Faculty Scholarship 2012
Department of Cybersecurity
To view listing from a different department, select department name from the right.Daryl Johnson
Associate Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2012 Submissions
Published Conference Proceedings
Johnson, Daryl, Dan Bogaard, and Robert Parody. "Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. *
Johnson, Daryl, et al. "Forensic Acquisition and Analysis of VMware Virtual Hard Disks." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. *
Johnson, Daryl, et al. "Employing Entropy in the Detection and Monitoring of Network Covert Channels." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "A Covert Channel Over Transport Layer Source Ports." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "A Physical Channel in a Digital World." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "A Covert Channel in TTL Field of DNS Packets." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "Covert Channel in the BitTorrent Tracker Protocol." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "Audio Steganography Using High Frequency Noise Introduction." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "UPnP Port Manipulation as a Covert Channel." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "Webpage Source Based Covert Channel." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, Brandon Mauer, and Bill Stackpole. "Developing Small Team-based Cyber Security Exercises." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "A Behavior Based Covert Channel within Anti-Virus Updates." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Johnson, Daryl, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the SAM\'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: SAM, 2012. Print. ˜
Sumita Mishra
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2012 Submissions
Journal Paper
Tuncer, Hasan, Sumita Mishra, and Nirmala Shenoy. "A Survey of Identity and Handoff Management Approaches for the Future Internet." Computer Communications - Elsevier 36. 1 (2012): 63-79. Print. *
Published Conference Proceedings
Pan, Yin, Sumita Mishra, Bo Yuan, Bill Stackpole, and David Schwartz. "Game-based Forensics Course For First Year Students." Proceedings of the 13th Annual ACM Special Interest Group for Information Technology Education (SIGITE 2012). Ed. ACM. Calgary, Canada: ACM, 2012. Print. *
Tuncer, Hasan, et al. "A Novel User-centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility Protocols." Proceedings of the IEEE Global Communications Conference (GLOBECOM 2012), Anaheim, CA. Ed. Z. Zhang. Anaheim, CA: IEEE, 2012. Print. *
Winemiller, Nathan, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the 2012 International Conference on Security and Management (SAM\'12). Ed. G. Markowsky. Monte Carlo, NV: SAM, 2012. Print. *
Rick Mislan
Senior Lecturer
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2012 Submissions
Published Conference Proceedings
Katz, Eric, Richard P. Mislan, and Bryan Lee. "Over-the-Air Penetration Testing." Proceedings of the CERIAS Annual Information Security Symposium 2012. West Lafayette, IN: n.p., 2012. Print. *
Yin Pan
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2012 Submissions
Published Conference Proceedings
Pan, Yin, et al. "Game-based Forensics Course For First Year Students." Proceedings of the ACM SIGITE 2012, October. Ed. ACM SIGITE. Calgary, Alberta: ACM, 2012. Print. «
Sanders, Aaron, et al. "Correlating Risk Findings to Quantify Risk." Proceedings of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust, September. Ed. Conforence Proceeding. Amsterdam, Netherlands: IEEE, 2012. Print. «
Hirwani, Manish, et al. "Forensics Acquisition and Analysis of VMware Virtual Hard Disks." Proceedings of the 2012 World Congress in Computer Science, Computer Engineering, and Applied Computing. Albany, NY: WorldComp, 2012. Print. *
Bill Stackpole
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2012 Submissions
Journal Paper
Alghamdi, Khaled, Tae Oh, and Bill Stackpole. "Bluetooth Security Lock for Android Smart Phone Platform." International Journal of Scientific and Engineering Research 3. 7 (2012): 2. Web. £
Published Conference Proceedings
Mauer, Brandon, William Stackpole, and Daryl Johnson. "Developing Small Team-based Cyber Security Exercises." Proceedings of the 2012 International Conference on Security and Management. Las Vegas, NV: SAM, 2012. Web. *
Hirwani, M, et al. "Forensic Acquisition and Analysis of VMware Virtual Hard Disks." Proceedings of the 2012 International Conference on Security and Management. Las Vegas, NV: SAM, 2012. Web. *
Pan, Yin, et al. "Game-based Forensics Course For First Year Students." Proceedings of the SIG ITE 2012. Ed. ACM. Calgary, Alberta, Canada: ACM 978-1-4503-1464-0/12/10, 2012. Web. *
Gonzalez, Carlos, Bill Stackpole, and Tae Oh. "Anti-Spyware Analysis for iOS: An Evaluation of Current Security Products Available for iOS." Proceedings of the Annual Symposium on Information Assurance & Secure Knowledge Management. Albany, NY: ASIA, 2012. Print. *
Cummins, Emily, Bill Stackpole, and Tae Oh. "Blackberry Structure and Anti-Malware Analysis." Proceedings of the Annual Symposium on Information Assurance & Secure Knowledge Management. Albany, NY: SAM, 2012. Print. *
Ramachandran, Rahul, Tae Oh, and William Stackple. "Android Anti-Virus Analysis." Proceedings of the Annual Symposium on Information Assurance & Secure Knowledge Management. Albany, NY: ASIA, 2012. Print. *
Kaiqi Xiong
Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2012 Submissions
Journal Paper
Xiong, K., et al. "Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks." ACM Transactions on Sensor Networks (TOSN) 8. 3 (2012): 1-34. Print. £
Chen, Xiao, et al. "Improving the Localization Accuracy of Targets by Using their Spatial-temporal Relationships in Wireless Sensor Networks." J. Parallel Distrib. Comput. 72. 8 (2012): 1008-1018. Print. £
Published Conference Proceedings
Shetty, Sachin, Nicholas Luna, and Kaiqi Xiong. "Assessing Network Path Vulnerabilities for Secure Cloud Computing." Proceedings of the Proceedings of IEEE International Conference on Communications. Ed. Volker Distelrath. Ottawa, ON, Canada: IEEE, 2012. Print. £
Xiong, Kaiqi and David J. Thuente. "Locating Jamming Attackers in Malicious Wireless Sensor Networks." Proceedings of the 31st IEEE International Performance Computing and Communications Conference. Ed. Song. Austin, TX: IEEE, 2012. Print. £
Xiong, Kaiqi. "Energy-efficient Resource Management for QoS-guaranteed Computing Clusters." Proceedings of the MASCOTS. Ed. Kalyan Perumalla, et al. Washington, DC: IEEE, 2012. Print. £
Xiong, Kaiqi. "The Performance of Public Key-Based Authentication Protocols." Proceedings of the Network and System Security - 6th International Conference. Ed. Li Xu, Elisa Bertino, Yi Mu. Wuyishan, China: Springer, 2012. Print. £
Bo Yuan
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2012 Submissions
Published Conference Proceedings
Schellenberg, Thomas, Bo Yuan, and Richard Zanibbi. "Layout-based Substitution Tree Indexing and Retrieval for Mathematical Expressions." Proceedings of the Document Recognition and Retrieval XIX. Ed. Christian Viard-Gaudin and Richard Zanibbi. Burlingame, California: Proc. SPIE 8297, 2012. Print. *