Publications on
Information Assurance / Cybersecurity

Ph.D. Dissertations - Master’s Theses - Book / Book Chapters - Encyclopedia Articles - Journal Articles - Conference Papers

 

Ph.D. Dissertations

SueAnne Griffith, Ph.D. Dissertation, Spring 2020, "A Virtual Cyber-Physical System Testbed for Use in Network Intrusion Detection and Prevention System Verification."

K. Sharshembiev, “Protocol Misbehavior Mitigation Framework for Broadcast Communications in Vehicular Ad Hoc Networks,” November, 2019

Tymaine S. Whitaker, Ph.D. Dissertation, Spring 2019, Generating Cyberattack Component Models from an Attack Pattern Database, Advisor M. Petty.

John A. Bland, Ph.D. Dissertation, Fall 2018, Machine Learning of Cyberattack and Defense Strategies, Advisor M. Petty.

Ezhil Kalaimannan, Ph.D. Dissertation, Summer 2014, Computational Optimization Models for Investigating Digital Crime and Intrusion Detection Alarms.

Mallikarjun Avula, Ph.D. Dissertation, Spring 2014, Security Framework for Hybrid Wireless Mesh Protocol in Wireless Mesh Networks.

Swapna Kolimi, Ph.D. Dissertation, Spring 2013, Computer Privacy and Human Factors – Attitudes, Psychological Attacks, and Mitigations. 

 


Master’s Theses

Igor Semenov, An Implementation of ChaCha20 Stream Cypher in All-Programmable SoCs, Master Thesis, The University of Alabama in Huntsville, July 2020.

Nicholas M. Christensen, M.S. Thesis, Summer 2018, Validating Petri Net Models of Cyberattacks, Advisor M. Petty.

Prawar Poudel, Using NOR Flash Memory in Microcontrollers for Generating True Random Numbers, Master Thesis, The University of Alabama in Huntsville, April 2018.

Ryan A. Cowart, An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs on Embedded and Workstation Computer Platforms, Master Thesis, The University of Alabama in Huntsville, October 2017.

Deb Silvia, MS Thesis, Spring 2014, Affecting User Attitudes: Mobile Devices and Bluetooth Security.

Khalid Razak, MS Thesis, Fall 2013, Major Service Discovery Technology: a Hands-on Analysis.

Ha Jiang, MS Thesis, Fall 2013, Service Discovery in the Post-PC Era.

Hunter Stinson, MS Thesis, 2013, Optimal Performance Counter Events for Detecting Android Malware.

Curt Lawson, MS Thesis, Fall 2012, Sentential Access Control.

Lance Warden, MS Thesis, Fall 2012, Markovian Service Selection Models.

 


Book / Book Chapters

J. A. Bland, C. D. Colvett, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs”, in K. R. Choo, T. H. Morris, and G. L. Peterson (Editors), National Cyber Summit (NCS) Research Track, Advances in Intelligent Systems and Computing, Vol. 1055, Springer, Cham Switzerland, 2020 pp. 232-247, doi:10.1007/978-3-030-31239-8_18.

Patnayakuni, N., Patnayakuni, R., Gupta, J. N. D., & Chugh, R. (2016). Towards a Model of Social Media Impacts on Cybersecurity Knowledge Transfer: An Exploration. In Harnessing Social Media as a Knowledge Management Tool (pp. 249–272). Idea Group.

M. Deylami, E. Jovanov, “Dynamic Coexistence of Wireless Body Area Networks,” in Telemedicine and Electronic Medicine,” Halit Eren and John G. Webster, Eds, CRC Press, ISBN: 978-1-4822-3658-3, pp. 261-274, 2015.

Feng Zhu, et. al, “Service Discovery Architecture and Protocol Design for Pervasive Computing,” book chapter in “Advanced Design Approaches to Emerging Software Systems: Principles, Methodology and Tools”, 2011. 

 


Encyclopedia Articles

Williams, T., El-Gayar, O., Morris, T. "Security Analytics," in Encyclopedia of Cryptography, Security and Privacy, Springer US, 2020 (in review).

Hairston, J., Gaede, R., Morris, T. "Industrial Internet of Things," in Encyclopedia of Cryptography, Security and Privacy, Springer US, 2020 (in review).

SueAnne Griffith, Thomas H. Morris, "Network Intrusion Detection System," Encyclopedia of Cryptography, Security, and Privacy, 2020.

 


Journal Articles

2020

Hairston, Jesse R.; Williams, Tania; Smith, Derrick W. Ed.D., COMS; Sabados, William T. Ph.D.; and Forney, Steven (2020) "Teaching Cybersecurity to Students with Visual Impairments and Blindness," Journal of Science Education for Students with Disabilities: Vol. 23 : Iss. 1 .
DOI: 10.14448/jsesd.12.0007 Available at: https://scholarworks.rit.edu/jsesd/vol23/iss1/7"

Werth, A., Griffith, S., Hairston, J., and Morris, T., “Cybersecurity Threats and Experimental Testbed for a Generator System,” The Journal of Defense Modeling and Simulation, 2020

J. A. Bland, M. D. Petty, T. S. Whitaker, K. P. Maxwell, and W. A. Cantrell, “Machine Learning Cyberattack and Defense Strategies”, Computers & Security, Volume 92, May 2020, doi:10.1016/j.cose.2020.101738.

E. Elmahdi, S.M. Yoo, and K. Sharshembiev, “Secured and Reliable Data Forwarding Using Homomorphic Cryptosystem against Blackhole Attacks in Mobile Ad Hoc Networks,” Elsevier’s Journal of Information Security and Applications, vol. 51 (2020), April 2020.

D. J. Coe, J. H. Kulick, A. Milenkovic and L. Etzkorn, "Virtualized In Situ Software Update Verification: Verification of Over-the-Air Automotive Software Updates," IEEE Vehicular Technology Magazine, vol. 15, no. 1, pp. 84-90, March 2020.

Sadman Sakib, Aleksandar Milenković, Md Tauhidur Rahman, Biswajit Ray, "An Aging-Resistant NAND Flash Memory Physical Unclonable Function," IEEE Transactions on Electron Devices, Vol. 67, Issue: 3, pp. 937-943, February 2020, doi: 10.1109/TED.2020.2968272


2019

Prawar Poudel, Biswajit Ray, Aleksandar Milenković, "Microcontroller TRNGs Using Perturbed States of NOR Flash Memory Cells," IEEE Transactions on Computers, Vol. 68, No. 2, Feb. 2019, pp. 307-313, doi: 10.1109/TC.2018.2866459.


2018

Alves, T., Das, R., Werth, A., Morris, T., "Virtualization of SCADA Testbeds for Cybersecurity Research: A Modular Approach", in Computers & Security, Volume 77, August 2018, Pages 531-546, https://doi.org/10.1016/j.cose.2018.05.002.

Alves, T., Das, R., Morris, T., "Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controller", in IEEE Embedded Systems Letters, vol. 10, no. 3, pp. 99-102, Sept. 2018, doi: 10.1109/LES.2018.2823906.

M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Analytic Hierarchy Process-based Fuzzy Measurement to Quantify Vulnerabilities of Web Applications,” International Journal of Computer Networks & Communications (IJCNC), Accepted.

Das, R. Morris, T., "Modeling a Midstream Oil Terminal for Cybersecurity Risk Evaluation," in Critical Instructure Protection XII, Sujeet Shenoi and Jason Staggs, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2018.

Biswajit Ray, Aleksandar Milenković, "True Random Number Generation Using Read Noise of Flash Memory Cells," IEEE Transactions on Electron Devices, Vol. 65, Issue 3, March 2018, pp. 963-969, doi: 10.1109/TED.2018.2792436

V. Heydari and S.M. Yoo, “Timeout Period Analysis to Detect Misbehaving Nodes in Multihop Wireless Ad Hoc Networks,” Springer’s International Journal of Wireless Information Networks, vol. 25, no. 1, March 2018, pp. 15-29.


2017

V. Heydari, S. Kim, and S.M. Yoo, “Scalable Anti-Censorship Framework Using Moving Target Defense for Web Servers,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, May 2017, pp. 1113-1124.

Kalaimannan, E., & Gupta, J. N. D. (2017). The Security Development Lifecycle in the Context of Accreditation Policies and Standards. IEEE Security and Privacy, 15(1), 52–57


2016

V. Heydari and S.M. Yoo, “E2EACK: An end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs,” Springer’s Wireless Networks, vol. 22, issue 7, Oct. 2016, pp. 2259-2273.

J. Gupta, E. Kalaimannan, and S.M. Yoo, “Maximizing investigation effectiveness in digital forensic cases,” A Heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators,” Computers & Operations Research, vol. 69, May 2016, pp. 1-9.

 


Conference Papers

2021

Williams T., El-Gayar O. (2021) Design of a Virtual Cybersecurity Escape Room. In: Choo KK.R., Morris T., Peterson G., Imsand E. (eds) National Cyber Summit (NCS) Research Track 2021. NCS 2021. Lecture Notes in Networks and Systems, vol 310. Springer, Cham. https://doi.org/10.1007/978-3-030-84614-5_6


2020

M. Hasan and B. Ray, “Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization” 29th USENIX Security Symposium, Boston, MA, Aug. 2020.

Prawar Poudel, Biswajit Ray, and Aleksandar Milenkovic, "Flashmark: Watermarking of NOR Flash Memories for Counterfeit Detection," in the Proceedings of the 58th Design Automation Conference (DAC 2020), San Francisco, CA, July 19-23, 2020, 6 pages.

M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Multiple Layers of Fuzzy Logic to Quantify Vulnerabilities in IoT,” Proceedings of the 6th International Conference on Networks and Communications (NCO 2020), July 11-12, 2020, Toronto, Canada.

M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Network System’s Vulnerability Quantification Using Multi-layered Fuzzy Logic Based on GQM,” Proceedings of the 2020 National Cyber Summit, June 2-4, 2020, Huntsville, AL.

J.D. Winningham, D. J. Coe, J. H. Kulick, A. Milenkovic and L. Etzkorn, " A Single-Board Computing Constellation Supporting Integration of Hands-On Cybersecurity Laboratories into Operating Systems Courses," 2020 National Cyber Summit, June 2-4 2020. [NSA Grant H98230-17-1-0344]

M. T. Shrove, E. Jovanov, “Forecasting Software Vulnerability Totals using Long Short-Term Memory (LSTM) Neural Networks,” Infotech, Vrnjacka Banja, Serbia, June 2020.

Werth, A. and Morris, A., “Prototyping PLCs and IoT Devices in an HVAC Virtual Testbed to Study Impacts of Cyberattacks”, International Congress on Information and Communication Technology (ICICT), 2020


2019

C. D. Colvett, M. D. Petty, J. A. Bland, and K. R. Baker, “Simulating Cyberattacks with a Petri Net Discrete Event Simulator”, Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence, December 5-7 2019, Las Vegas NV, pp. 67-71, doi:10.1109/CSCI49370.2019.00018.

S. Sarkar, J. Liu, E. Jovanov, “A Robust Algorithm for Sniffing BLE Long-Lived Connections in Real-time,” IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, December 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9014318.

M. D. Petty, P. M. Showers, T. S. Whitaker, J. A. Bland, W. A. Cantrell, C. D. Colvett, K. P. Maxwell, “Modeling Cyberattacks with Extended Petri Nets: Research Program Update”, Proceedings of the 2019 AlaSim Conference and Exhibition, October 24 2019, Huntsville AL.

W. A. Cantrell, P. M. Showers, and M. D. Petty, “Verification of XML Encoded Petri Nets Modeling Cyberattacks”, Proceedings of the 2019 AlaSim Conference and Exhibition, October 24 2019, Huntsville AL.

M. D. Petty, T. S. Whitaker, J. A. Bland, W. A. Cantrell, and K. P. Mayfield, “Modeling Cyberattacks with Extended Petri Nets: Research Program Overview and Status Report”, Proceedings of the 2019 International Conference on Modeling, Simulation, and Visualization Methods, Las Vegas NV, July 29–August 1 2019, pp. 27-33.

K. P. Mayfield, M. D. Petty, T. S. Whitaker, W. A. Cantrell, S. M. Hice, J. McClendon, and P. J. Reyes, “Component Selection Process in Assembling Cyberattack Simulation Models”, Proceedings of the 2019 International Conference on Security and Management, Las Vegas NV, July 29–August 1 2019, pp. 168-174.

Werth, A., and Morris, T., “A Specification-Based Intrusion Detection System for Malicious Payloads” , Proceedings of the 2019 National Cyber Summit Research Track, Huntsville, AL, June 4-6, 2019

SueAnne Griffith and Thomas H. Morris, "Using Modeled Cyber-Physical Systems for Independent Review of Intrusion Detection Systems," National Cyber Summit, pp 116-125, June 2019.

Gupta, J., Kalaimannan, E., & Yoo, S.-M. (2019). A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator. In National Cyber Summit (pp. 202–219). Huntsville, Alabama, USA.

M. Shojaeshafiei, L. Etzkorn, and M. Anderson, “Cybersecurity Framework Requirements to Quantify Vulnerabilities Based on GQM,” , Proceedings of the 2019 National Cyber Summit, June 4-6, 2019, , Huntsville, AL.

Gaede, R. K., & Morris, T., & Das, R., & Lei, Y., & Alves, T., & Zhou, H., & Fahimi, F. (2019, June), Work in Progress: Layering Cybersecurity on Domain Engineering Instruction Paper presented at 2019 ASEE Annual Conference & Exposition , Tampa, Florida.

J. A. Bland, C. D. Colvett, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack Strategies with Petri Nets with Players, Strategies, and Costs”, Proceedings of the 2019 National Cyber Summit, Huntsville AL, June 4-6 2019, pp. 1-16, doi:10.1007/978-3-030-31239-8_18.

Alexander A., Graham P., Jackson E., Johnson B., Williams T., Park J. (2020) “An Analysis of Cybersecurity Legislation and Policy Creation on the State Level.” In: Choo KK., Morris T., Peterson G. (eds) National Cyber Summit (NCS) Research Track. NCS 2019. Advances in Intelligent Systems and Computing, vol 1055. Springer, Cham. Available at: https://doi.org/10.1007/978-3-030-31239-8_3

K. P. Mayfield, M. D. Petty, T. S. Whitaker, J. A. Bland, and W. A. Cantrell, “Component-based Implementation of Cyberattack Simulation Models”, Proceedings of the 2019 ACM Southeast Conference, Kennesaw GA, April 18-20 2019, pp. 64-71, doi:10.1145/3299815.3314435.


2018

K. P. Mayfield, M. D. Petty, J. A. Bland, and T. S. Whitaker, “Composition of Cyberattack Models”, Proceedings of the 31st International Conference on Computer Applications in Industry and Engineering, New Orleans LA, October 8-10 2018, pp. 3-8.

Das, R., Menon, V. and Morris, T., "On the Edge Real Time Intrusion Prevention System for DoS Attack". 5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018), Hamburg, Germany, August 29-30, 2018.

K. P. Mayfield and M. D. Petty, “Petri Nets with Players, Strategies, and Cost: A Formalism for Modeling Cyberattacks”, Proceedings of the 2018 International Conference on Security and Management, Las Vegas NV, July 30-August 2 2018.

W. A. Cantrell* and M. D. Petty, “A Model-based Systems Engineering Assessment of Cyber Security Modeling Methods”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 110-122.

K. P. Mayfield, M. D. Petty, T. S. Whitaker, J. A. Bland, and W. A. Cantrell, “An Extended Petri Net Formalism for Modeling Cyberattacks”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 46-72.

W. A. Cantrell, K. P. Mayfield, M. D. Petty, T. S. Whitaker, and J. A. Bland, “Structured Face Validation of Extended Petri Nets for Modeling Cyberattacks”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 123-139.

J. A. Bland, W. A. Cantrell, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Machine Learning Cyberattack and Defense Strategies”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 81-87.

T. S. Whitaker, J. A. Bland, W. A. Cantrell, K. P. Mayfield, and M. D. Petty, “Tools for Simulating and Visualizing Petri Nets”, Proceedings of the 2018 AlaSim International Conference and Exposition, Huntsville AL, May 22-23 2018, pp. 88-109.


2017

Das, R., Morris, T. "Machine Learning and Cyber Security", International Conference on Computer, Electrical & Communication Engineering, Kolkata, West Bengal, India, December 22-23, 2017.

M. D. Petty, T. S. Whitaker, J. A. Bland, and K. P. Mayfield, “Modeling Cyberattacks with Petri Nets: Research Program Overview and Status Report”, Proceedings of the 2017 AlaSim International Conference and Exposition, Huntsville AL, October 25 2017.

J. A. Bland, K. P. Mayfield, M. D. Petty, and T. S. Whitaker, “Validating Petri Net Models of Common Attack Pattern Enumeration and Classification”, Proceedings of the 2017 AlaSim International Conference and Exposition, Huntsville AL, October 25 2017.

T. S. Whitaker, J. A. Bland, K. P. Mayfield, and M. D. Petty, “Modeling Cyberattack Patterns in Attack Trees”, Proceedings of the 2017 AlaSim International Conference and Exposition, Huntsville AL, October 25 2017.

Gunti, N., Lingasubramanian, K., Alves, T., Das, R., Morris, T., "Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems", Proceedings of the 2017 National Cyber Summit Research Track, Huntsville, AL, June 6-8, 2017.

Ryan Cowart, David Coe, Jeffrey Kulick, and Aleksandar Milenkovic, “An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All Programmable SoCs,” in the Proceedings of ACM Southeast Conference, Kennesaw, Georgia USA, April 2017, 8 pages. doi: http://dx.doi.org/10.1145/3077286.307729


2016

Alves, T., Das, R. Morris, T. "Virtualization of Industrial Control System Testbeds for Cybersecurity". Second Annual Industrial Control System Security (ICSS) Workshop at the 2016 Annual Computer Security Applications Conference. Los Angeles, CA. December 5-9, 2016.

D J. Coe, J. H. Kulick, A. Milenkovic, S. Kim, and L. Etzkorn, "An Approach to Securing Cloud and Internet of Things Applications, 2016 National Cyber Summit - Poster, June 7-9, 2016. [NSA Grant H98230-15-1-0268]

R. Johnston, S. Kim, D. Coe, L. Etzkorn, J. H. Kulick, and A. Milenkovic, "Xen Network Flow Analysis for Intrusion Detection," 11th Cyber and Information Security Research Conference, Oak Ridge, TN, April 7, 2016. [NSA Grant H98230-15-1-0268]


2014

Sandra Carpenter, Feng Zhu, Swapna Kolimi, Reducing Online Identity Disclosure Using Warnings Corresponding, Applied Ergonomics, 45(5), 2014.

S. Kim, W. Edmonds and N. Nwanze, "On GPU Accelerated Tuning for a Payload Anomaly-based Network Intrusion Detection Scheme," ACM Cyber and Information Security Research Conference, 2014.

M. Avula, S.G. Lee, and S.M. Yoo, “Security framework for hybrid wireless mesh protocol in wireless mesh networks,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 1982-2004, June 2014.

M. Avula, S.M. Yoo, and S.G. Lee, “Secure Hybrid Wireless Mesh Protocol (SHWMP),” IETF Internet-Draft, an Experimental RFC.


2013

Reed, G.S., Colley, W.N., andAviles, S.M., "Analyzing behavior signatures for terrorist attack forecasting."Journal of Defense Modeling and Simulation, 10(2), 203-213, 2013.

Sitnikova, E., Foo, E. and Vaughn, R.  The Power of Hands-On Exercises in SCADA Cyber Security Education, 8th World conference on Information Security Education (WISE8), July 8-10, 2013.  Auckland, New Zealand.

Morris, T., Vaughn, R. and Sitnikova, E. Advances in the Protection of Critical Infrastructure Improvement in Industrial Control System Security.  Australiasian Computer Science Week.  January 29 – Feb 1, 2013.   University of South Australia, Adelaide Australia.

Vaughn, R., Morris, T., Sitnikova, E. Development and Expansion of an Industrial Control System Security Laboratory and an International Research Collaboration. 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN.

Morris, T., Jones, B. Vaughn, R., Dandass, Y. Deterministic Intrusion Detection Rules for MODBUS Protocols. The 46th IEEE Hawaii International Conference on System Sciences (HICSS – 45). January 7-10, 2013. Grand Wailea, Maui

W.K. Tan, S.G. Lee, J.H. Lam, and S.M. Yoo, ”A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols,” (MPDI) Sensors 13(9), pp. 11553-11585, Sep. 2013.


2012

S. Kim, N. Nwanze, W. Edmonds, B. Johnson, and P. Field, “On Network Intrusion Detection for Deployment in the Wild,” IEEE Network Operations and Management Symposium, 2012. 

Feng Zhu, Sandra Carpenter, and Ajinkya Kulkarni, “Understanding Identity Exposure in Pervasive Computing Environments,” Pervasive and Mobile Computing, Vol. 8, 2012.

Feng Zhu, Matt Mutka, and Lionel Ni, “Private Entity Authentication for Pervasive Computing Environments,” International Journal of Network Security, Vol.14, No.1, Jan. 2012.

Swapna Kolimi, Feng Zhu, and Sandra Carpenter, “Contexts and sharing/not sharing Private Information”, ACM Southeast Conference, 2012.

Swapna Kolimi, Feng Zhu, and Sandra Carpenter, “Is Older, Wiser? An Age-Specific Study of Exposure of Private Information”, ACM Southeast Conference, 2012.

Curt Lawson, Feng Zhu, “Sentential Access Control”, ACM Southeast Conference, 2012.

F.T. Sheldon, J.M. Weber, S.M. Yoo, and W.D. Pan, “The Insecurity of Wireless Networks,” IEEE Security & Privacy, vol. 10, no. 4, pp. 54-61, July/Aug. 2012.

O. Toutonji, S.M. Yoo, and M. Park, “Stability analysis of VEISV propagation modeling for network worm attack,” Applied Mathematical Modeling, 36(2012) 2751-2761, June 2012.

J. Gupta, E. Kalaimannan, and S.M. Yoo, “Maximizing investigation effectiveness for time critical forensic cases,” ISDSI 6th Int’l Conf. on Decision Sciences for Performance Excellence, Hyderabad, India, pp. 431-441, Dec. 2012.

Gupta, J. N. D., Kalaimannan, E., and Patnayakuni, R., “IDS Alarms investigation with limited resources,” Pre-ICIS Workshop on Information Security and Privacy (WISP), Orlando, Florida, Dec 2012.


2011

Feng Zhu and Ajinkya Kulkarni, "DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments," proceedings of  the 20th International Conference on Computer Communications and Networks (ICCCN), Maui, Hawaii, 2011.

Feng Zhu et. al, "Reciprocity Attacks," in Symposium On Usable Privacy and Security, Pittsburgh, PA, 2011 (SOUPS 2011).