao

Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2016 Submissions

Journal Paper

Jing, Yiming, et al. "TRIPLEMON: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android." Journal of Computer Security (JCS). (2016): 0-0. Print. *

View All Submissions