Faculty Scholarship 2016
Department of Cybersecurity
To view listing from a different department, select department name from the right.Daryl Johnson
Associate Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2016 Submissions
Journal Paper
Heard, Timothy and Daryl G Johnson. "An Extended Discussion on a High-Capacity Covert Channel for the Android Operating System." International Journal of Computing 15. 3 (2016): 191-199. Web. ∆
Published Conference Proceedings
Johnson, Matthew R, Peter H Lutz, and Daryl G Johnson. "Covert Channel using Man-In-The-Middle over HTTPS." Proceedings of the 2016 International Conference on Computational Science and Computational Intelligence(CSCI’16)(2016, December). Las Vegaas, NV: CPS, 2016. Print. *
Heilman, Susan, Jonathan Williams, and Daryl G Johnson. "Covert Channel in HTTP User-Agents." Proceedings of the 11th Annual Symposium on Information Assurance (ASIA’16) (2016, June)Albany, NY USA. Ed. Sanjay Goel. Albany, NY: ASIA, 2016. Web. £
Waggoner, Jonathan, William Stackpole, and Daryl G Johnson. "A Hands-On Approach to Computing Security Education: Metasploit Module Development." Proceedings of the 20th Colloquium for Information Systems Security Education (CISSE 2016) (Philadelphia, PA, USA 2016). Ed. ?. Philadelphia, PA: CISSE, 2016. Web. «
Daneault, Gregory and Daryl G Johnson. "Client-Initiated HTTP Covert Channels Using Relays." Proceedings of the 4th International Symposium on Digital Forensic and Security (ISDFS)’2016)(p.32-37) (Little Rock, Arkansas-April 2016)Best Student Paper Award. Ed. Piroska Haller. Little Rock, AK: IEEE, 2016. Print. «
Bogaard, Dan, et al. "Producing and Evaluating Crowdsourced Computer Security Attack Trees." Proceedings of the 2016 IEEE International Symposium on Technologies for Homeland Security(HST)’2016) (Waltham, Ma-May 2016). Ed. Claire Applegarth & Mark Peters. Waltham, MA: IEEE, 2016. Print. *
Sumita Mishra
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2016 Submissions
Published Conference Proceedings
Lipton, Ben and Sumita Mishra. "Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks." Proceedings of the 4th IEEE International Conference on Smart Energy Grid Engineering. Ed. IEEE. Oshawa, Canada: n.p., 2016. Print. *
Afrin, Sabrina and Sumita Mishra. "An Anonymized Authentication Framework for Smart Metering Data Privacy." Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). Ed. IEEE. Minneapolis, MN: n.p., 2016. Print. *
Schneider, Jennifer, Carol Romanowski, Rajendra Raj, Sumita Mishra, Jonathan Aleckna, and Kaiyue Wang. "Mapping a Community Resilience Management System: Building Operational Knowledge." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *
Romanowski, Carol, Jennifer Schneider, Sumita Mishra, Rajendra Raj, Rossi Rosario, Kent Stein and Bhargav Solanki. "Response and Recovery: A Quantitative Approach to Emergency Management." Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST). Ed. Lance Fiondella, Kenneth Crowther. Boston, MA: IEEE, 2016. Print. *
Romanowski, Carol, Rajendra Raj, Jennifer Schneider, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino,. "A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions." Proceedings of the Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016. Ed. Mason Rice, Sujeet Shenoi. Arlington, VA: Springer International Publishing, 2016. Print. *
Alshehri, Suhair, Sumita Mishra, Rajendra K. Raj,. "Using Access Control to Mitigate Insider Threats to Healthcare Systems." Proceedings of the 2016 IEEE International Conference on Healthcare Informatics (ICHI). Ed. Wai-Tat Fu, Larry Hodges, Kai Zheng, Gregor Stiglic, Ann Blandford. Chicago, IL: IEEE, 2016. Print. *
Mishra, Sumita, Trudy Howles, Rajendra K. Raj, Carol J. Romanowski, Jennifer Schneider, Alicia McNett, Daryl J. Dates,. "A Modular Approach to Teaching Critical Infrastructure Protection Concepts to Engineering, Technology and Computing Students." Proceedings of the 2016 IEEE Frontiers in Education Conference (FIE). Ed. Steve Frezza, Dipo Onipede. Erie, PA: IEEE, 2016. Print. *
Yin Pan
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2016 Submissions
Published Conference Proceedings
Mosli, Rayan, et al. "Automated malware detection using artifacts in forensic memory images." Proceedings of the IEEE International Conference on Technologies for Homeland Security. Ed. IEEE Conference. Waltham, Massachusetts: n.p., 2016. Print. «
Matthew Wright
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2016 Submissions
Journal Paper
Al-Ameen, Mahdi Nasrullah and Matthew Wright. "A Comprehensive Study of the GeoPass User Authentication Scheme." Interacting with Computers. (2016): 1-1. Web. *
Al-Ameen, Mahdi Nasrullah and Matthew Wright. "iPersea: Towards Improving the Sybil-resilience of Social DHT." Journal of Network and Computer Applications 71. (2016): 1-10. Web. *
Al-Ameen, Mahdi Nasrullah, S M Taiabul Haque, and Matthew Wright. "Leveraging Autobiographical Memory for Two-factor Online Authentication." Information and Computer Security 24. 4 (2016): 386-399. Print. *
Barton, Armon and Matthew Wright. "DeNASA: Destination-Naive AS-Awareness in Anonymous Communications." Proceedings on Privacy Enhancing Technologies 2016. 4 (2016): 356—372. Web. «
Published Conference Proceedings
Juarez, Marc, et al. "WTF-PAD: Toward an Efficient Website Fingerprinting Defense." Proceedings of the European Symposium on Research in Computer Security (ESORICS). Ed. Ioannis Askoxylakis, et al. Heraklion, Greece: Springer, 2016. Print. *
Bo Yuan
Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2016 Submissions
Published Conference Proceedings
Mosli, Rayan, et al. "Automated Malware Detection Using Artifacts in Forensic Memory Images." Proceedings of the IEEE Symposium on Technologies for Homeland Security (HST). Ed. IEEE. Waltham, MA: IEEE, 2016. Print. *
Ziming Zhao
Assistant Professor
Department of Cybersecurity
Golisano College of Computing and Information Sciences
2016 Submissions
Journal Paper
Jing, Yiming, et al. "TRIPLEMON: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android." Journal of Computer Security (JCS). (2016): 0-0. Print. *