Publications on Information Assurance / Cybersecurity Ph.D. Dissertations - Master’s Theses - Book / Book Chapters - Encyclopedia Articles - Journal Articles - Conference Papers Ph.D. Dissertations Elbasher ElMahdi, Ph.D. Dissertation, May 2021,“Secure data integrity in wireless ad hoc networks”. Sadman Sakib, Ph.D. Dissertation, Spring 2021, "Hardware Security Primitives using NAND Flash Memory" Prawar Poudel, Ph.D. dissertation, Spring 2021, "Exploiting Physical Properties of Flash Memories for Enhancing Security and Energy-Efficiency of Embedded Systems". Das, Rishabh, Ph.D.Dissertation, December 2020, "An Embedded Defense-in-Depth Module for Detecting Cyber-attacks on Interdependent SCADA Controllers". Werth, Aaron, Ph.D.Dissertation, December 2020, "Evaluation of an Embedded Process Prediction Intrusion Prevention System for Industrial Control Systems". SueAnne Griffith, Ph.D. Dissertation, Spring 2020, "A Virtual Cyber-Physical System Testbed for Use in Network Intrusion Detection and Prevention System Verification." K. Sharshembiev, “Protocol Misbehavior Mitigation Framework for Broadcast Communications in Vehicular Ad Hoc Networks,” November, 2019 Murbach, Kyle, "Self-Efficacy in Information Security: A Mixed Methods Study of Deaf End-Users" (2019). Masters Theses & Doctoral Dissertations, https://scholar.dsu.edu/theses/335. Tymaine S. Whitaker, Ph.D. Dissertation, Spring 2019, Generating Cyberattack Component Models from an Attack Pattern Database, Advisor M. Petty. John A. Bland, Ph.D. Dissertation, Fall 2018, Machine Learning of Cyberattack and Defense Strategies, Advisor M. Petty. Ezhil Kalaimannan, Ph.D. Dissertation, Summer 2014, Computational Optimization Models for Investigating Digital Crime and Intrusion Detection Alarms. Mallikarjun Avula, Ph.D. Dissertation, Spring 2014, Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks. Swapna Kolimi, Ph.D. Dissertation, Spring 2013, Computer Privacy and Human Factors – Attitudes, Psychological Attacks, and Mitigations. Master’s Theses Igor Semenov, An Implementation of ChaCha20 Stream Cypher in All-Programmable SoCs, Master Thesis, The University of Alabama in Huntsville, July 2020. Nicholas M. Christensen, M.S. Thesis, Summer 2018, Validating Petri Net Models of Cyberattacks, Advisor M. Petty. Prawar Poudel, Using NOR Flash Memory in Microcontrollers for Generating True Random Numbers, Master Thesis, The University of Alabama in Huntsville, April 2018. Ryan A. Cowart, An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs on Embedded and Workstation Computer Platforms, Master Thesis, The University of Alabama in Huntsville, October 2017. Deb Silvia, MS Thesis, Spring 2014, Affecting User Attitudes: Mobile Devices and Bluetooth Security. Khalid Razak, MS Thesis, Fall 2013, Major Service Discovery Technology: a Hands-on Analysis. Ha Jiang, MS Thesis, Fall 2013, Service Discovery in the Post-PC Era. Hunter Stinson, MS Thesis, 2013, Optimal Performance Counter Events for Detecting Android Malware. Curt Lawson, MS Thesis, Fall 2012, Sentential Access Control. Lance Warden, MS Thesis, Fall 2012, Markovian Service Selection Models. Book / Book Chapters Debashri Roy, Tathagata Mukherjee, Eduardo Pasiliao \Exploiting Spatio-temporal Correlation in RF Data using Deep Learning" Book Chapter: Deep Learning Applications Volume 2, 2020, Publisher Springer J. A. Bland, C. D. Colvett, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs”, in K. R. Choo, T. H. Morris, and G. L. Peterson (Editors), National Cyber Summit (NCS) Research Track, Advances in Intelligent Systems and Computing, Vol. 1055, Springer, Cham Switzerland, 2020 pp. 232-247, doi:10.1007/978-3-030-31239-8_18. Patnayakuni, N., Patnayakuni, R., Gupta, J. N. D., & Chugh, R. (2016). Towards a Model of Social Media Impacts on Cybersecurity Knowledge Transfer: An Exploration. In Harnessing Social Media as a Knowledge Management Tool (pp. 249–272). Idea Group. M. Deylami, E. Jovanov, “Dynamic Coexistence of Wireless Body Area Networks,” in Telemedicine and Electronic Medicine,” Halit Eren and John G. Webster, Eds, CRC Press, ISBN: 978-1-4822-3658-3, pp. 261-274, 2015. Feng Zhu, et. al, “Service Discovery Architecture and Protocol Design for Pervasive Computing,” book chapter in “Advanced Design Approaches to Emerging Software Systems: Principles, Methodology and Tools”, 2011. Encyclopedia Articles Alim M.E., Smalligan J., Oliveira R.F.B., Griffith S.A., Morris T.H. (2021) "Cyber-Physical System". In: Jajodia S., Samarati P., Yung M. (eds) Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg Williams, T., El-Gayar, O., Morris, T. "Security Analytics," in Encyclopedia of Cryptography, Security and Privacy, Springer US, 2020. Hairston, J., Gaede, R., Morris, T. "Industrial Internet of Things," in Encyclopedia of Cryptography, Security and Privacy, Springer US, 2020. SueAnne Griffith, Thomas H. Morris, "Network Intrusion Detection System," Encyclopedia of Cryptography, Security, and Privacy, 2020. Journal Articles 2022 Jianqing Liu, Chi Zhang, Kaiping Xue, Yuguang Fang, “Privacy Preservation in Multi-Cloud Secure Data Fusion for Infectious-Disease Analysis,” IEEE Transactions on Mobile Computing, DOI: 10.1109/TMC.2022.3145745, Jan.2022. 2021 Abel Alex Boozer, Arun John, Tathagata Mukherjee "Internet of Things Software and Hardware Architectures and Their Impacts on Forensic Investigations: Current Approaches and Challenges" In Journal of Digital Forensics, Security and Law, September 2021 Sadman Sakib, Aleksandar Milenković, Biswajit Ray, “Flash-DNA: Identifying NAND Flash Memory Origins Using Intrinsic Array Properties,” IEEE Transactions on Electron Devices, Vol. 68, No: 8, August, 2021, pp. 1-7. doi: 10.1109/TED.2021.3087454. S. Bhatt, T. K. Pham, M. Gupta, J. Benson, J. Park and R. Sandhu, "Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future" in IEEE Access, vol. 9, pp. 107200-107223, 2021, https://doi.org/10.1109/ACCESS.2021.3101218., 2021 Jaehong Park, Ravi Sandhu, Maanak Gupta and Smriti Bhatt, "Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems" in IEEE Access, 2021. https://doi.org/10.1109/access.2021.3126201 Prawar Poudel, Biswajit Ray, Aleksandar Milenković, “Microcontroller Fingerprinting Using Partially Erased NOR Flash Memory Cells,” ACM Transactions on Embedded Computing Systems, Vol. 20, No: 3, Article 26, March 2021. doi: 10.1145/3448271 Jonathan Ebert, Ohad Newton, Jeffery O’Rear, Scott Riley, Jaehong Park (Corresponding Author), and Maanak Gupta. 2021. "Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks" Information 12, no. 10: 390. https://doi.org/10.3390/info12100390 Srivastava, Rohit, Ravi Tomar, Maanak Gupta, Anuj K. Yadav, and Jaehong Park. "Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis" Information 12, no. 8: 310. https://doi.org/10.3390/info12080310, 2021 S. Sakib, Md Raquibuzzaman, M. Wasiolek, K. Hattar, and B. Ray, “Total Ionizing Dose Effects on Physical Unclonable Function from NAND Flash Memory,” IEEE Transactions on Nuclear Science, 2021, vol. 68, no. 7, pp. 1445-1453, 2021. K. Sharshembiev, S.M. Yoo, and E. Elmahdi, “Protocol Misbehavior Detection Framework Using Machine Learning Classification in Vehicular Ad Hoc Networks,” Springer’s Wireless Networks, 27(3), 2103-2118, Feb. 2021 Muthukumaran Ramaburamanian, Chaity Banerjee, Debashri Roy, Eduardo Pasiliao Jr., Tathagata Mukherjee "Exploiting Spatio-Temporal Properties of I/Q Signal Data using 3D Convolution for RF Transmitter Identication" In IEEE Journal of Radio Frequency Identication, January 2021 2020 Hairston, Jesse R.; Williams, Tania; Smith, Derrick W. Ed.D., COMS; Sabados, William T. Ph.D.; and Forney, Steven (2020) "Teaching Cybersecurity to Students with Visual Impairments and Blindness," Journal of Science Education for Students with Disabilities: Vol. 23 : Iss. 1 .DOI: 10.14448/jsesd.12.0007 Available at: https://scholarworks.rit.edu/jsesd/vol23/iss1/7" Werth, A., Griffith, S., Hairston, J., and Morris, T., “Cybersecurity Threats and Experimental Testbed for a Generator System,” The Journal of Defense Modeling and Simulation, 2020 Patnayakuni, N. and R Patnayakuni, “Does Cybersecurity Education Focus on the Right Things? A Professions Based Approach to Cybersecurity Education and the NICE Framework,” Cybersecurity Skills Journal: Practice and Research, (November 2020), 82 -87. J. A. Bland, M. D. Petty, T. S. Whitaker, K. P. Maxwell, and W. A. Cantrell, “Machine Learning Cyberattack and Defense Strategies”, Computers & Security, Volume 92, May 2020, doi:10.1016/j.cose.2020.101738. E. Elmahdi, S.M. Yoo, and K. Sharshembiev, “Secured and Reliable Data Forwarding Using Homomorphic Cryptosystem against Blackhole Attacks in Mobile Ad Hoc Networks,” Elsevier’s Journal of Information Security and Applications, vol. 51 (2020), April 2020. D. J. Coe, J. H. Kulick, A. Milenkovic and L. Etzkorn, "Virtualized In Situ Software Update Verification: Verification of Over-the-Air Automotive Software Updates," IEEE Vehicular Technology Magazine, vol. 15, no. 1, pp. 84-90, March 2020. Debashri Roy, Tathagata Mukherjee, Mainak Chatterjee, Eduardo Pasiliao Jr. "Adaptive Streaming of HD and 360°Videos over Software Defined Radios" In Journal of Pervasive and Mobile Computing, Volume 67 2020 S. Sakib, A. Milenkovic, and B. Ray, “Flash Watermark: An Anti-Counterfeiting Technique for NAND Flash Memories,” IEEE Transaction on Electron Devices, vol. 67, no. 10, pp. 4172–4177, 2020. Sadman Sakib, Aleksandar Milenković, Md Tauhidur Rahman, Biswajit Ray, "An Aging-Resistant NAND Flash Memory Physical Unclonable Function," IEEE Transactions on Electron Devices, Vol. 67, Issue: 3, pp. 937-943, February 2020, doi: 10.1109/TED.2020.2968272 2019 Prawar Poudel, Biswajit Ray, Aleksandar Milenković, "Microcontroller TRNGs Using Perturbed States of NOR Flash Memory Cells," IEEE Transactions on Computers, Vol. 68, No. 2, Feb. 2019, pp. 307-313, doi: 10.1109/TC.2018.2866459. 2018 Alves, T., Das, R., Werth, A., Morris, T., "Virtualization of SCADA Testbeds for Cybersecurity Research: A Modular Approach", in Computers & Security, Volume 77, August 2018, Pages 531-546, https://doi.org/10.1016/j.cose.2018.05.002. Alves, T., Das, R., Morris, T., "Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controller", in IEEE Embedded Systems Letters, vol. 10, no. 3, pp. 99-102, Sept. 2018, doi: 10.1109/LES.2018.2823906. M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilities of Web Applications,” International Journal of Computer Networks & Communications (IJCNC), Accepted. Das, R. Morris, T., "Modeling a Midstream Oil Terminal for Cybersecurity Risk Evaluation," in Critical Instructure Protection XII, Sujeet Shenoi and Jason Staggs, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2018. Biswajit Ray, Aleksandar Milenković, "True Random Number Generation Using Read Noise of Flash Memory Cells," IEEE Transactions on Electron Devices, Vol. 65, Issue 3, March 2018, pp. 963-969, doi: 10.1109/TED.2018.2792436 V. Heydari and S.M. Yoo, “Timeout Period Analysis to Detect Misbehaving Nodes in Multihop Wireless Ad Hoc Networks,” Springer’s International Journal of Wireless Information Networks, vol. 25, no. 1, March 2018, pp. 15-29. 2017 V. Heydari, S. Kim, and S.M. Yoo, “Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, May 2017, pp. 1113-1124. Kalaimannan, E., & Gupta, J. N. D. (2017). The Security Development Lifecycle in the Context of Accreditation Policies and Standards. IEEE Security and Privacy, 15(1), 52–57 2016 V. Heydari and S.M. Yoo, “E2EACK: An end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs,” Springer’s Wireless Networks, vol. 22, issue 7, Oct. 2016, pp. 2259-2273. J. Gupta, E. Kalaimannan, and S.M. Yoo, “Maximizing investigation effectiveness in digital forensic cases,” A Heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators,” Computers & Operations Research, vol. 69, May 2016, pp. 1-9. Conference Papers 2021 Alim, M. E.; Wright, S.; Morris, T. “A Laboratory-Scale Spillway SCADA System Testbed for Cybersecurity Research” in Annual Computer Security Applications Conference, ACSAC 2021. Alim, M. E.; Wright, S.; Morris, T. “A Laboratory-Scale Canal SCADA System Testbed for Cybersecurity Research” in Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, IEEE-TPS 2021, https://doi.org/10.1109/TPSISA52974.2021.00038. Alec Riden, Debashri Roy, Eduardo Pasiliao Jr., Tathagata Mukherjee \DeePOE: Deep Learning for Position and Orientation Estimation" In Proceedings of IEEE Asia Pacific Communications Conference 2021 (IEEE APCC 2021) Chaity Banerjee, Chad Lilian, Daniel Reasor, Eduardo Pasiliao, Tathagata Mukherjee \An Application of Generative Adversarial Networks for Robust Inference in Computational Fluid Dynamics" In Proceedings of International Conference on Information Systems & Data Mining 2021 (Published by ACM) Vaidyanath Areyur Shanthakumar, Clark Barnett, Keith Warnick, Putu Ayu Sudyanti, Vitalii Gerbuz, Tathagata Mukherjee "Item Based Recommendation Using Matrix-Factorization-Like Embeddings From Deep Networks" In Proceedings of ACM South East Conference 2021 (Best Research Paper Award) Williams T., El-Gayar O. (2021) Design of a Virtual Cybersecurity Escape Room. In: Choo KK.R., Morris T., Peterson G., Imsand E. (eds) National Cyber Summit (NCS) Research Track 2021. NCS 2021. Lecture Notes in Networks and Systems, vol 310. Springer, Cham. https://doi.org/10.1007/978-3-030-84614-5_6 2020 E. Elmahdi and S.M. Yoo, “Secure Data Integrity in VANETs based on CS-DC Scheme,” IEEE Latin-American Conference on Communications (LATINCOM2020), Nov. 2020. Chaity Banerjee, Tathagata Mukherjee, Eduardo Pasiliao "The Multiphase ReLU Activation Function" In Proceedings of ACM Southeast (ACMSE) Conference 2020 Nikita Susan Joseph, Chaity Banerjee Mukherjee, Eduardo Pasiliao Jr., Tathagata Mukherjee "A Robust Learning Framework For Aircraft Identification Using ADS-B I/Q Information" POSTER Von Braun Symposium 2020 Vaidyanath Areyur Shanthakumar, Chaity Banerjee, Eduardo Pasiliao Jr., Tathagata Mukherjee, "Uncooperative Direction Finding with Neural Networks using I/Q Information" In International Conference on Information Systems & Data Mining 2020 M. Hasan and B. Ray, “Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization” 29th USENIX Security Symposium, Boston, MA, Aug. 2020. Sudhir Aggarwal, James Parsons, Shiva Housmand, Tathagata Mukherjee "An Empirical Study on Eciency of a Dictionary Based Viterbi Algorithm for Word Segmentation" In Proceedings of IEEE BigData 2020 Nikita Susan Joseph, Chaity Banerjee Mukherjee, Eduardo Pasiliao Jr., Tathagata Mukherjee "FlightSense: A Spoofer Detection and Aircraft Identification System using Raw ADS-B Data" In Proceedings of IEEE BigData 2020 Prawar Poudel, Biswajit Ray, and Aleksandar Milenkovic, "Flashmark: Watermarking of NOR Flash Memories for Counterfeit Detection," in the Proceedings of the 58th Design Automation Conference (DAC 2020), San Francisco, CA, July 19-23, 2020, 6 pages. M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Multiple Layers of Fuzzy Logic to Quantify Vulnerabilities in IoT,” Proceedings of the 6th International Conference on Networks and Communications (NCO 2020), July 11-12, 2020, Toronto, Canada. M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Network System’s Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQM,” Proceedings of the 2020 National Cyber Summit, June 2-4, 2020, Huntsville, AL. J.D. Winningham, D. J. Coe, J. H. Kulick, A. Milenkovic and L. Etzkorn, " A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses," 2020 National Cyber Summit, June 2-4 2020. [NSA Grant H98230-17-1-0344] M. T. Shrove, E. Jovanov, “Forecasting Software Vulnerability Totals using Long Short-Term Memory (LSTM) Neural Networks,” Infotech, Vrnjacka Banja, Serbia, June 2020. Werth, A. and Morris, A., “Prototyping PLCs and IoT Devices in an HVAC Virtual Testbed to Study Impacts of Cyberattacks”, International Congress on Information and Communication Technology (ICICT), 2020 2019 C. D. Colvett, M. D. Petty, J. A. Bland, and K. R. Baker, “Simulating Cyberattacks with a Petri Net Discrete Event Simulator”, Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence, December 5-7 2019, Las Vegas NV, pp. 67-71, doi:10.1109/CSCI49370.2019.00018. S. Sarkar, J. Liu, E. Jovanov, “A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time,” IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, December 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9014318. M. D. Petty, P. M. Showers, T. S. Whitaker, J. A. Bland, W. A. Cantrell, C. D. Colvett, K. P. Maxwell, “Modeling Cyberattacks with Extended Petri Nets: Research Program Update”, Proceedings of the 2019 AlaSim Conference and Exhibition, October 24 2019, Huntsville AL. W. A. Cantrell, P. M. Showers, and M. D. Petty, “Verification of XML Encoded Petri Nets Modeling Cyberattacks”, Proceedings of the 2019 AlaSim Conference and Exhibition, October 24 2019, Huntsville AL. M. D. Petty, T. S. Whitaker, J. A. Bland, W. A. Cantrell, and K. P. Mayfield, “Modeling Cyberattacks with Extended Petri Nets: Research Program Overview and Status Report”, Proceedings of the 2019 International Conference on Modeling, Simulation, and Visualization Methods, Las Vegas NV, July 29–August 1 2019, pp. 27-33. K. P. Mayfield, M. D. Petty, T. S. Whitaker, W. A. Cantrell, S. M. Hice, J. McClendon, and P. J. Reyes, “Component Selection Process in Assembling Cyberattack Simulation Models”, Proceedings of the 2019 International Conference on Security and Management, Las Vegas NV, July 29–August 1 2019, pp. 168-174. Werth, A., and Morris, T., “A Specification-Based Intrusion Detection System for Malicious Payloads” , Proceedings of the 2019 National Cyber Summit Research Track, Huntsville, AL, June 4-6, 2019 SueAnne Griffith and Thomas H. Morris, "Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems," National Cyber Summit, pp 116-125, June 2019. Gupta, J., Kalaimannan, E., & Yoo, S.-M. (2019). A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator. In National Cyber Summit (pp. 202–219). Huntsville, Alabama, USA. M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM,” , Proceedings of the 2019 National Cyber Summit, June 4-6, 2019, , Huntsville, AL. Gaede, R. K., & Morris, T., & Das, R., & Lei, Y., & Alves, T., & Zhou, H., & Fahimi, F. (2019, June), Work in Progress: Layering Cybersecurity on Domain Engineering Instruction Paper presented at 2019 ASEE Annual Conference & Exposition , Tampa, Florida. J. A. Bland, C. D. Colvett, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs”, Proceedings of the 2019 National Cyber Summit, Huntsville AL, June 4-6 2019, pp. 1-16, doi:10.1007/978-3-030-31239-8_18. Alexander A., Graham P., Jackson E., Johnson B., Williams T., Park J. (2020) “An Analysis of Cybersecurity Legislation and Policy Creation on the State Level.” In: Choo KK., Morris T., Peterson G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. Available at: https://doi.org/10.1007/978-3-030-31239-8_3 K. P. Mayfield, M. D. Petty, T. S. Whitaker, J. A. Bland, and W. A. Cantrell, “Component-based Implementation of Cyberattack Simulation Models”, Proceedings of the 2019 ACM Southeast Conference, Kennesaw GA, April 18-20 2019, pp. 64-71, doi:10.1145/3299815.3314435. 2018 K. P. Mayfield, M. D. Petty, J. A. Bland, and T. S. Whitaker, “Composition of Cyberattack Models”, Proceedings of the 31st International Conference on Computer Applications in Industry and Engineering, New Orleans LA, October 8-10 2018, pp. 3-8. Das, R., Menon, V. and Morris, T., "On the Edge Real Time Intrusion Prevention System for DoS Attack". 5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018), Hamburg, Germany, August 29-30, 2018. K. P. Mayfield and M. D. Petty, “Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks”, Proceedings of the 2018 International Conference on Security and Management, Las Vegas NV, July 30-August 2 2018. W. A. Cantrell* and M. D. Petty, “A Model-based Systems Engineering Assessment of Cyber Security Modeling Methods”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 110-122. K. P. Mayfield, M. D. Petty, T. S. Whitaker, J. A. Bland, and W. A. Cantrell, “An Extended Petri Net Formalism for Modeling Cyberattacks”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 46-72. W. A. Cantrell, K. P. Mayfield, M. D. Petty, T. S. Whitaker, and J. A. Bland, “Structured Face Validation of Extended Petri Nets for Modeling Cyberattacks”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 123-139. J. A. Bland, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack and Defense Strategies”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 81-87. T. S. Whitaker, J. A. Bland, W. A. Cantrell, K. P. Mayfield, and M. D. Petty, “Tools for Simulating and Visualizing Petri Nets”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 88-109. 2017 Das, R., Morris, T. "Machine Learning and Cyber Security", International Conference on Computer, Electrical & Communication Engineering, Kolkata, West Bengal, India, December 22-23, 2017. M. D. Petty, T. S. Whitaker, J. A. Bland, and K. P. Mayfield, “Modeling Cyberattacks with Petri Nets: Research Program Overview and Status Report”, Proceedings of the 2017 AlaSim International Conference and Exposition, Huntsville AL, October 25 2017. J. A. Bland, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Validating Petri Net Models of Common Attack Pattern Enumeration and Classification”, Proceedings of the 2017 AlaSim International Conference and Exposition, Huntsville AL, October 25 2017. T. S. Whitaker, J. A. Bland, K. P. Mayfield, and M. D. Petty, “Modeling Cyberattack Patterns in Attack Trees”, Proceedings of the 2017 AlaSim International Conference and Exposition, Huntsville AL, October 25 2017. Gunti, N., Lingasubramanian, K., Alves, T., Das, R., Morris, T., "Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems", Proceedings of the 2017 National Cyber Summit Research Track, Huntsville, AL, June 6-8, 2017. Ryan Cowart, David Coe, Jeffrey Kulick, and Aleksandar Milenkovic, “An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All Programmable SoCs,” in the Proceedings of ACM Southeast Conference, Kennesaw, Georgia USA, April 2017, 8 pages. doi: http://dx.doi.org/10.1145/3077286.307729 2016 Alves, T., Das, R. Morris, T. "Virtualization of Industrial Control System Testbeds for Cybersecurity". Second Annual Industrial Control System Security (ICSS) Workshop at the 2016 Annual Computer Security Applications Conference. Los Angeles, CA. December 5-9, 2016. D J. Coe, J. H. Kulick, A. Milenkovic, S. Kim, and L. Etzkorn, "An Approach to Securing Cloud and Internet of Things Applications, 2016 National Cyber Summit - Poster, June 7-9, 2016. [NSA Grant H98230-15-1-0268] R. Johnston, S. Kim, D. Coe, L. Etzkorn, J. H. Kulick, and A. Milenkovic, "Xen Network Flow Analysis for Intrusion Detection," 11th Cyber and Information Security Research Conference, Oak Ridge, TN, April 7, 2016. [NSA Grant H98230-15-1-0268] 2014 Sandra Carpenter, Feng Zhu, Swapna Kolimi, Reducing Online Identity Disclosure Using Warnings Corresponding, Applied Ergonomics, 45(5), 2014. S. Kim, W. Edmonds and N. Nwanze, "On GPU Accelerated Tuning for a Payload Anomaly-based Network Intrusion Detection Scheme," ACM Cyber and Information Security Research Conference, 2014. M. Avula, S.G. Lee, and S.M. Yoo, “Security framework for hybrid wireless mesh protocol in wireless mesh networks,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 1982-2004, June 2014. M. Avula, S.M. Yoo, and S.G. Lee, “Secure Hybrid Wireless Mesh Protocol (SHWMP),” IETF Internet-Draft, an Experimental RFC. 2013 Reed, G.S., Colley, W.N., andAviles, S.M., "Analyzing behavior signatures for terrorist attack forecasting."Journal of Defense Modeling and Simulation, 10(2), 203-213, 2013. Sitnikova, E., Foo, E. and Vaughn, R. The Power of Hands-On Exercises in SCADA Cyber Security Education, 8th World conference on Information Security Education (WISE8), July 8-10, 2013. Auckland, New Zealand. Morris, T., Vaughn, R. and Sitnikova, E. Advances in the Protection of Critical Infrastructure Improvement in Industrial Control System Security. Australiasian Computer Science Week. January 29 – Feb 1, 2013. University of South Australia, Adelaide Australia. Vaughn, R., Morris, T., Sitnikova, E. Development and Expansion of an Industrial Control System Security Laboratory and an International Research Collaboration. 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. Morris, T., Jones, B. Vaughn, R., Dandass, Y. Deterministic Intrusion Detection Rules for MODBUS Protocols. The 46th IEEE Hawaii International Conference on System Sciences (HICSS – 45). January 7-10, 2013. Grand Wailea, Maui W.K. Tan, S.G. Lee, J.H. Lam, and S.M. Yoo, ”A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols,” (MPDI) Sensors 13(9), pp. 11553-11585, Sep. 2013. 2012 S. Kim, N. Nwanze, W. Edmonds, B. Johnson, and P. Field, “On Network Intrusion Detection for Deployment in the Wild,” IEEE Network Operations and Management Symposium, 2012. Feng Zhu, Sandra Carpenter, and Ajinkya Kulkarni, “Understanding Identity Exposure in Pervasive Computing Environments,” Pervasive and Mobile Computing, Vol. 8, 2012. Feng Zhu, Matt Mutka, and Lionel Ni, “Private Entity Authentication for Pervasive Computing Environments,” International Journal of Network Security, Vol.14, No.1, Jan. 2012. Swapna Kolimi, Feng Zhu, and Sandra Carpenter, “Contexts and sharing/not sharing Private Information”, ACM Southeast Conference, 2012. Swapna Kolimi, Feng Zhu, and Sandra Carpenter, “Is Older, Wiser? An Age-Specific Study of Exposure of Private Information”, ACM Southeast Conference, 2012. Curt Lawson, Feng Zhu, “Sentential Access Control”, ACM Southeast Conference, 2012. F.T. Sheldon, J.M. Weber, S.M. Yoo, and W.D. Pan, “The Insecurity of Wireless Networks,” IEEE Security & Privacy, vol. 10, no. 4, pp. 54-61, July/Aug. 2012. O. Toutonji, S.M. Yoo, and M. Park, “Stability analysis of VEISV propagation modeling for network worm attack,” Applied Mathematical Modeling, 36(2012) 2751-2761, June 2012. J. Gupta, E. Kalaimannan, and S.M. Yoo, “Maximizing investigation effectiveness for time critical forensic cases,” ISDSI 6th Int’l Conf. on Decision Sciences for Performance Excellence, Hyderabad, India, pp. 431-441, Dec. 2012. Gupta, J. N. D., Kalaimannan, E., and Patnayakuni, R., “IDS Alarms investigation with limited resources,” Pre-ICIS Workshop on Information Security and Privacy (WISP), Orlando, Florida, Dec 2012. 2011 Feng Zhu and Ajinkya Kulkarni, "DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments," proceedings of the 20th International Conference on Computer Communications and Networks (ICCCN), Maui, Hawaii, 2011. Feng Zhu et. al, "Reciprocity Attacks," in Symposium On Usable Privacy and Security, Pittsburgh, PA, 2011 (SOUPS 2011).