Faculty Scholarship 2015

Department of Cybersecurity

To view listing from a different department, select department name from the right.

Daryl Johnson

Associate Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2015 Submissions

Published Conference Proceedings

Alsaffar, Hassan and Daryl G Johnson. "Covert Channel Using the IP Timestamp Option of an IPv4 Packet." Proceedings of the International Conference on Electrical and Bio-medical Engineering, Clean Energy and Green Computing (EBECEGC 2015). Ed. Mohammad V. Malakooti. Dubai, UAE: n.p., 2015. Print. *

Ackerman, Geoffrey, Johnson, Daryl, and Stackpole, Bill. "Covert Channel Using ICMPv6 and IPv6 Addressing." Proceedings of the 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Merrill, Justin and Johnson, Daryl. "Covert Channels in SSL Session Negotiation Headers." Proceedings of the 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Harmat, Bryan, et al. "The Security Implications of IMSI Catchers." Proceedings of the 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Harmat, Bryan, Stroud, Jared, and Johnson, Daryl. "A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan." Proceedings of the 10th ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE. Ed. Sanjay Goel. Albany, NY: n.p., 2015. Print. *

Priest, Joseph and Johnson, Daryl. "Covert Channel over Apple iBeacon." Proceedings of the 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Tentilucci, Matthew, et al. "Crowdsourcing Computer Security Attack Trees." Proceedings of the 10th ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE. Ed. Sanjay Goel. Albany, NY: n.p., 2015. Print. *

Heard, Timothy, Johnson, Daryl, and Stackpole, Bill. "Exploring a High-Capacity Covert Channel on the Android Operating System." Proceedings of the 8 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. Ed. Anatoly Sachenko. Warsaw, Poland: n.p., 2015. Print. *

Markowsky, G., et al. "The Benefits of Hosting the NECCDC at Your Institution." Proceedings of the 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

View All Submissions

Sumita Mishra

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2015 Submissions

Journal Paper

Romanowski, Carol, et al. "Regional Response to Large-scale Emergency Events: Building on Historical Data." International Journal of Critical Infrastructure Protection 11. (2015): 12-21. Print. *

Published Conference Proceedings

Romanowski, Carol, et al. "Regional Response to Large Scale Emergency Events: Building on Historical Data." Proceedings of the Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Ed. Sujeet Shenoi, Mason Rice. Arlington, VA: n.p., 2015. Print. *

Mishra, Sumita, et al. "On Building Cybersecurity Expertise in Critical Infrastructure Protection." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web. *

Schneider, Jennifer, et al. "Measurement of Locality Specific Resilience." Proceedings of the 2015 IEEE International Symposium on Technologies for Homeland Security (HST). Ed. Gerald Larocque, Mike French. Boston, MA: IEEE, 2015. Web. *

Pan, Yin, Schwartz, David, and Mishra, Sumita. "Gamified Digital Forensics Course Modules for Undergraduates." Proceedings of the 5th IEEE Integrated STEM Conference (2015). Ed. IEEE. Princeton, NJ: n.p., 2015. Print. *

Invited Article/Publication

Association, Computing Research. "Innovative Approaches to Computing Education." Computing Education Final Report. (2015). Web.

View All Submissions

Yin Pan

Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences

2015 Submissions

Published Conference Proceedings

Pan, Yin, David Schwartz, and Sumita Mishra. "Gamified Digital Forensics Course Modules for Undergraduates." Proceedings of the IEEE Integrated STEM Education Conference. Ed. ISEC. Princeton, NJ: n.p., 2015. Print. «

Shows/Exhibits/Installations

Pan, Yin. Associate Professor. By Ryan McGlinn. 22 Oct. 2015. 2015 ATE Principal Investigators Conference, Washington DC. Exhibit. «

Pan, Yin. Gamified Digital Forensics Course Modules for Entry-Level Students Demonstration. By Sumita Mishra and David Schwartz. May 2015. the 24th Annual Conference on Instruction & Technology (CIT 2015), SUNY Geneseo. Performance. «

View All Submissions