Sumita Mishra Headshot

Sumita Mishra

Professor
Department of Computing Security
Golisano College of Computing and Information Sciences

585-475-4475
Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Sumita Mishra

Professor
Department of Computing Security
Golisano College of Computing and Information Sciences

Education

BS, Patna University (India); BS, Ph.D., State University of New York at Buffalo

Bio

Sumita Mishra is the graduate program director and a professor in the Department of Computing Security. She joined RIT in 2007 and has taught networking and security courses at both undergraduate and graduate levels. Her current research interests are in privacy for the smart grid critical infrastructure protection. Recent awards include the Cybersecurity best paper at the 2017 IEEE International Symposium on Technologies for Homeland Security HST). Funding sources for Dr. Mishra's current and past projects include the National Science Foundation, Department of Homeland Security, Air Force Research Lab (Rome), Air Force Research Lab (Wright Patterson), NASA and Boeing. She has served on program committees of several IEEE and ACM conferences. She has published over 60 articles in national and international journals and conferences.

585-475-4475

Areas of Expertise
Applied Cryptography
Privacy-preserving Protocols
Sensor Network Security

Currently Teaching

CSEC-791
1 - 3 Credits
This course is a capstone course in the MS in computing security program. It offers students the opportunity to investigate a selected topic within the computing security domain. The student may complete a project for real world application or in a laboratory environment. Students must submit an acceptable proposal to a project committee (chair, and reader) before they may be registered by the department for the MS project. Students must defend their work in an open project defense and complete a written report of their work before a letter grade is awarded.
CSEC-699
0 Credits
Students perform paid professional work related to the field of computing security. Students work full-time during the term for which they are registered. Students must complete a student co-op work report for each term for which they are registered; students are also evaluated each term by their employer. A satisfactory grade is given for co-op when both the student’s work report and the employer evaluation have been completed. Co-op is an optional part of the MS in computing security degree.
CSEC-604
3 Credits
In this course, students will learn in depth knowledge of cryptography and authentication. Students will explore various cryptography algorithms, authentication protocols, and their design and implementation. Students will work on a project to implement a cryptographic algorithm and/or an authentication protocol. The applications of cryptography and authentications in the areas of computer networks and systems and information assurance will also be investigated.
CSEC-909
0 Credits
This course is part of a capstone experience for graduate students who are beginning the capstone experience. Students will submit an accepted proposal as a prerequisite for the formal thesis.
CSEC-790
1 - 6 Credits
This course is a capstone course in the MS in computing security program. It offers students the opportunity to investigate a selected topic and make an original contribution which extends knowledge within the computing security domain. As part of their original work students will write and submit for publication an article to a peer reviewed journal or conference. Students must submit an acceptable proposal to a thesis committee (chair, reader, and observer) before they may be registered by the department for the MS Thesis. Students must defend their work in an open thesis defense and complete a written report of their work before a pass/fail grade is awarded.
CSEC-793
1 - 3 Credits
Students will apply their knowledge learned through the program to solve real world problems various areas of computing security. Large size projects will be defined for students to work on throughout the semester. At the end of semester students will present their results and demonstrate their knowledge and skills in problem solving and critical thinking in a setting open to the public.
CSEC-799
1 - 3 Credits
A student works with a faculty member to devise a plan of study on a topic in various areas of computing security. Deliverables, evaluation methods, and number of credits need to be specified in a written proposal. A final report and presentation in the form of a poster session is expected and graded at the end of the term.

Select Scholarship

Published Conference Proceedings
Schneider, J., et al. "Building Robust Risk Management as a Method of Situational Awareness at the Local Level." Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST),Woburn, MA, USA, Oct. 2018. Ed. IEEE. Woburn, MA: n.p., 2018. Web.
Pan, Y., M. Yacci, and S. Mishra. "Assessing the Modular-based Digital Forensics Game for Entry Level Students." Proceedings of the 2018 ASEE Annual Conference and Exposition. Ed. ASEE. Salt Lake Cuty, UT: n.p., 2018. Web.
Alnemari, A., et al. "Protecting Critical Infrastructure Data Through Enhanced Access Control, Blockchain, and Differential Privacy." Proceedings of the 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018. Ed. IFIP. Arlington, VA: n.p., 2018. Web.
Mishra, Sumita, Rajendra K. Raj, Paul Tymann, Jamie Fagan, and Sage Miller. "CyberCSP: Integrating Cybersecurity into the Computer Science Principles Course." Proceedings of the IEEE Frontiers in Education Conference. Ed. IEEE. Indianapolis, IN: IEEE, 2017. Print.
Afrin, Sabrina and Sumita Mishra. "On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid (Best Paper Award)." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEE, 2017. Web.
Schneider, Jennifer, Carol Romanowski, Sumita Mishra, Rajendra K. Raj, M. McGuiness, and B. Swartz. "Building forward: Strategic Community Resilience." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE, 2017. Web.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Course Modules for Entry Level Students." Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education (SIGCSE). Ed. ACM. New York, NY: ACM, 2017. Print.
Pan, Yin, Sumita Mishra, and David Schwartz. "Gamifying Cybersecurity Course Content for Entry Level Students." Proceedings of the 2017 ASEE Annual Conference & Exposition. Ed. ASEE. Columbus, OH: ASEE, 2017. Web.
Lipton, Ben and Sumita Mishra. "Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks." Proceedings of the 4th IEEE International Conference on Smart Energy Grid Engineering. Ed. IEEE. Oshawa, Canada: n.p., 2016. Print.
Afrin, Sabrina and Sumita Mishra. "An Anonymized Authentication Framework for Smart Metering Data Privacy." Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Minneapolis, MN: n.p., 2016. Print.
Schneider, Jennifer, Carol Romanowski, Rajendra Raj, Sumita Mishra, Jonathan Aleckna, and Kaiyue Wang. "Mapping a Community Resilience Management System: Building Operational Knowledge." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print.
Romanowski, Carol, Jennifer Schneider, Sumita Mishra, Rajendra Raj, Rossi Rosario, Kent Stein and Bhargav Solanki. "Response and Recovery: A Quantitative Approach to Emergency Management." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print.
Romanowski, Carol, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino,. "A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions." Proceedings of the Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016. Ed. Mason Rice, Sujeet Shenoi. Arlington, VA: Springer International Publishing, 2016. Print.
Alshehri, Suhair, Sumita Mishra, Rajendra K. Raj,. "Using Access Control to Mitigate Insider Threats to Healthcare Systems." Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI). Ed. Wai-Tat Fu, Larry Hodges, Kai Zheng, Gregor Stiglic, Ann Blandford. Chicago, IL: IEEE, 2016. Print.
Mishra, Sumita, Trudy Howles, Rajendra K. Raj, Carol J. Romanowski, Jennifer Schneider, Alicia McNett, Daryl J. Dates,. "A Modular Approach to Teaching Critical Infrastructure Protection Concepts to Engineering, Technology and Computing Students." Proceedings of the 2016 IEEE Frontiers in Education Conference (FIE). Ed. Steve Frezza, Dipo Onipede. Erie, PA: IEEE, 2016. Print.
Romanowski, Carol, et al. "Regional Response to Large Scale Emergency Events: Building on Historical Data." Proceedings of the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. Sujeet Shenoi, Mason Rice. Arlington, VA: n.p., 2015. Print.
Mishra, Sumita, et al. "On Building Cybersecurity Expertise in Critical Infrastructure Protection." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web.
Schneider, Jennifer, et al. "Measurement of Locality Specific Resilience." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web.
Pan, Yin, Schwartz, David, and Mishra, Sumita. "Gamified Digital Forensics Course Modules for Undergraduates." Proceedings of the 5th IEEE Integrated STEM Conference (2015). Ed. IEEE. Princeton, NJ: n.p., 2015. Print.
Huba, W., et al. "Towards A Web Tracking Profiling Algorithm." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print.
Romanowski, C., et al. "Information Management and Decision Support in Critical Infrastructure Emergencies at the Local Level." Proceedings of the IEEE Conference on Technologies for Homeland Security (HST '13). Ed. Israel Soibelman. Boston, MA: IEEE, 2013. Print.
Pan, Y. and S. Mishra. "Advanced Forensics Labs to Meet Computer Forensics Challenges Due to Technological Advancements." Proceedings of the 17th Colloquium for Information Systems Security Education (CISSE 2013). Ed. CISSE. Mobile, AL: CISSE, 2013. Print.
Mishra, S., et al. "A Curricular Framework for Critical Infrastructure Protection Education for Engineering, Technology and Computing Majors." Proceedings of the IEEE Frontiers in Education Conference (FIE 13). Ed. Randa Shehab, Jim Sluss and Deborah Trytten. Oklahoma City, OK: IEEE, 2013. Print.
Pan, Yin, Sumita Mishra, Bo Yuan, Bill Stackpole, and David Schwartz. "Game-based Forensics Course For First Year Students." Proceedings of the 13th Annual ACM Special Interest Group for Information Technology Education (SIGITE 2012). Ed. ACM. Calgary, Canada: ACM, 2012. Print.
Tuncer, Hasan, et al. "A Novel User-centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility Protocols." Proceedings of the IEEE Global Communications Conference (GLOBECOM 2012), Anaheim, CA. Ed. Z. Zhang. Anaheim, CA: IEEE, 2012. Print.
Winemiller, Nathan, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the The 2012 International Conference on Security and Management (SAM\'12). Ed. G. Markowsky. Monte Carlo, NV: SAM, 2012. Print.
Raj, Rajendra, Sumita Mishra, Carol Romanowski, and Trudy Howles. "CyberSecurity as General Education." Proceedings of the 15th Colloquium for Information Systems Security Education, June 13-15, 2011. Ed. CISSE. Fairborn, OH: 10 -15, Print.
Polatcan, Onur, Sumita Mishra, and Yin Pan. "E-mail Behavior Profiling based on Attachment Type and Language." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. Sanjay Goel. Albany, NY: 6-10, Print.
Pearson, David, Sumita Mishra, and Yin Pan. "Dynamic Threat-resistant Node Identification in Sensor Networks." Proceedings of the International Conference on Security and Management in 2011 World Congress in Computer Science, Computer Engineering and Applied Computing (WORLDCOMP). Ed. SAM 2011. Las Vegas, NV: UCMSS, 2011. Print.
Howles, Trudy, Carol Romanowski, Sumita Mishra, and Rajendra Raj. "A Holistic, Modular Approach to Infuse CyberSecurity into Undergraduate Computing Degree Programs." Proceedings of the Annual Symposium on Information Assurance (ASIA), June 7-8 2011. Ed. S. Goel. Albany, NY: 67-70, Print.
Book Chapter
Alnemari, A., et al. "Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy." Critical Infrastructure Protection XII. IFIP Advances in Information and Communication Technology, vol 542. Ed. Staggs J., Shenoi S.. Cham, Switzerland: Springer, 2018. 113-125. Web.
Oh, T., S. Mishra, and C. Hochgraf. "Smart Grid Security in the Last Mile." Security and Privacy in Smart Grids. Ed. Yang Xiao. Boca Raton, FL: CRC Press, 2013. 271-290. Print.
Mishra, Sumita. "Wireless Sensor Networks: Emerging Applications and Security Solutions." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 217-236. Print.
Pan, Yin, Bo Yuan, and Sumita Mishra. "Network Security Auditing." Network Security, Administration and Management: Advancing Technologies and Practices. Ed. D. Kar & M. Syed. Hershey, PA: IGI Global, 2011. 131-157. Print.
Peer Reviewed/Juried Poster Presentation
Alnemari, A., et al. "Achieving Resiliency while Preserving Privacy in the Healthcare Sector." Proceedings of the 2018 International Symposium for Sustainable Systems and Technology (ISSST), June 25-28, 2018, Buffalo, New York. Ed. ISSST. Buffalo, NY: n.p..
Raj, Rajendra K., Sumita Mishra, Carol Romanowski, Jennifer Schneider, and Suhair Alshehri. "Modeling Threats: Insider Attacks on Critical Infrastructure Assets." Proceedings of the IEEE International Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE.
Journal Paper
Mir, Darakhshan, et al. "How Do Faculty Partner While Teaching Interdisciplinary CS+X Courses: Models and Experiences." J. Comput. Sci. Coll. 32. 6 (2017): 24-33. Print.
Romanowski, Carol, et al. "Regional Response to Large-scale Emergency Events: Building on Historical Data." International Journal of Critical Infrastructure Protection 11. (2015): 12-21. Print.
Tuncer, Hasan, Sumita Mishra, and Nirmala Shenoy. "A Survey of Identity and Handoff Management Approaches for the Future Internet." Computer Communications - Elsevier 36. 1 (2012): 63-79. Print.
Invited Article/Publication
Association, Computing Research. "Innovative Approaches to Computing Education." Computing Education Final Report. (2015). Web.
Published Article
Golen, Erik F., Sumita Mishra, and Nirmala Shenoy. “An Underwater Sensor Allocation Scheme for a Range Dependent Environment.” Computer Networks, 54.3 (2010): 404-415. Print. † «
GoleGolen, Erik F., Sumita Mishra, and Nirmala Shenoy. “On the Effects of Deployment Imprecision on Underwater Sensor Connectivity.” Proceedings of the Fifth ACM International Workshop on UnderWater Networks, 2010. n.p. Print. † *
Formal Presentation
Pearson, David, Sumita Mishra, and Yin Pan. “Security Attacks and Defenses in Sensor Networks”, The 2010 International Conference on Security and Management (SAM’10), Las Vegas, NV. 12-15 July 2010. Presentation. †