DEPARTMENT OF CYBERSECURITY

To view listing from a different department, select department name from the right.

Khalil Al Hussaeni

Department of Cybersecurity
Golisano College of Computing and Information Sciences

2018 Submissions

Journal Paper

Al-Hussaeni, Khalil, et al. "SafePath: Differentially-Private Publishing of Passenger Trajectories in Transportation Systems." Computer Networks (COMNET): Special Issue on Intelligent and Connected Transportation Systems 143. (2018): 126-139. Web. «

Al-Hussaeni, Khalil, et al. "Differentially-Private Multidimensional Data Publishing." Knowledge and Information Systems (KAIS) 56. 3 (2018): 717-752. Web. «

View All Submissions

Sumita Mishra

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2018 Submissions

Book Chapter

Alnemari, A., et al. "Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy." Critical Infrastructure Protection XII. IFIP Advances in Information and Communication Technology, vol 542. Ed. Staggs J., Shenoi S.. Cham, Switzerland: Springer, 2018. 113-125. Web. *

Published Conference Proceedings

Schneider, J., et al. "Building Robust Risk Management as a Method of Situational Awareness at the Local Level." Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST),Woburn, MA, USA, Oct. 2018. Ed. IEEE. Woburn, MA: n.p., 2018. Web. *

Pan, Y., M. Yacci, and S. Mishra. "Assessing the Modular-based Digital Forensics Game for Entry Level Students." Proceedings of the 2018 ASEE Annual Conference and Exposition. Ed. ASEE. Salt Lake Cuty, UT: n.p., 2018. Web. *

Alnemari, A., et al. "Protecting Critical Infrastructure Data Through Enhanced Access Control, Blockchain, and Differential Privacy." Proceedings of the 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018. Ed. IFIP. Arlington, VA: n.p., 2018. Web. *

Peer Reviewed/Juried Poster Presentation or Conference Paper

Alnemari, A., et al. "Achieving Resiliency while Preserving Privacy in the Healthcare Sector." Proceedings of the 2018 International Symposium for Sustainable Systems and Technology (ISSST), June 25-28, 2018, Buffalo, New York. Ed. ISSST. Buffalo, NY: n.p.. *

View All Submissions

Yin Pan

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2018 Submissions

Peer Reviewed/Juried Poster Presentation or Conference Paper

Pan, Yin, Sumita Mishra, and Micheal Yacci. "Assessing the Modular-based Digital Forensics Game for Entry Level Students." Proceedings of the ASEE Annual Conference & Exposition. Ed. None. Salt Lake City, Utah: n.p.. *

Mosli, Rayan, Bo Yuan, and Yin Pan. "On the Viability of Data Collection Using Google Rapid Response for Enterprise-level Malware Research." Proceedings of the Digital Forensics Workshop (DFRWS). Ed. None. Rhode Island, Providence: n.p.. *

View All Submissions

Justin Pelletier

Professor of Practice
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2018 Submissions

Journal Paper

Pelletier, J.M. "Longitudinal Analysis of Information Security Incident Spillover Effects." Journal of Management Science and Business Intelligence 3. (2018): 15-20. Web. *

Published Conference Proceedings

Pelletier, J.M. and Shita, M. "Optimizing Alternative Futures: Assuring Security in the Event of Machine Superintelligence." Proceedings of the Proceedings of the International Conference on Intelligent Computing and Big Data, Houston, TX, 6-7 April, 2018. Ed. Bruce O'Neal, Yu Sun. Houston, TX: IBII, Print. £

Hair, N., Santa, J., and Pelletier, J.M. "Online customer experience in e-learning: Understanding the antecedents and outcomes of perspective graduate student’s website interactions when selecting a place of higher education." Proceedings of the OLC Accelerate 2018. Orlando, FL. Ed. Katie Fife Schuster. Orlando, Florida: OLC, 2018. Print. £

Peer Reviewed/Juried Poster Presentation or Conference Paper

Pelletier, J.M. "The Race to Feld and Secure Autonomous Combat Units." Proceedings of the 2018 USENIX Summit on Hot Topics in Security, Baltimore, MD. Ed. David Brumley, Parisa Tabriz. Baltimore, MD: n.p.. £

View All Submissions

Hanif Rahbari

Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2018 Submissions

Published Conference Proceedings

Rahbari, Hanif, et al. "Adaptive Demodulation for Wireless Systems in the Presence of Frequency-Offset Estimation Errors." Proceedings of the IEEE INFOCOM, Honolulu, HI, USA, April 2018. Ed. N/A. Piscataway, NJ: IEEE, 2018. Print. *

Rahbari, Hanif, Jinshan Liu, and Jung-Min (Jerry) Park. "SecureMatch: Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques." Proceedings of the IEEE Conference on Communications and Network Security (CNS), Beijing, China, June 2018. Ed. N/A. Piscataway, NJ: IEEE, 2018. Print. *

Full Patent

Krunz, Marwan M., et al. "Systems and Methods for Securing Wireless Communications." U.S. Patent US010069592B1. 4 Sep. 2018. *

View All Submissions

Ziming Zhao

Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2018 Submissions

Journal Paper

Chen, Jing, et al. "Uncovering the Face of Android Ransomware: Characterization and Real-time Detection." IEEE Transactions on Information Forensics & Security (TIFS). (2018): 0-0. Print. *

Published Conference Proceedings

Baek, Jaejong, et al. "Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling." Proceedings of the Annual Computer Security Applications Conference (ACSAC). Ed. N/A. N/A, Puerto Rico: n.p., 2018. Print. «

Dixit, Vaibhav Hemant, et al. "AIM-SDN: Attacking Information Mismanagement in SDN-datastores." Proceedings of the ACM Conference on Computer and Communications Security (CCS). Ed. N/A. n.p., 2018. Print. *

Cho, Haehyun, et al. "Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone." Proceedings of the Annual Computer Security Applications Conference (ACSAC). Ed. N/A. n.p., 2018. Print. «

Coughlin, Vu, et al. "EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems." Proceedings of the IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). Ed. N/A. N/A, N/A: n.p., 2018. Print. «

Gutierrez, Mauricio, et al. "CacheLight: Defeating the CacheKit Attack." Proceedings of the Workshop on Attacks and Solutions in Hardware Security (Ashes). Ed. N/A. n.p., 2018. Print. «

Mabey, Mike, et al. "Challenges, Opportunities, and a Framework for Web Environment Forensics." Proceedings of the IFIP Working Group 11.9 Digital Forensics (11.9 Digital Forensics). Ed. N/A. n.p., 2018. Print. «

Chandramouli, Sai Prashanth, et al. "Measuring E-Mail Header Injections on the World Wide Web." Proceedings of the ACM/SIGAPP Symposium On Applied Computing (SAC). Ed. N/A. n.p., 2018. Print. «

Lamp, Josephine, et al. "The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS." Proceedings of the International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT). Ed. N/A. Washington, DC: n.p., 2018. Print. «

Medrano, Carlos Rubio, Ziming Zhao, and Gail-Joon Ahn. "RiskPol: A Risk Assessment Framework for Preventing Attribute-Forgery Attacks to ABAC Policies." Proceedings of the ACM Workshop on Attribute Based Access Control (ABAC). Ed. N/A. Tempe, AZ: AMC, 2018. Print. «

Dixit, Vaibhav Hemant, et al. "Challenges and Preparedness of SDN-based Firewalls." Proceedings of the ACM Workshop on Security in Software Defined Networks and Network Function Virtualization (SDNNFV). Ed. N/A. Tempe, AZ: n.p., 2018. Print. «

View All Submissions