Faculty Scholarship 2014
Department of Cybersecurity
To view listing from a different department, select department name from the right.Daryl Johnson
Associate Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2014 Submissions
Journal Paper
Sharma, Kuhu, et al. "Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks." The International Journal on Advances in Networks and Services 7. 3&4 (2014): 228-239. Web. ∆
Published Conference Proceedings
Assayari, Hashem and Daryl G Johnson. "A Channel for Exchanging Information Covertly using Game Save File in Prison Architect." Proceedings of the 9th Annual Symposium on Information Assurance (ASIA 14). Ed. Sanjay Goel. Albany, NY: n.p., 2014. Print. *
Sabernick, Allen and Daryl G Johnson. "Google Maps KML Covert Channel." Proceedings of the 9th Annual Symposium on Information Assurance (ASIA 14). Ed. Sanja Goel. Albany, NY: n.p., 2014. Print. *
Leonardo, Carlos and Daryl G Johnson. "MODBUS Covert Channel." Proceedings of the 2014 International Conference on Security and Management (SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *
Sharma, Kuhu, et al. "Meshed Tree Protocol for Faster Convergence in Switched Networks." Proceedings of the Tenth International Conference on Networking and Services (The Tenth International Conference on Networking and Services (The Tenth International Conference on Networking and Services. Ed. Sasha Pan. Shanghai, China: n.p., 2014. Print. *
Farmer, Douglas and Daryl G Johnson. "Audio Steganography Using Stereo Wav Channels." Proceedings of the 2014 International Conference on Security and Management(SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *
Rowe, Brian and Daryl G Johnson. "A Behavior-Based Covert Channel in a MMQ." Proceedings of the 2014 International Conference on Security and Management (SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *
Dearstyne, Steven and Daryl G Johnson. "Leveraging Public Posts and Comments as Covert Channels." Proceedings of the Systems, Signals and Image Processing (IWSSIP), 2014 International Conference. Ed. Mislav Grgic. Dubrovnik, Croatia: n.p., 2014. Print. *
Madiraju, Tarun, et al. "Passwords in Public: Dictionary Attacks, Password Selection and Password Meters." Proceedings of the Proceedings of the International Joint Conference on Computer, Information, and Systems Sciences and Engineering (CISSE 14). Ed. Srinivas Ramaswamy. San Diego, CA: n.p., 2014. Print. *
Yin Pan
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2014 Submissions
Published Conference Proceedings
Madiraju, Tarun, et al. "Passwords in Public: Dictionary Attacks, Password Selection and Password Meters." Proceedings of the 18th Colloquium for Information Systems Security Education. Ed. CISSE. San Diego, CA: n.p., 2014. Web. *
Bill Stackpole
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2014 Submissions
Published Conference Proceedings
Kim, Youngho, Bill Stackpole, and Tae Oh. "Analysis of Mobile Malware Based on User Awareness." Proceedings of the 3rd Annual Conference on Research in Information Technology, Atlanta, GA. Ed. Rob Friedman. Atlanta, GA: n.p., 2014. Web. *
Sharma, Kuhu, et al. "Meshed Tree Protocol for Faster Convergence in Switched Networks." Proceedings of the ICNS 2014: The Tenth International Conference on Networking and Services. Chamonix, France: n.p., 2014. Web. *
Kaiqi Xiong
Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2014 Submissions
Full Length Book
Xiong, Kaiqi. Resource Optimization and Security for Cloud Services. 1st ed. New York, NY: Wiley-ISTE, 192 pages., 2014. Print. £
Journal Paper
Xiong, K. and H. Perros. "Resilient and Performance-guaranteed Composite Services in Cloud Computing." International Journal of Cloud Computing. (2014): 315-325. Print. £
Published Conference Proceedings
Shen, X. Chen, Z. Jiang, K. Xiong, and J. "Practical Routing Protocol for Impromptu Mobile Social Networks." Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing (EUC). Ed. Eli Bozorgzadeh, Eduardo de la Torre, and Pao Ann-Hsiung. Milano, Italy: IEEE, 2014. Print. £
Xiong, Kaiqi. "Service-level Agreement (SLA)-based Resource Management for Improving Cloud Services." Proceedings of the 16th IEEE International Conference on High Performance Computing and Communications The Workshop on Cloud Technologies. Ed. Julien Bourgeois, et al. Pairs, France: n.p., Print. £
Akella, Anand V. and Kaiqi Xiong. "Quality of Service (QoS)-Guaranteed Network Resource Allocation via Software Defined Networking (SDN)." Proceedings of the IEEE 12th International Conference on Dependable, Autonomic and Secure Computing. Ed. Tharam Dillon, et al. New York, NY: n.p., Print. £