Publications on
Information Assurance / Cybersecurity

Ph.D. Dissertations - Master’s Theses - Book / Book Chapters - Papers


Ph.D. Dissertations

Ezhil Kalaimannan, Ph.D. Dissertation, Summer 2014, Computational Optimization Models for Investigating Digital Crime and Intrusion Detection Alarms.

Mallikarjun Avula, Ph.D. Dissertation, Spring 2014, Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks.

Swapna Kolimi, Ph.D. Dissertation, Spring 2013, Computer Privacy and Human Factors – Attitudes, Psychological Attacks, and Mitigations. 


Master’s Theses

Deb Silvia, MS Thesis, Spring 2014, Affecting User Attitudes: Mobile Devices and Bluetooth Security.

Khalid Razak, MS Thesis, Fall 2013, Major Service Discovery Technology: a Hands-on Analysis.

Ha Jiang, MS Thesis, Fall 2013, Service Discovery in the Post-PC Era.

Hunter Stinson, MS Thesis, 2013, Optimal Performance Counter Events for Detecting Android Malware.

Curt Lawson, MS Thesis, Fall 2012, Sentential Access Control.

Lance Warden, MS Thesis, Fall 2012, Markovian Service Selection Models.


Book / Book Chapters

Feng Zhu, et. al, “Service Discovery Architecture and Protocol Design for Pervasive Computing,” book chapter in “Advanced Design Approaches to Emerging Software Systems: Principles, Methodology and Tools”, 2011.




Sandra Carpenter, Feng Zhu, Swapna Kolimi, Reducing Online Identity Disclosure Using Warnings Corresponding, Applied Ergonomics, 45(5), 2014.

S. Kim, W. Edmonds and N. Nwanze, "On GPU Accelerated Tuning for a Payload Anomaly-based Network Intrusion Detection Scheme," ACM Cyber and Information Security Research Conference, 2014.

M. Avula, S.G. Lee, and S.M. Yoo, “Security framework for hybrid wireless mesh protocol in wireless mesh networks,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 1982-2004, June 2014.

M. Avula, S.M. Yoo, and S.G. Lee, “Secure Hybrid Wireless Mesh Protocol (SHWMP),” IETF Internet-Draft, an Experimental RFC.


Reed, G.S., Colley, W.N., andAviles, S.M., "Analyzing behavior signatures for terrorist attack forecasting."Journal of Defense Modeling and Simulation, 10(2), 203-213, 2013.

Sitnikova, E., Foo, E. and Vaughn, R.  The Power of Hands-On Exercises in SCADA Cyber Security Education, 8th World conference on Information Security Education (WISE8), July 8-10, 2013.  Auckland, New Zealand.

Morris, T., Vaughn, R. and Sitnikova, E. Advances in the Protection of Critical Infrastructure Improvement in Industrial Control System Security.  Australiasian Computer Science Week.  January 29 – Feb 1, 2013.   University of South Australia, Adelaide Australia.

Vaughn, R., Morris, T., Sitnikova, E. Development and Expansion of an Industrial Control System Security Laboratory and an International Research Collaboration. 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN.

Morris, T., Jones, B. Vaughn, R., Dandass, Y. Deterministic Intrusion Detection Rules for MODBUS Protocols. The 46th IEEE Hawaii International Conference on System Sciences (HICSS – 45). January 7-10, 2013. Grand Wailea, Maui

W.K. Tan, S.G. Lee, J.H. Lam, and S.M. Yoo, ”A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols,” (MPDI) Sensors 13(9), pp. 11553-11585, Sep. 2013.


S. Kim, N. Nwanze, W. Edmonds, B. Johnson, and P. Field, “On Network Intrusion Detection for Deployment in the Wild,” IEEE Network Operations and Management Symposium, 2012. 

Feng Zhu, Sandra Carpenter, and Ajinkya Kulkarni, “Understanding Identity Exposure in Pervasive Computing Environments,” Pervasive and Mobile Computing, Vol. 8, 2012.

Feng Zhu, Matt Mutka, and Lionel Ni, “Private Entity Authentication for Pervasive Computing Environments,” International Journal of Network Security, Vol.14, No.1, Jan. 2012.

Swapna Kolimi, Feng Zhu, and Sandra Carpenter, “Contexts and sharing/not sharing Private Information”, ACM Southeast Conference, 2012.

Swapna Kolimi, Feng Zhu, and Sandra Carpenter, “Is Older, Wiser? An Age-Specific Study of Exposure of Private Information”, ACM Southeast Conference, 2012.

Curt Lawson, Feng Zhu, “Sentential Access Control”, ACM Southeast Conference, 2012.

F.T. Sheldon, J.M. Weber, S.M. Yoo, and W.D. Pan, “The Insecurity of Wireless Networks,” IEEE Security & Privacy, vol. 10, no. 4, pp. 54-61, July/Aug. 2012.

O. Toutonji, S.M. Yoo, and M. Park, “Stability analysis of VEISV propagation modeling for network worm attack,” Applied Mathematical Modeling, 36(2012) 2751-2761, June 2012.

J. Gupta, E. Kalaimannan, and S.M. Yoo, “Maximizing investigation effectiveness for time critical forensic cases,” ISDSI 6th Int’l Conf. on Decision Sciences for Performance Excellence, Hyderabad, India, pp. 431-441, Dec. 2012.

Gupta, J. N. D., Kalaimannan, E., and Patnayakuni, R., “IDS Alarms investigation with limited resources,” Pre-ICIS Workshop on Information Security and Privacy (WISP), Orlando, Florida, Dec 2012.


Feng Zhu, Wei Zhu, Matt Mutka, and Lionel Ni, “Service Discovery Architecture and Protocol Design for Pervasive Computing,” book chapter in “Advanced Design Approaches to Emerging Software Systems: Principles, Methodology and Tools” 2011.

Feng Zhu and Ajinkya Kulkarni, "DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments," proceedings of  the 20th International Conference on Computer Communications and Networks (ICCCN), Maui, Hawaii, 2011.

Feng Zhu et. al, "Reciprocity Attacks," in Symposium On Usable Privacy and Security, Pittsburgh, PA, 2011 (SOUPS 2011).