DEPARTMENT OF COMPUTING SECURITY

To view listing from a different department, select department name from the right.

Sumita Mishra

Professor
Department of Computing Security
Golisano College of Computing and Information Sciences

2019 Submissions

Book Chapter

Dongre, Siddharth, et al. "Quantifying the cost of data breaches." Critical Infrastructure Protection XIII), IFIP Advances in Information and Communication Technology. Ed. J. Staggs and S. Shenoi. Switzerland, AG: Springer, 2019. 3-16. Print. *

Published Conference Proceedings

Alnemari, Asma, et al. "Protecting Personally Identifiable Information (PII) in Critical Infrastructure Data Using Differential Privacy." Proceedings of the IEEE Symposium on Technologies for Homeland Security (IEEE HST 2019). Ed. IEEE. Woburn, MA: IEEE, Web. *

Dongre, Siddharth, et al. "Towards Quantifying the Cost to Privacy Resulting from Data Breaches." Proceedings of the Thirteenth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. IFIP. Arlington, VA: IFIP, Web. *

Peer Reviewed/Juried Poster Presentation

Prasad, N., P. Talukdar, and S. Mishra. "Analysis of AES and PRESENT for encryption in IOT devices." Proceedings of the Women in Cybersecurity Conference (WiCYS 2019). Ed. WiCYS. Pittsburgh, PA: WiCYS. *

View All Submissions

Hanif Rahbari

Assistant Professor
Department of Computing Security
Golisano College of Computing and Information Sciences

2019 Submissions

Journal Paper

Siyari, Peyman, Hanif Rahbari, and Marwan Krunz. "Lightweight Machine Learning for Efficient Frequency-Offset-Aware Demodulation." IEEE Journal on Selected Areas in Communications 37. 11 (2019): 2544-2558. Print. *

Full Patent

Krunz, Marwan M., et al. "Systems and Methods for Securing Wireless Communications." U.S. Patent 10,439,755. 8 Oct. 2019. * £

View All Submissions

Ziming Zhao

Assistant Professor
Department of Computing Security
Golisano College of Computing and Information Sciences

2019 Submissions

Journal Paper

Hu, Hongxin, et al. "Towards a Reliable Firewall for Software-Defined Networks." Computers & Security (COSE). (2019) Print. *

Chen, Jing, et al. "Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps." IEEE Transactions on Dependable and Secure Computing (TDSC). (2019) Print. *

Published Conference Proceedings

Kokulu, Faris Bugra, et al. "Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues." Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS). London, UK: n.p., 2019. Print. «

Tu, Huahong, et al. "Users Really Do Answer Telephone Scams." Proceedings of the USENIX Security Symposium (SECURITY). San Jose, CA: n.p., 2019. Print. «

Sun, Zhibo, et al. "Understanding and Predicting Private Interactions in Underground Forums." Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY). n.p., 2019. Print. «

Medrano, Carlos Rubio, et al. "Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies." Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT). n.p., 2019. Print. «

Zhang, Penghui, et al. "iCORE: Continuous and Proactive Extrospection on Multi-core IoT Devices." Proceedings of the ACM/SIGAPP Symposium On Applied Computing (SAC). n.p., 2019. Print. «

Lamp, Josephine, et al. "ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems." Proceedings of the IEEE Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES). Ed. N/A. N/A, N/A: n.p., 2019. Print. «

View All Submissions