Publications by Publication Type
Article (Journal or Magazine)
- M. Eric Johnson, "A broader context for information security", Financial Times, September 16, 2005
- Apu Kapadia, "A Case (Study) For Usability in Secure Email Communication", IEEE Security and Privacy, vol. 5, no. 2, pp. 80-84, Mar/Apr, 2007
- D Rockmore, S Lyu and H Farid, "A Digital Technique for Authentication in the Visual Arts", International Foundation for Art Research, (8)2:12-23, 2006
- Denise Anthony and Celeste Campos-Castillo, "A Looming Digital Divide? Group Differences in the Perceived Importance of Electronic Health Records", Information, Communication, and Society 18(7): 832-846.
DOI:10.1080/1369118X.2015.1006657
- Stephen Linder, David Abbott and Michael Fromberger, "An Instructional Scaffolding Approach to Teaching Software Design", Journal of computing in Small Colleges, Consortium for Computing in Small Colleges, 21(6), p. 238-250, June 2006
- Minho Shin, Cory Cornelius, Daniel Peebles, Apu Kapadia, David Kotz and Nikos Triandopoulos, "AnonySense: A System for Anonymous Opportunistic Sensing", Journal of Pervasive and Mobile Computing. (2010), doi:10.1016/j.pmcj.2010.04.001.
- Sriram Srinivasan, Gavin Barnard and Tillman Gerngross, "A Novel High-Cell-Density Protein Expression System Based on Ralstonia eutropha", Applied and Environmental Microbiology, December 2002, 68(12):5925-5932
- Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Igor Paprotny and Daniela Rus, "An Untethered, Electrostatic, Globally-Controllable MEMS Micro-Robot", Journal of Microelectromechanical Systems, 2006, 15(1):1-15
- Susan McGrath, Eliot Grigg, Suzanne Wendelken, George Blike, Michael DeRosa, Aaron Fiske and Robert Gray, "ARTEMIS: A Vision for Remote Triage and Emergency Management Information Integration", IEEE Transaction on Biomedical Engineering
- Kimaya Sanzgiri, Daniel LaFlamme, Bridget Dahill, Brian Levine, Clay Shields and Elizabeth Belding-Royer, "Authenticated Routing for Ad hoc Networks", IEEE/ACM Journal of Selected Areas in Communications: Special issue on Wireless Ad hoc Networks (JSAC), March 2005, 23(30): 598-610
- Michael Locasto, Sergey Bratus and Brian Schulte, "Bickering In-Depth: Rethinking the Composition of Competing Security Systems", IEEE Security & Privacy, Volume 7, Number 6, pp. 77-81, November/December 2009.
- Denise Anthony, Timothy Stablein and Emily Carian, "Big Brother in the Information Age", IEEE Security & Privacy 13(4):12-19
ISSN :1540-7993
DOI:10.1109/MSP.2015.70
- J Dyer, M Lindemann, R Perez, R Sailer, Sean Smith, L Doorn and S Weingart, "Building the IBM 4758 Secure Coprocessor", IEEE Computer, October 2001, 34(10): 57-66
- George Cybenko, Annarita Giani and Paul Thompson, "Cognitive Hacking: A Battle for the Mind", IEEE Computer, August 2002, 35(8): 50-56
- Xiaorong Xiong, Yael Hanein, Jiandong Fang, Y. Wang, W. Wang, Daniel Schwartz and Karl F. Bohringer, "Controlled multibatch self-assembly of microdevices", Journal of Microelectromechanical Systems, 2003. 12(2): p. 117-127
- Lawrence Carin and George Cybenko, "Cybersecurity Strategies: The QuERIES Methodology", IEEE Computer, August 2008, Volume 41, Issue 8, pp. 20-26.
- Fillia Makedon, Song Ye, Li Shen, Tilmann Steinberg and Sarantos Kapidakis, "Data Brokers: Building Collections Through Negotiation", in submission to EJETA.org
- George Cybenko and Guofei Jiang, "Developing a Distributed System for Infrastructure Protection", IEEE IT Professional, July/August 2000, 2(4): 17-22
- H Farid, "Digital Forensics: How Experts Uncover Doctored Images", Scientific American, June 2008
- H Farid, "Digitial Doctoring: How to tell the real from the fake", Significance, 3(4):162-166, 2006
- Gabriel Vanrenen, Sean Smith and John Marchesini, "Distributing Security-Mediated PKI", International Journal of Information Security, July 2005, 5(1): 3-17
- Diego Hernando, Valentino Crespi and George Cybenko, "Efficient Computation of the Hidden Markov Model Entropy for a Given Observation Sequence", IEEE Transactions on Information Theory, Vol. 51, No. 7, July 2005
- M. Eric Johnson and Eric Goetz, "Embedding Information Security into the Organization", IEEE Security and Privacy, May/June 2007 (Vol. 5, No. 3)
- Jason Liu, Yougu Yuan, David Nicol, Robert Gray, Calvin Newport, David Kotz and Felipe Perrone, "Empirical Validation of Wireless Models in Simulations of Ad Hoc Routing Protocols", Simulation: Transactions of the Society for Modeling and Simulation International, April 2005, 81(4): 307-323
- David Nicol, Sean Smith and Meiyuan Zhao, "Evaluation of Efficient Security for BGP Route Announcements using Parallel Simulation", Simulation Modelling Practice and Theory, 12(3-4): 187-216, 2004
- Zack Butler and Daniela Rus, "Event-based Motion Control for Mobile-Sensor Networks", IEEE Pervasive Computing, October-December 2003, 2(4): 34-42
- Calvin Newport, David Kotz, Robert Gray, Jason Liu, Yougu Yuan and Chip Elliott, "Experimental Evaluation of Wireless Simulation Assumptions", SIMULATION: Transactions of The Society for Modeling and Simulation International,September 2007, Vol. 83, No. 9, pages 643-661
- A Popescu and H Farid, "Exposing Digital Forgeries by Detecting Traces of Re-sampling", IEEE Transactions on Signal Processing, 53(2):758-767, 2005
- H Farid, "Exposing Digital Forgeries from JPEG Ghosts", IEEE Transactions on Information Forensics and Security, 4(1):154-160, 2009.
- A Popescu and H Farid, "Exposing Digital Forgeries in Color Filter Array Interpolated Images", IEEE Transactions on Signal Processing, 53(10):3948-3959, 2005
- M Johnson and H Farid, "Exposing Digital Forgeries in Complex Lighting Environments", IEEE Transactions on Information Forensics and
Security, Volume 2, Number 3, pp. 450-461, September 2007
- Weihong Wang and H Farid, "Exposing Digital Forgeries in Interlaced and De-Interlaced Video", IEEE Transactions on Information Forensics and Security, Number 2, Volume 3, pp. 438-449, 2007
- Keren Tan, Chris McDonald, Bennet Vance, Chrisil Arackaparambil, Sergey Bratus and David Kotz, "From MAP to DIST: the evolution of a large-scale WLAN monitoring system", IEEE Transactions on Mobile Computing, 13(1):216-229, January, 2014. DOI 10.1109/TMC.2012.237.
- Sergey Bratus, "Hacker Curriculum: How Hackers Learn Networking", IEEE Distributed Systems Online, vol. 8, no. 10, October, 2007
- Sergey Bratus and Christopher Masone, "Hacker Curriculum: How We Can Use It in Teaching", IEEE Distributed Systems Online, vol. 8, no. November 2007
- Sean Smith and Ross Koppel, "Healthcare information technology’s relativity problems: a typology of how patients’ physical reality, clinicians’ mental models, and healthcare information technology differ", Journal of the American Medical Informatics Association.2013 doi:10.1136/amiajnl-2012-001419
- Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius and David Kotz, "Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth", Mobile Networks and Applications The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing© Springer Science+Business Media New York 201310.1007/s11036-013-0447-x
- Gavin Barnard, Grant Henderson, Sriram Srinivasan and Tillman Gerngross, "High level recombinant protein expression in Ralstonia eutropha using T7 RNA polymerase based amplication", Protein Expression and Purification, December 2004, 38(2): 264-271
- Brian Levine and Clay Shields, "Hordes: A Protocol for Anonymous Communication Over the Internet", ACM Journal of Computer Security. Volume 10, Issue 3, 2002. pages 213-240
- S Lyu and H Farid, "How Realistic is Photorealistic", IEEE Transactions on Signal Processing, 53(2):845-850, 2005
- David Kotz and Minkyong Kim, "Identifying Unusual Days", Journal of Computing Science and Engineering (JCSE), Vol 5, No. 1, pages 71-84, March 2011, DOI 10.5626/JCSE.2011.5.1.071
Copyright 2011 Korean Institute of Information Scientists and Engineers
- M. Eric Johnson and Ajit Appari, "Information Security Risk and Privacy in Healthcare: Current State of Research", International Journal of Internet and Enterprise Management, 6(4), pp. 279-314, 2010.
- Guofei Jiang, "Inside the IIS Extended Unicode Vulnerability", SANS Windows Security Digest, 2001, 4(10)
- Massimiliano Pala, Shreyas Cholia, Scott Rea and Sean Smith, "Interoperable PKI Data Distribution in Computational Grids", International Journal of Grid and High Performance Computing (IJGHPC), IGI Publishing, 1(2): 56-73, 2009.
- John Marchesini, Sean Smith and Meiyuan Zhao, "Keyjacking: the Surprising Insecurity of Client-side SSL", Computers and Security, 2005, 24(2): 109-123
- M. Fiddy and Markus Testorf, "k-Space design methods for optical and imaging ", SPIE Proc. Vol. 6316, pp. 63160H (2006)
- Peter Corke, Ron Peterson and Daniela Rus, "Localization and Navigation Assisted by Networked Cooperating Sensors and Robots", The International Journal of Robotics Research, Vol. 24, No. 9, September 2005, pages 771-786
- Sean Smith, "Magic Boxes and Boots: Security in Hardware", IEEE Computer, October 2004, 37(10): 106-109
- Yong Sheng, Guanling Chen, Hongda Yin, Keren Tan, Udayan Deshpande, Bennet Vance, David Kotz, Andrew Campbell, Chris McDonald, Tristan Henderson and Joshua Wright, "MAP: A scalable monitoring system for dependable 802.11 wireless networks", IEEE Wireless Communications, Vol 15, No 5, p 10-18, October 2008
- Ajit Appari, M. Eric Johnson and Denise Anthony, "Meaningful Use of Electronic Health Record Systems and Process Quality of Care: Evidence from a Panel Data Analysis of U.S. Acute-Care Hospitals", Health Services Research DOI: 10.1111/j.1475-6773.2012.01448.x
- Dennis McGrath, "Measuring the 4:11 Effect: The power failure and the Internet", IEEE Security & Privacy, 1(5):16-18, September/October 2003
- Ajit Appari, Emily Carian, M. Eric Johnson and Denise Anthony, "Medication administration quality and health information technology: a national study of US hospitals", J Am Med Inform Assoc 2012;19:360-367 doi:10.1136/amiajnl-2011-000289
- J. Lienemann, A. Greiner, J.G. Korvink, Xiaorong Xiong, Yael Hanein and Karl F. Bohringer, "Modelling, Simulation and Experimentation of a Promising New Packaging Technology - Parallel Fluidic Self-Assembly of Micro Devices", Sensors Update, 2003. 13(1): p. 3-43
- David Nicol and Michael Liljenstam, "Models and Analysis of Active Worm Defense", MMM-ACNS 2005, LNCS 3685, pp. 38-53, 2005
- Guofei Jiang, "Multiple Vulnerabilities in SNMP", IEEE Security and Privacy (Supplement to IEEE Computer), 2002, 35(4), 2-4
- Qun Li and Daniela Rus, "Navigation Protocols in Sensor Networks", ACM Transactions on Sensor Networks, Vol. 1, No. 1, August 2005, Pages 1-33
- Denise Anthony, Timothy Stablein and Joseph Hall, "Negotiating Stigma in Health Care: Disclosure and the Role of Electronic Health Records", Health Sociology Review DOI:10.1080/14461242.2015.1078218
- Mark Stanovich, "Network-Centric Emergency Response: Training for a New Command and Control Paradigm", Journal of Emergency Management, ISSN: 1543-5865, Vol 4, Number 2, March/April 2006, pages 57-64
- Sean Smith, "Outbound Authentication for Programmable Secure Coprocessors", International Journal of Information Security, 3(1): 28-41, October 2004
- Jiandong Fang and Karl F. Bohringer, "Parallel micro component-to-substrate assembly with controlled poses and high surface coverage", IOP Journal of Micromechanics and Microengineering (JMM) 16:721-730, 2006
- Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Daniela Rus and Mike Sinclair, "Power Delivery and Locomotion of Untethered Micro-Actuators", Journal of Microelectromechanical Systems, 2003,10(6):947-959
- Sean Smith and D Safford, "Practical Server Privacy Using Secure Coprocessors", IBM Systems Journal, 2001, 40(3): 683-695
- Denise Anthony, David Kotz and Tristan Henderson, "Privacy in Location-Aware Computing Environments", Pervasive Computing, Vol. 6, No. 4, October-December 2007, pp. 64-72
- Sasikanth Avancha, Amit Baxi and David Kotz, "Privacy in mobile technology for personal healthcare", ACM Computing Surveys, Vol. 45, No. 1. March 2013, Copyright ACM 2013
- Joseph Cooley and Sean Smith, "Privacy-preserving screen capture: Towards closing the loop for health IT usability", Journal of Biomedical Informatics.
46 (4): 721--733. August 2013.
- Sean Smith, "Probing End-User IT Security Practices - Through Homework", The EDUCAUASE Quarterly, November 2004, 27(4): 68-71
- George Cybenko and Vincent Berk, "Process Query Systems", IEEE Computer, January 2007, Volume 40, Issue 1, pp. 62-70.
- M. Eric Johnson, "Put People Before Process", CIO Magazine, April 1, 2007, p. 28-29
- Cory Cornelius and David Kotz, "Recognizing whether sensors are on the same body", Journal of Pervasive and Mobile Computing, Volume 8, Issue 6, Pages 822–836, http://dx.doi.org/10.1016/j.pmcj.2012.06.005
- Denise Anthony, Sean Smith and Tim Williamson, "Reputation and Reliability in Collective Goods: The Case of the Online Encyclopedia Wikipedia", Rationality and Society, Vol. 21, No. 3, 283-306 (2009).
- Bo Yan, Guanling Chen, Jie Wang and Hongda Yin, "Robust Detection of Unauthorized Wireless Access Points", ACM/Springer Mobile Networks and Applications (MONET), 14(4):508-522, August 2009
- A Perrig, Sean Smith, D Song and J Tygar, "SAM: A Flexible and Secure Auction Architecture using Trusted Hardware", eJETA.org, January 2002, 1(1)
- K Minami and David Kotz, "Secure Context-sensitive Authorization", Journal of Pervasive and Mobile Computing, 1(1): 123-156, March 2005
- Denise Anthony, Andrew Campbell, Thomas Candon, Andrew Gettinger, Carl Gunter, M. Eric Johnson, David Kotz, Lisa Marsch, Andres Molina-Markham, Karen Page and Sean Smith, "Securing Information Technology in Healthcare", IEEE Security & Privacy, 11(6):25-33, Nov/Dec, 2013. Invited paper. DOI 10.1109/MSP.2013.104
- George Cybenko, "Security Alchemy", IEEE Security and Privacy, Vol. 2, No. 6, p. 5, 2004
- Sean Smith, "Security and Cognitive Bias: Exploring the Role of the Mind", IEEE Security and Privacy.
Vol: 10
Issue: 5:
September/October 2012.
pages: 75—78
doi: 10.1109/MSP.2012.126
- David Kotz, Kevin Fu, Carl Gunter and Avi Rubin, "Security for Mobile and Cloud Frontiers in Healthcare", Communications of the ACM, Vol. 58 No. 8, Pages 21-23
10.1145/2790830
- Juhee Kwon and M. Eric Johnson, "Security practices and regulatory compliance in the healthcare industry", J Am Med Inform Assoc 2013;20:44-51 doi:10.1136/amiajnl-2012-000906
- S Lyu and H Farid, "Steganalysis Using Higher-Order Image Statistics", IEEE Transactions on Information Forensics and Security, March 2006, 1(1):111-119
- Celeste Campos-Castillo and Denise Anthony, "The double-edged sword of electronic health records: implications for patient disclosure", J Am Med Inform Assoc doi:10.1136/amiajnl-2014-002804
- Michael Locasto and Angelos Stavrou, "The Hidden Difficulties of Watching and Rebuilding Networks", IEEE Security and Privacy, vol. 6, no. 2, pp. 79-82, Mar/Apr, 2008
- Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson and Daniela Rus, "The Kerf toolkit for intrusion analysis", IAnewsletter, Summer 2005, 8(2): 12-16
- Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus and Brett Tofel, "The Kerf toolkit for intrusion analysis", IEEE Security and Privacy, November/December 2004, 2(6): 42-52
- Matthew Wright, Micah Adler, Brian Levine and Clay Shields, "The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems", ACM Transactions on Information and System Security (TISSEC), 4(7): 489-522, November 2004
- Andrew Campbell, Nicholas Lane, Emiliano Miluzzo, Ron Peterson, Hong Lu, Xiao Zheng, Mirco Musolesi, Kristof Fodor, Shane B. Eisenman and Gahng-Seop Ahn, "The Rise of People-Centric Sensing", IEEE Internet Computing: Mesh Networking, pp. 30-39, July/August 2008.
- Valentino Crespi, George Cybenko and Guofei Jiang, "The theory of trackability with applications to sensor networks", ACM Transactions on Sensor Networks, May 2008, Volume 4, Number 3, pp. 1-42
- Valentino Crespi, George Cybenko and Guofei Jiang, "The Theory of Trackability with Applications to Sensor Networks", ACM Transaction on Sensor Networks, July 2006. This revision: July 2007
- S Sinclair and Sean Smith, "The TIPPI Point: Towards Trustworthy Interfaces", IEEE Security and Privacy, July/August 2005, 3(4): 68:71
- Andrew Gettinger and A. Csatari, "Transitioning from a legacy EHR to a commercial, vendor-supplied EHR", Applied Clinical Informatics, Vol. 3: Issue 4 2012, pages 367-376,
- Eileen Ye, Sean Smith and Denise Anthony, "Trusted Paths for Browsers", ACM Transactions on Information System Security, 2005, 8(2): 153-186
- Sean Smith, "Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering", IEEE Security and Privacy. 3 (2): 66-69, March/April 2005
- M. Eric Johnson and Nicholas Willey, "Usability Failures and Healthcare Data Hemorrhages", IEEE Security and Privacy, Vol. 9, No. 2, 35-42.
- Anna Shubina and Sean Smith, "Using caching for browsing anonymity", ACM SIGecom Exchanges, Vol. 4, No. 2, September 2003, pages 11-20
- Stephen Linder, Suzanne Wendelken, Edward Wei and Susan McGrath, "Using the Morphology of Photoplethysmogram Peaks to Detect Changes in Posture", Journal of Clinical Monitoring and Computing (2006), 20:151-158
- Jiandong Fang and Karl F. Bohringer, "Wafer-Level Packaging Based on Uniquely Orienting Self-Assembly (The DUO-SPASS Processes)", Journal of Microelectromechanical Systems, Vol. 15, No. 3, June 2006
- Sean Smith, "WebALPS: A Survey of E-Commerce Privacy and Security Applications", ACM SIGecom Exchanges, September 2001, 2(3): 29-36
- S Sinclair and Sean Smith, "What's Wrong with Access Control in the Real World?", IEEE Security and Privacy, vol. 8, no. 4, pp. 74-77, July/Aug. 2010, doi:10.1109/MSP.2010.139.
Book
Book (Chapter)
- Zhengyi Le, Yi Ouyang, James Ford and Fillia Makedon, "A Hierarchical Key-Insulated Signature Scheme in The CA Trust Model", Lecture Notes in Computer Science, Volume 3225, January 2004, pages 280-291
- Mark Franklin, Kevin Mitcham, Sean Smith and O Wild, "CA-in-a-Box", Lecture notes in Compter Science, Volume 3545, November 2005, pages 180-190
- George Cybenko, Paul Thompson and Annarita Giani, "Cognitive Hacking", In Zelkowitz, Marvin (ed.) Advances in Computers, Academic Press, 2004
- Paul Thompson, George Cybenko and Annarita Giani, "Cognitive Hacking and the Economics of Misinformation", The Economics of Information Security, Springer, 2004, pp. 255-287
- H Farid, "Digital Doctoring: can we trust photographs? ", In Deception: Methods, Motives, Contexts and Consequences, 2007
- Gabriel Vanrenen and Sean Smith, "Distributing Security-Mediated PKI", Lecture Notes in Computer Science, Volume 3093, January 2004, pages 218-231
- Yasir Ali and Sean Smith, "Flexible and Scalable Public Key Security for SSH", Lecture Notes in Computer Science, Volume 3093, January 2004, pages 43-56
- S Sinclair, Sean Smith and Stephanie Trudeau, "Information Risk in Financial Institutions: Field Study and Research Roadmap", Republished in Springer Lecture Notes in Business Information Processing Series, Volume 4, 165-180, 2008. (FinanceCom 2007), Dec. 8, Montreal Canada
- Denise Anthony, James Kitts, Christopher Masone and Sean Smith, "Internet Exchange and Forms of Trust", 257-269 pp. in Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives.Editor(s): Dominika Latusek and Alexandra Gerbasi. 2010.
- A Iliev and Sean Smith, "Prototyping an Armored Data Vault", Lecture Notes in Computer Science, Volume 2482, January 2003, pages 144-159
- Cory Cornelius and David Kotz, "Recognizing whether sensors are on the same body", Pervasive 2011, LNCS 6696, pp. 332-349, 2011, Springer-Verlag
- S Chari, P Kermani, Sean Smith and L Tassiulas, "Security Issues in M-Commerce: A Usage-Based Taxonomy", Lecture Notes in Computer Science, Volume 2033, January 2001, pages 264-283
- Sergey Bratus, Joshua Brody, David Kotz and Anna Shubina, "Streaming Estimation of Information-theoretic Metrics for Anomaly Detection (Extended Abstract)", Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008, Vol 5230, pages 412-414, Springer-Verlag.
- Denise Anthony, Tristan Henderson and James Kitts, "Trust and Privacy in Distributed Work Groups", 16-23 pp. in Social Computing, Behavioral Modeling and Prediction. Editor(s): Huan Liu, John J. Salerno, Michael J. Young. New Yprk: Springer. 2009.
- Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Daniela Rus and Mike Sinclair, "Untethered Micro-Actuators for Autonomous Micro-robot Locomotion: Design, Fabrication, Control, and Performance", Springer Tracts in Advanced Robotics, Volume 15, August 2005, pages 502-516
- Kwong H. Yung, "Using Feedback to Improve Masquerade Detection", ACNS 2003, LNCS 2846, pp. 48-62, 2003
In Proceedings (Conference)
- Jintae Kim, Steven Ko, David Nicol, XenoFontas Dimitropoulos and George Riley, "A BGP Attack Against Traffic Engineering", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2005, 319-326
- Sergey Bratus, Cory Cornelius, David Kotz and Daniel Peebles, "Active behavioral fingerprinting of wireless devices ", Proceedings of the First ACM Conference on Wireless Network Security (WiSec), Alexandria, VA, March 31-April 2, 2008
- Janani Sriram, Minho Shin, Tanzeem Choudhury and David Kotz, "Activity-aware ECG-based patient authentication for remote health monitoring", Proceedings of the International Conference on Multimodal Interfaces and Workshop on Machine Learning for Multi-modal Interaction (ICMI-MLMI), Cambridge, MA, November 2-4, 2009.
- S Lyu, D Rockmore and H Farid, "A Digital Technique for Art Authentication", Proceedings of the National Academy of Sciences, 101(49):17006-17010, 2004
- Scott Dynes and M. Eric Johnson, "A Field Study of Extended Enterprise Security", Proceedings of the CABIT 3rd Annual Security Symposium, Tempe, AZ, 8-9 September 2005
- Meiyuan Zhao, Sean Smith and David Nicol, "Aggregated Path Authentication for Efficient BGP Security", Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, 7-11 November 2005, 128-138
- Alexy Khrabrov and George Cybenko, "A Language of Life: Characterizing People using Cell Phone Tracks", IEEE Social Computing Conference, Vancouver, B.C., August 28-September 1, 2009
- Suzanne Wendelken, Susan McGrath and George Blike, "A Medical Assessment Algorithm for Automated Remote Triage", Proceedings of the 25th Annual International Conference of the IEEE and Engineering in Medicine and Biology Society, Cancun, Mexico, September 2003
- Matthew Wright, Micah Adler, Brian Levine and Clay Shields, "An Analysis of the Degradation of Anonymous Protocols", Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, 6-8 February 2002, 38-50
- Michael Locasto and S Sinclair, "An Experience Report on Undergraduate Cyber-Security Education and Outreach", Proceedings of the Second Annual Conference on Education in Information Security (ACEIS), Ames, Iowa, February 19-20, 2009.
- Katherine Farmer, Susan McGrath and George Blike, "An Experimental Architecture for Observation of Triage Related Decision Making", IEEE Engineering in Medicine and Biology Annual Conference, Lyon, France, August, 2007
- Yong Sheng, Douglas Madory and George Cybenko, "An Experimental Comparison of Hypothesis Management Approaches for Process Query Systems", Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, March 2005
- Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Daniel Peebles and David Kotz, "AnonySense: Opportunistic and Privacy-Preserving Context Collection", Proceedings of the 6th International Conference on Pervasive Computing, Sydney, Australia, May 19-22, 2008
- Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin and Nikos Triandopoulos, "AnonySense: Privacy-Aware People-Centric Sensing", Proceeding of the 6th ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MOBISYS '08), Breckenridge, Colorado, June 17-20, 2008
- Felipe Perrone, Maurice Aburdene and Xiannong Meng, "Approaches to Undergraduate Instruction in Computer Security", Proceedings of the 2005 American Association for Engineering Education Conference and Exposition, Portland, Oregon, 12-15 June, 2005
- Suzanne Wendelken, Stephen Linder and Susan McGrath, "A preliminary study of respiratory variations in the photoplethysmogram during lower body negative pressure", Proceeding of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), Salt Lake City, UT, 22-23 June 2006
- Fillia Makedon, G Pantziou, M Conalis-Kontos and C Sudborough, "A Safe Information Sharing Framework for E-Government Communication", Proceedings of the Electronic Democracy: Information Society and Citizens Rights, Athens, Greece, September 2003
- Kimaya Sanzgiri, Bridget Dahill, Brian Levine, Clay Shields and Elizabeth Belding-Royer, "A Secure Routing Protocol for Ad hoc Networks", Proceedings of IEEE International Conference on Network Protocols (ICNP), pages 78-89, November 2002
- Fillia Makedon, Song Ye, Tilmann Steinberg, Yan Zhao, Z Xiao and B Sudborough, "A Security Incident Sharing and Classification System for Building Trust in Cross Media Enterprises", CMSD-2003, International Conference on Cross-Media Service Delivery, Greece, May 2003
- Dennis McGrath, Amy Hunt and Marion Bates, "A Simple Distributed Simulation Architecture for Emergency Response Exercises", Proceedings of the 9th IEEE International Symposium on Distributed Simulation and Real-time Applications (DS-RT 2005), Montreal, Canada, 10-12 October 2005, 221-227
- Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Igor Paprotny and Daniela Rus, "A Steerable, Untethered, 250 x 60 micrometer MEMS Mobile Micro-Robot", Proceedings of 12th International Symposium of Robotics Research (ISRR), San Francisco, CA, 12-15 October 2005
- Josh Pyke, Michael Hart, Veljko Popov, Robert Harris and Susan McGrath, "A Tele-ultrasound System for Real-time Medical Imaging in Resource-limited Settings", IEEE Engineering in Medicine and Biology Annual Conference, Lyon, France, August, 2007
- Apu Kapadia, Patrick P. Tsang and Sean Smith, "Attribute-Based Publishing with Hidden Credentials and Hidden Policies", Proceedings of the 14th Annual Network & Distributed System Security Symposium, San Diego, CA, February 28-March 2, 2007
- L.R. Ray, "Autonomous Terrain Parameter Estimation for Wheeled Vehicles", Proceedings of the SPIE Defense and Security, Intelligent and Unmanned Systems Conference, Orlando, Florida, March 2008.
- Cory Cornelius, Ron Peterson, Joseph Skinner, Ryan Halter and David Kotz, "A wearable system that knows who wears it", Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys) pages 55-67, June, 2014. DOI 10.1145/2594368.2594369.
- Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean Smith, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs", Proceeding of the 14th ACM Conference on Computer and Communication Security (CCS '07), Alexandria, VA, October 29-November 2, 2007
- H Farid and A Popescu, "Blind Removal of Image Non-Linearities", Proceedings of the 8th International Conference on Computer Vision (ICCV), Vancouver, Canada, 9-12 July 2001
- Emiliano Miluzzo, Nicholas Lane, Andrew Campbell and Reza Olfati-Saber, "CaliBree: a Self-Calibration System for Mobile Sensor Networks", Proceedings of the International Conference on Distributed Computing in Sensor Networks (DCOSS 2008), Santorini Island, Greece, June 11-14, 2008
- Paul Thompson, "Categorization: Information and Misinformation", ASIS&T 2001: Information in a Networked World: Harnessing the Flow Washington, D.C., 2-8 November 2001
- Andrew Campbell, Shane B. Eisenman, Kristof Fodor, Nicholas Lane, Hong Lu, Emiliano Miluzzo, Mirco Musolesi, Ron Peterson and Xiao Zheng, "CenceMe: Injecting Sensing Presence into Social Network Applications using Mobile Phones (Demo Abstract)", Proceedings of the Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), Hong Kong, May 27-30, 2008
- Cliff Changchun Zou, Weibo Gong and Don Towsley, "Code Red Worm Propagation Modeling and Analysis", Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS 02), Washington, DC, 18-22 November 2002
- Paul Thompson, "Cognitive Hacking and Digital Government: Digital Identity", Proceedings of the International Conference on Politics and Information Systems: Technologies and Applications, Orlando, FL, 2 August, 2003
- Paul Thompson, "Cognitive Hacking and Intelligence and Security Informatics", Proceedings of the Defense and Security Symposium (SPIE 2004), Orlando, Florida, April 12-16, 2004
- George Cybenko, Annarita Giani, Carey Heckman and Paul Thompson, "Cognitive Hacking: Technological and Legal Issues", Law Tech 2002, 7-9 November, 2002
- Song Ye, Fillia Makedon and James Ford, "Collaborative Automated Trust Negotiation in Peer-to-Peer Systems ", Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich, Switzerland, 25-27 August 2004, 108-115
- Patrick P. Tsang and Sean Smith, "Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers", Proceedings of the 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, 21-23 April 2008
- Michael Liljenstam and David Nicol, "Comparing Passive and Active Worm Defenses", Proceedings of the Conference on Quantitative Evaluation of Systems (QEST 04), Enschede, Netherlands, 27-30 September 2004, 18-27
- Anne Loomis and Devin Balkcom, "Computation reuse for rigid-body dynamics", Proceedings of the 2006 International Conference on Intelligent Robots and Systems, Beijing, China, October 9-15, 2006
- Zack Butler and Daniela Rus, "Controlling Mobile Sensors for Monitoring Events with Coverage Constraints", Proceedings of IEEE International Conference on Robotics and Automation, New Orleans, April 2004, 1568-1573
- L.R. Ray, Devin Brande, John Murphy and James Joslin, "Cooperative Control of Autonomous Mobile Robots in Unknown Terrain", Proceedings of the 2006 ASME International Mechanical Engineering Conference and Exposition, Chicago, Illinois, November 5-10 2006
- Nicholas Lane, Hong Lu, Shane B. Eisenman and Andrew Campbell, "Cooperative Techniques Supporting Sensor-based People-centric Inferencing", in Proceedings of Sixth Conf. on Pervasive Computing, Sydney, Australia, May 19-22, 2008
- Udayan Deshpande, Chris McDonald and David Kotz, "Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring", Proceedings of the Fifteenth IEEE International Conference on Networks (ICON), Adelaide, South Australia, November 19-21, 2007
- Emiliano Miluzzo, Cory Cornelius, Ashwin Ramaswany, Tanzeem Choudhury, Zhigang Liu and Andrew Campbell, "Darwin Phones: The Evolution of Sensing and Inference on Mobile Phones", in Proc. of Eighth International ACM Conference on Mobile Systems, Applications, and Services (MobiSys '10), San Francisco, CA, USA, June 15-18, 2010.
- Annarita Giani, Vincent Berk and George Cybenko, "Data Exfiltration and Covert Channels", Proceedings of the SPIE Vol. 6201, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV Orlando, Florida, April 2006
- Minho Shin, Patrick P. Tsang, David Kotz and Cory Cornelius, "DEAMON: Energy-efficient sensor monitoring", Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks(SECON), Roma, Italy, June 22-26, 2009.
- Andrew Campbell, Shane B. Eisenman, Kristof Fodor, Nicholas Lane, Hong Lu, Emiliano Miluzzo, Mirco Musolesi, Ron Peterson and Xiao Zheng, "Demo Abstract: Transforming the Social Networking Experience with Sensing Presence from Mobile Phones", Proceedings of the 6th ACM International Conference on Embedded Networked Sensor Systems(SENSYS '08), Raleigh, NC, November 5-7, 2008.
- Jonathan L. Bredin, Erik D. Demaine and MohammadTaghi Hajiaghayi, "Deploying Sensor Networks with Guaranteed Capacity and Fault Tolerance", Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), Urbana-Champaign, IL, 25-28 May 2005
- Guanling Chen, Ming Li and David Kotz, "Design and implementation of a large-scale context fusion network", Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous), Boston, MA, 22-26 August 2004, 246-255
- Anna Shubina and Sean Smith, "Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System", Proceedings of the 2nd Annual Conference on Privacy, Security and Trust, New Brunswick, Canada, 13-15 October 2004, 29-39
- Yong Sheng, Keren Tan, Guanling Chen, David Kotz and Andrew Campbell, "Detecting 802.11 MAC layer spoofing using received signal strength", Proceeding of the 27th Conference on Computer Communications, IEEE InfoCom 2008, Phoenix, Arizona, April 13-18, 2008
- Stephen Linder, Suzanne Wendelken and Jeffrey Clayman, "Detecting Exercise Induced Stress using the Photoplethysmogram", Proceeding of the IEEE International Conference of the Engineering in Medicine and Biology Society, New York, NY, 30 August 2006
- H Farid, "Detecting Hidden Messages Using Higher-Order Statistical Models", International Conference on Image Processing, Rochester, NY, 2002
- Kwong H. Yung, "Detecting Long Connection Chains of Interactive Terminal Sessions", Proceedings of the 5th International Symposium Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, October 16-18 2002
- Weihong Wang and H Farid, "Detecting Re-Projected Video", Proceedings of the 10th International Workshop on Information Hiding, Santa Barbara, CA, May 19-21, 2008
- Paul Seligman and Sean Smith, "Detecting Unauthorized Use in Online Journal Archives: A Case Study", Proceeding of the IADIS International Conference on WWW/Internet, Madrid, Spain, 6-9 October 2004
- Ian Gregorio - de Souza, Vincent Berk, Annarita Giani, George Bakos, Marion Bates, George Cybenko and Douglas Madory, "Detection of Complex Cyber Attacks ", Proceedings of the SPIE Defense and Security Symposium, Vol. 6201, Orlando, FL, April 2006
- Vijay Bhuse, Ajay Gupta and Ala Al-Fuqaha, "Detection of Masquerade Attacks for Wireless Sensor Networks", Proceedings of the IEEE International Conference of Communications, Glasgow, Scotland, June 2007
- K Kain, Sean Smith and R Asokan, "Digital Signatures and Electronic Documents: A Cautionary Tale", IFIP Conference on Communications and Multimedia Security. September 2002. Advanced Communications and Multimedia Security. Kluwer Academic Publishers. pp. 293-307. September 2002
- David Nicol, "Discrete Event Fluid Modeling of TCP", Proceedings of the 2001 Winter Simulation Conference, Arlington, VA, 9-12 December 2001
- Yong Sheng and George Cybenko, "Distance Measure for Non-Parametric Weak Process Models", Proceedings of IEEE International Conference on Systems, Man and Cybernetic, Big Island, Hawaii, October 2005, pp.722-727
- Glenn Nofsinger and George Cybenko, "Distributed Chemical Plume Process Detection: Milcom 2005 1644", Proceedings of the Military Communications Conference (MILCOM 2005), Atlantic City, NJ, 17-20 October 2005, 1-7
- Wayne Chung, Valentino Crespi, George Cybenko and Alex Jordan, "Distributed Sensing and UAV Scheduling for Surveillance and Tracking of Unidentifiable Targets", Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, 28 March - 1 April 2005
- Celeste Campos-Castillo and Denise Anthony, "Do Health Care Users Think Electronic Health Records Are Important for Themselves and Their Providers? ", IEEE International Conference on Healthcare Informatics (ICHI) Philadelphia, PA
- Guofei Jiang, Wayne Chung and George Cybenko, "Dynamic Integration of Distributed Semantic Services", Proceedings of the KIMAS Conference 2003, Boston, MA, 1-3 October 2003
- George Bakos and Vincent Berk, "Early Detection of Internet Worm Activity by Metering ICMP Destination Unreachable Activity", Proceeding of SPIE Conference on Sensors, and Command, Control, Communications and Intelligence, Orlando, FL, April 2002
- Fillia Makedon, Carey Heckman, A Meer, Tilmann Steinberg, L Wang, Song Ye and Yan Zhao, "Ecomrisk.org, An E-Commerce Security Resource", Proceedings of the Computer Science and Information Technologies (CSIT), Patras, Greece, September 2002
- Roberto Tamassia and Nikos Triandopoulos, "Efficient Content Authentication in Peer-to-peer Networks", Proceedings of the International Conference on Applied Cryptography and Network Security, LNCS, Vol 4521, Springer-Verlag, pp 354-372, Zhuhai, China, June 2007
- Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford and Fillia Makedon, "Entrapping Adversaries for Source Protection in Sensor Networks", Proceedings of the 7th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), Niagara-Falls, Buffalo-NY, 26-29 June 2006
- Jeffrey Farris and David Nicol, "Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable Scada Systems", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December, 2005, 300-308
- David Kotz, Calvin Newport, Robert Gray, Jason Liu, Yougu Yuan and Chip Elliott, "Experimental Evaluation of Wireless Simulation Assumptions", Proceedings of the ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Venice, Italy, 4-6 October 2004
- Shrirang Mare, David Kotz and Anurag Kumar, "Experimental Validation of Analytical Performance Models for IEEE 802.11 Networks", In Proceedings of the Workshop on WIreless Systems: Advanced Research and Development (WISARD 2010), pages 1-8, January, 2010. IEEE Computer Society Press
- Keith Kotay, Ron Peterson and Daniela Rus, "Experiments with Robot and Sensor Networks for Mapping and Navigation", Proceedings of the International Conference on Field and Service Robotics, Port Douglas Australia, 29-31 July 2005
- Sean Smith, Christopher Masone and S Sinclair, "Expressing Trust in Distributed Systems: the Mismatch Between Tools and Reality", Proceedings of the 42 Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2004
- Christopher James Langmead and Bruce R. Donald, "Extracting Structutural Information Using Time-Frequency Analysis of Protein NMR Data", Proceedings of the 5th Annual International Conference on Computational Molecular Biology (RECOMB), Montreal, 22-25 April 2001
- Emiliano Miluzzo, Tianyu Wang and Andrew Campbell, "EyePhone: Activating Mobile Phones with Your Eyes", Proceedings of The Second ACM SIGCOMM Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld'10), New Delhi, India, August 30, 2010
- A Iliev and Sean Smith, "Faerieplay on Tiny Trusted Third Parties ", The 2nd Workshop on Advances in Trusted Computing (WATC '06), Tokyo, Japan, November 30 - December 1, 2006
- Sankalp Singh, James Lyons and David Nicol, "Fast Model-Based Penetration Testing", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2005, 309-317
- Paul Thompson, "From Probabilistic Information Retrieval to Question Answering in the InfoSphere", National Energy Research Scientific Computing Center seminar series Lawrence Berkeley National Laboratory University of California, Berkeley, 15 May 2002
- Gahng-Seop Ahn, Emiliano Miluzzo, Andrew Campbell, Se Gi Hong and Francesca Cuomo, "Funneling-MAC: A Localized, Sink Oriented MAC For Boosting Fidelity in Sensor Networks", In Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), pages 293-306, Boulder, Colorado, November 2006
- Sheng-Hsiung Liang, Xiaorong Xiong and Karl F. Bohringer, "Geometric Binding Site Design for Surface-Tension Driven Self-Assembly", Proceedings of the IEEE International Conference on Robotics and Automation (ICRA). New Orleans, LA, 2004
- Qun Li and Daniela Rus, "Global Clock Synchronization in Sensor Networks", Proceedings of the IEEE Infocom, Hong Kong, 7-11 March 2004
- Apu Kapadia and Nikos Triandopoulos, "Halo: High-Assurance Locate for Distributed Hash Tables", Proceedings of the 15th Annual Network & Distributed System Security Symposium (NDSS), San Diego CA, February 10-13, 2008
- Shane B. Eisenman, Hong Lu and Andrew Campbell, "Halo: Managing Node Rendezvous in Opportunistic Sensor Networks", To appear in Proc. of 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10), Santa Barbara, California, USA, June 21-23, 2010
- M. Eric Johnson and Nicholas Willey, "Healthcare Data Hemorrhages: Inadvertent Disclosure and HITECH", Proceedings from the IEEE Symposium on Security and Privacy, Oakland, California, May 16- 19, 2010.
- Juhee Kwon and M. Eric Johnson, "Healthcare Security Strategies for Regulatory Compliance and Data Security", The Hawaii International Conference on System Sciences (HICSS)
- Fillia Makedon, Vangelis Karkaletsis, Georgios Giannakopoulos, Illias Maglogiannis, James Ford and George Vassilakopoulos, "Health Grid Cyberinfrastructure: Computational Perspectives", Proceedings of the 4th ICICTH International Conference on Information Communication Technologies in Health, Samos Island, Greece, 13-15 July 2006
- Ajit Appari, M. Eric Johnson and Denise Anthony, "Health Information Technology and Hospital Performance on Imaging-Use Measures - The Best Abstract in the Health Information Technology Award Winner", AcademyHealth's Annual Research Meeting, Baltimore, MD USA
- Ajit Appari, Denise Anthony and M. Eric Johnson, "HIPAA Compliance: An Institutional Theory Perspective", in Proceedings of the 15th Americas Conference on Information Systems, San Francisco, CA, August 6-9, 2009.
- Ajit Appari, M. Eric Johnson and Denise Anthony, "HIPAA compliance in home health: a neo-institutional theoretic perspective", Proceeding of Security and Privacy in Medical and Home-Care Systems, Chicago, IL, Nov 15, 2009
- Dennis McGrath, Doug Hill and Amy Hunt, "IC2020: Embedded Simulation for Next Generation Incident Command Software", Proceedings of the 2006 Huntsville Simulation Conference, Huntsville, AL, 18-19 October 2006
- Wayne Chung, Robert Savell, Jan-Peter Schutt and George Cybenko, "Identifying and Tracking Dynamic Processes in Social Networks", Proceedings of the SPIE Vol. 6201, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV Orlando, Florida, April 2006
- Ajit Appari, Denise Anthony and M. Eric Johnson, "Impact of Health Information Technology Portfolio on Hospital Quality: A National Study of U.S. Acute Care Facilities", AcademyHealth's Annual Research Meeting (ARM). June 26-28, 2010. Boston, MA.
- Vincent Berk, George Cybenko and Christopher Roblee, "Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems", Proceedings of the IEEE Autonomic Computing Conference, Seattle, WA, June 2005
- M Lindemann and Sean Smith, "Improving DES Coprocessor Throughput for Short Operations", Proceedings of the 10th USENIX Security Symposium, Washington, DC, 13-17 August 2001
- S Lyu, "Infomax Boosting", Proceedings of the IEEE Computer Society International Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, 20-25 June 2005
- Juhee Kwon and M. Eric Johnson, "Information Security management configurations in the healthcare industry", The American Conference on Information Systems (AMCIS), Seattle, WA
- Guofei Jiang, George Cybenko and Dennis McGrath, "Infrastructure web: distributed monitoring and managing critical infrastructures", Proceeding of SPIE Conference on Enabling Technologies for Law Enforcement and Security, Boston, MA, November 2000
- Janelle Chang, Susan McGrath, George Blike, Suzanne Wendelken and Metin Akay, "Investigating Respiratory Variation in the Plethysmograph to Identify Obstructive Sleep Apnea", Proceedings of the Society for Technology in Anesthesia Conference, Miami, FL, January 2005
- Yi Ouyang, Zhengyi Le, James Ford and Fillia Makedon, "Local Data Protection for In-Network Processing in Sensor Networks", Proceedings of the IEEE International Conference on Pervasive Services (ICPS 2005), Santorini, Greece, 11-14 July 2005
- Ajit Appari, M. Eric Johnson and Denise Anthony, "Meaningful Use of EHR Systems and Hospital Quality", 13th Annual Healthcare Organizational Research Association Conference, Seattle, WA
- Ajit Appari, M. Eric Johnson and Denise Anthony, "Meaningful Use of EHR Systems and Patient Safety: A National Study of US Hospitals", (Poster Presentation) AcademyHealth Annual Research Meeting, Orlando, FL
- Ajit Appari, M. Eric Johnson and Denise Anthony, "Meaningful Use of EHR Systems and Process Quality of Care: Evidence from a Panel Data Analysis of US Acute-Care Hospitals", (Poster Presentation) AcademyHealth Annual Research Meeting, Orlando, FL
- Ajit Appari, Denise Anthony and M. Eric Johnson, "Medication Administration Quality and Health Information Technology: A National Study of US Hospitals", Second Workshop on Health IT and Economics, Washington DC
- Ajit Appari, Emily Carian, Denise Anthony and M. Eric Johnson, "Medication Quality and Health Information Technology", AcademyHealth Annual Research Meeting, Seattle, WA
- S Lyu, "Mercer Kernels for Object Recognition with Local Features", Proceedings of the International Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, 20-25 June 2005
- Fillia Makedon, James Ford, Li Shen, Tilmann Steinberg, Andrew Saykin, Heather Wishart and Sarantos Kapidakis, "MetaDL: A Digital Library of Metadata for Sensitive or Complex Research Data", European Conference on Digital Libraries (ECDL2002), Rome, Italy, September 2002
- Valentino Crespi and George Cybenko, "Metrics for Situational Awareness using Sensor Networks", Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, March 2005
- Shane B. Eisenman, Nicholas Lane, Emiliano Miluzzo, Ron Peterson, Gahng-Seop Ahn and Andrew Campbell, "MetroSense Project: People-Centric Sensing at Scale", Proceedings of the ACM SenSys Workshop on World-Sensor-Web (WSW 2006), Boulder, Colorado, October 31, 2006
- Gahng-Seop Ahn, Mirco Musolesi, Hong Lu, Reza Olfati-Saber and Andrew Campbell, "MetroTrack: Predictive Tracking of Mobile Events using Mobile Phones", To appear in Proc. of 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10), Santa Barbara, California, USA, June 21-23, 2010.
- J.H. Lever, L.R. Ray and A. Streeter, "Mobility and Power Budget for a Solar-Powered Polar Rover", Proceedings of the 10th European Conference of the International Society for Terrain-Vehicle Systems (ISTVS), Budapest, Hungary, 3 - 6 October, 2006
- Bo Yan and Guanling Chen, "Model-based Fault Diagnosis for IEEE 802.11 Wireless LANs", Proceedings of the Sixth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Toronto, Canada, July 2009.
- John Marchesini and Sean Smith, "Modeling Public Key Infrastructure in the Real World", Public Key Infrastructure: EurpoPKI 2005. Springer-Verlag LNCS, June 2005
- David Nicol and Michael Liljenstam, "Models of Active Worm Defenses", IPSI Conference, Studenica, Serbia, 3-6 June 2004
- Suzanne Wendelken, Susan McGrath, Stephen Linder and George Blike, "Monitoring respiration rate in PACU patients using the plethysmogram from a commercial pulse oximeter", Proceedings of the Society for Technology in Anesthesia Conference, Miami, FL, January 2005
- Zack Butler, "Motion-Constrained Mobile Sensor Networks", Proceedings of the International Conference on Advanced Robotics, 2005
- Fillia Makedon, Tilmann Steinberg, Laurence Rahme, Aria Tzika, Heather Wishart and Yuhang Wang, "Multi-Functional Data Collection Interfaces for Biomedical Research Collaboration", Human-Computer Interface International, Crete, Greece, June 2003
- Markus Testorf, "Nano-optics: Fitting a new emperor into old clothes", IEEE URIS/APS, Albuquerque, New Mexico, July 2006
- Markus Testorf, "Nanophotonics based matched spectroscopy", Proceeding of the Optical Society of Americas Annual Meeting - Frontiers in Optics 2006(OSA), Rochester, NY, 8-12 October 2006
- Benjamin Farmer and M. Eric Johnson, "NetHope-Collaborating for the Future of Relief and Development", Microsoft Corp., Seattle, May 8-9, 2007
- Dennis McGrath, Doug Hill, Amy Hunt, Mark Ryan and Timothy Smith, "NetSim: A Distributed Network Simulation to Support Cyber Exercises", Proceedings of the Huntsville Simulation Conference, Huntsville, AL, October 2004
- Sergey Bratus, Michael Locasto, Ashwin Ramaswany and Sean Smith, "New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)", Proceedings of the Future of Trust in Computing, Berlin, Germany, June 30-July 2, 2008.
- W Zheng, Sheng Zhang, Yi Ouyang, Fillia Makedon and James Ford, "Node Clustering Based on Link Delay in P2P Networks", Proceedings of the 20th Annual ACM Symposium on Applied Computing (SAC05-DSGC), Santa Fe, NM, 13-17 March 2005
- Michael Liljenstam and David Nicol, "On-Demand Computation of Policy Based Routes for Large-Scale Network Simulation", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2005, 217-223
- Fillia Makedon, Song Ye and Yan Zhao, "On the Design and Implementation of a Web-Based Negotiation System", Proceedings of the 9th Panhellenic Conference on Informatics (PCI 2003), Thessaloniki, Greece, November 2003
- Chrisil Arackaparambil, Sergey Bratus, Anna Shubina and David Kotz, "On the Reliability of Wireless Fingerprinting using Clock Skews", Proceedings of the Third ACM Conference on Wireless Network Security (WiSec’10), Hoboken, New Jersey, March 22–24, 2010.
- John Marchesini, Sean Smith, O Wild, J Stabiner and A Barsamian, "Open-Source Applications of TCPA Hardware", Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 04), Tuscson, AZ, 5-9 December 2005, 294-303
- Apu Kapadia, David Kotz and Nikos Triandopoulos, "Opportunistic Sensing: Security Challenges for the New Paradigm", Proceedings of the 1st International Conference on COMmunication Systems and NETworkS (COMNETS), Bangalore, India, January 2009.
- Sean Smith, "Outbound Authentication for Programmable Secure Coprocessors", Proceedings of the 7th European Symposium on Research in Computer Security, 2002
- Robert Gray, David Kotz, Calvin Newport, Nikita Dubrovsky, Aaron Fiske, Jason Liu, Christopher Masone, Susan McGrath and Yougu Yuan, "Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms", Proceeedings of the ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Venice, Italy, 4-6 October 2004
- Sergey Bratus, Alex Ferguson, Doug McIlroy and Sean Smith, "Pastures: Towards Usable Security Policy Engineering", Proceedings of the Second International Conference on Availability, Reliability and Security, IEEE Computer Society, pages 1052-1059, April 2007
- Andrew Campbell, Shane B. Eisenman, Nicholas Lane and Emiliano Miluzzo, "PeopleCentric Urban Sensing", Proceedings of the 2nd ACM/IEEE Annual International Wireless Internet Conference (WICON), Boston, MA, 2-5 August 2006
- J.H. Lever, A. Streeter and L.R. Ray, "Performance of a Solar-Powered Robot for Polar Instrument Networks", Proceedings of the 2006 IEEE International Conference on Robotics and Automation (ICRA 06), Orlando, FL, 15-19 May 2006
- Chris Bailey-Kellogg, John J. Kelley, III, Ryan Lilien and Bruce R. Donald, "Physical Geometric Algorithms for Structural Molecular Biology", Proceedings of the International Conference on Robotics and Automation (2001), Seoul, Korea, 21-26 May 2001
- Jacob Sorber, Minho Shin, Ron Peterson and David Kotz, "Plug-n-Trust: Practical Trusted Sensing for mHealth", In International Conference on Mobile Systems, Applications, and Services (MobiSys), pages 309-322, June, 2012. DOI 10.1145/2307636.2307665. Copyright © 2012 by ACM.
- Guanling Chen and David Kotz, "Policy-driven data dissemination for context-aware applications", Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai, HI, 8-12 March 2005, 283-289
- Cory Cornelius, Apu Kapadia, David Kotz, Daniel Peebles, Minho Shin and Patrick P. Tsang, "Poster Abstract: Reliable People-Centric Sensing with Unreliable Voluntary Carriers", In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2008. ACM Press
- Jacob Sorber, Minho Shin, Ron Peterson and David Kotz, "Poster: Practical Trusted Computing for mHealth Sensing", In International Conference on Mobile Systems, Applications, and Services (MobiSys), June, 2011. ACM Press. DOI 10.1145/1999995.2000058. Copyright © 2011 by ACM.
- Bruce R. Donald, Christopher G. Levey, Craig D. McGray, Daniela Rus and Mike Sinclair, "Power Delivery and Locomotion of Untethered Micro-Actuators", IEEE MEMS (Proceedings IEEE International Conference on Micro Electro Mechanical Systems), Kyoto, Japan, 19-23 January 2003, 124-129
- Denise Anthony and Timothy Stablein, "Practicing Privacy: Laws, Organizational Standards and Work Routines in Health Care", Annual Meeting of the American Sociological Association, Las Vegas, NV
- Keren Tan, Guanhua Yan, Jihwang Yeo and David Kotz, "Privacy Analysis of User Association Logs in a Large-Scale Wireless LAN", Proceedings of the 30th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Shanghai, China, 10-15 April 2011
- Yi Ouyang, Zhengyi Le, Yurong Xu, Nikos Triandopoulos, Sheng Zhang, James Ford and Fillia Makedon, "Providing Anonymity in Wireless Sensor Networks", Proceedings of IEEE International Conference on Pervasive Services (ICPS), Istanbul, Turkey, July 15-20, 2007
- Guofei Jiang and George Cybenko, "Query Routing Optimization in Sensor Communication Networks", Proceedings of the IEEE 41th Conference on Decision and Control, Las Vegas, NV, 10-13 December 2002
- Emiliano Miluzzo, Xiao Zheng, Kristof Fodor and Andrew Campbell, "Radio Characterization of 802.15.4 and its Impact on the Design of Mobile Sensor Networks", Proceedings of the 5th European Conference on Wireless Sensor Networks (EWSN 2008), Bologna, Italy, January 30-February 1, 2008
- Laura Kopczak and M. Eric Johnson, "Rebuilding Confidence: The Case for Information Technology in Humanitarian Supply Chains", Proceedings of the 2007 Academy of Management Conference, Philadelphia, PA, August 3-8, 2007
- Udayan Deshpande, Chris McDonald and David Kotz, "Refocusing in 802.11 Wireless Measurement", In Proceedings of the Passive and Active Measurement Conference (PAM 2008), pages 142-151, April, 2008. Springer-Verlag. DOI 10.1007/978-3-540-79232-1_15.
- Diego Hernando and Valentino Crespi, "Sampling Theory for Process Detection with Applications to Surveillance and Tracking", Proceedings of the SPIE Vol. 5403, Sensors and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense III, Orlando, Florida, April 2004
- K Minami and David Kotz, "Scalability in a Secure Distributed Proof System", Proceedings of the 4th International Conference on Pervasive Computing (PERVASIVE 2006), Dublin, Ireland, 7-10 May 2006
- Li Shen, Yuhang Wang, Sarantos Kapidakis, Yan Zhao, James Ford, Fillia Makedon, Song Ye and Tilmann Steinberg, "SCENS - A System for the Mediated Sharing of Sensitive Information", JCDL 2003: Joint Conference on Digital Libraries, Houston, Texas, May 2003
- K Minami and David Kotz, "Secure context-sensitive authorization", Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai, Hawaii, 8-12 March 2005, 257-268
- Patrick P. Tsang and Sean Smith, "Secure Cryptographic Precomputation with Insecure Memory", Proceedings of the 4th Information Security Practice and Experience Conference(ISPEC 2008), Sydney, Australia, 21-23 April 2008
- Zhengyi Le, James Ford, Vangelis Karkaletsis, Vassilios Spiliopoulos and Fillia Makedon, "Secure Group Collaboration in an Open Healthcare Environment", Proceedings of the 4th ICICTH International Conference on Information Communication Technologies in Health, Samos Island, Greece, 13-15 July 2006
- Panagiotis Papadimitratos and Zygmunt J. Haas, "Secure Routing for Mobile Ad hoc Networks", Proceedings of the SCS Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, 27-31 January 2002
- S Jiang, Sean Smith and K Minami, "Securing Web Servers against Insider Attack", ACSA/ACM Annual Computer Security Applications Conference, December 2001, 265-276
- Han Li and Guofei Jiang, "Semantic Message Oriented Middleware for Publish/Subscribe Network", Proceedings of the Defense and Security Symposium (SPIE 2004), Orlando, Florida, 12-16 April 2004
- Javed Aslam, Sergey Bratus and Virgil Pavlu, "Semi-supervised data organization for interactive anomaly analysis", Proceedings of the 5th International Conference on Machine Learr (ICMLA 06), Orlando, FL, 14-16 December 2006
- Emiliano Miluzzo, Nicholas Lane, Kristof Fodor, Ron Peterson, Hong Lu, Mirco Musolesi, Shane B. Eisenman, Xiao Zheng and Andrew Campbell, "Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application", Proceedings of the 6th ACM International Conference on Embedded Networked Sensor Systems(SENSYS '08), Raleigh, NC, November 5-7, 2008.
- Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall and Apu Kapadia, "Sensitive Lifelogs: A privacy analysis of photos from wearable cameras", CHI 2015, April 18 - 23, 2015, Seoul, Republic of Korea
- Phil Fazio, Keren Tan, Jihwang Yeo and David Kotz, "Short Paper: The NetSANI Framework for Analysis and Fine-tuning of Network Trace Sanitization", Proceeding of the Fourth ACM Conference on Wireless Network Security (WiSec '11), Hamburg, Germany, 15-17 June 2011
- David Nicol, Michael Goldsby and Michael Johnson, "Simulation Analysis of Virtual Geographic Routing", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2004, Pages 857-865
- Dennis McGrath and Susan McGrath, "Simulation and Network-Centric Emergency Response", Proceedings of the 2005 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC), Orlando FL, November 28 - December 1, 2005
- Bill Brown, Andrew Cutts, Dennis McGrath, David Nicol, Timothy Smith and Brett Tofel, "Simulation of Cyber Attacks with Applications in Homeland Defense Training", Proc. SPIE Vol. 5071, p. 63-71, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, Sep 2003
- Shane B. Eisenman and Andrew Campbell, "SkiScape Sensing", Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), Boulder, CO, 1-3 November 2006
- Yuan Song, Xian Chen, Yoo-Ah Kim, Bing Wang and Guanling Chen, "Sniffer Channel Section for Monitoring Wireless LANs", Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications (WASA),Boston, MA, August 16- 18, 2009.
- Fabeah Adu-Oppong, Casey Gardiner, Apu Kapadia and Patrick P. Tsang, "Social Circles: Tackling Privacy in Social Networks ", Proceedings of the Fourth Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, July 23-25, 2008
- Seoung-Bum Lee, Kyung Joon Kwak and Andrew Campbell, "Solicitation-Based Forwarding for Sensor Networks", Proceeding of the 3rd Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2006), Reston, VA, Sept 25-28, 2006
- Hong Lu, Wei Pan, Nicholas Lane, Tanzeem Choudhury and Andrew Campbell, "SoundSense: Scalable Sound Sensing for People?Centric Applications on Mobile Phones", Proceedings of the 7th Annual International Conference on Mobile Systems (MobiSys 2009), Krakow, Poland, June 22-25, 2009.
- M Johnson, S Lyu and H Farid, "Steganalysis of Recorded Speech", Proceedings of the SPIE Symposium on Electronic Imaging, San Jose, CA, 16-20 January 2005
- S Lyu and H Farid, "Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines", Proceedings of the SPIE Symposium on Electronic Imaging, San Jose, CA, 18-22 January 2005
- Timothy Stablein, Joseph Hall, Helen Nissenbaum and Denise Anthony, "Stigma, Gay Males, and Electronic Health Records: Privacy Perceptions, Age, and Negotiating Stigma", Annual meeting of the American Sociological Association, Denver, CO
- Timothy Stablein and Denise Anthony, "Stigma - Privacy, Information Exchanges, and the Stigmatizing Role of the Electronic Health Record", Annual Meeting of the Eastern Sociological Society, New York, NY
- Mirco Musolesi, Kristof Fodor and Andrew Campbell, "Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones", In Proceedings of Eighth International Conference on Pervasive Computing, Helsinki, May 2010
- Dennis McGrath and Christopher Carella, "Synthetic Environments for Emergency Response Simulation", Proceedings of the 2005 Game Developers Conference, San Jose, CA, 7-11 March 2005
- A Barsamian, Vincent Berk and George Cybenko, "Target tracking and localization using infrared video imagery", Proceeding of the SPIE Defense and Security Symposium, Vol. 6231, Orlando, FL, April 2006
- Sergey Bratus, Anna Shubina and Michael Locasto, "Teaching the Principles of the Hacker Curriculum to Undergraduates", Proceedings of the 41st ACM Technical Symposium on Computer Science Education (SIGCSE ’10), Milwaukee, Wisconsin, March 10-13, 2010.
- Shane B. Eisenman, Nicholas Lane and Andrew Campbell, "Techniques for Improving Opportunistic Sensor Networking Performance", Proceedings of the International Conference on Distributed Computing in Sensor Networks (DCOSS 2008), Santorini Island, Greece, June 11-14, 2008
- Guofei Jiang and George Cybenko, "Temporal and Spatial Distributed Event Correlation for Network Security", Proceedings of the 2004 American Control Conference (ACC), Boston, MA, June-July 2004, 996-1001
- Shane B. Eisenman, Emiliano Miluzzo, Nicholas Lane, Ron Peterson, Gahng-Seop Ahn and Andrew Campbell, "The BikeNet Mobile Sensing System for Cyclist Experience Mapping", Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems, Sydney, Australia, Nov 6-9, 2007
- Suzanne Wendelken, Susan McGrath, George Blike and Metin Akay, "The Feasibility of Using a Forehead Reflectance Pulse Oximeter for Automated Remote Triage", Proceedings of the New England Engineering in Medicine and Biology Conference, Springfield MA, April 2004, 180-181
- Zach Zhou and M. Eric Johnson, "The Impact of Information Security Rating on Vendor Competition", Proceedings of the 15th Americas Conference on Information Systems, San Francisco, CA, August 6-9, 2009
- Juhee Kwon and M. Eric Johnson, "The Impact of Security Practices on Regulatory Compliance and Security Performance", International Conference on Information Systems (ICIS), Shanghai, China December 4-8, 2011
- David Kotz, "The Institute for Security Technology Studies (ISTS): Overview", Proceedings of the Defense and Security Symposium (SPIE 2004), Orlando FL, 12-16 April, 2004
- Mirco Musolesi, Emiliano Miluzzo, Nicholas Lane, Shane B. Eisenman, Tanzeem Choudhury and Andrew Campbell, "The Second Life of a Sensor: Integrating Real-world Experience in Virtual Worlds using Mobile Phones", Proceedings of the 5th Workshop on Embedded Networked Sensors (EmNets 2008), Charlottesville, VA, June 2-3, 2008
- Joseph Henderson, "The Virtual Terrorism Response Academy: Training for High-Risk, Low-Frequency Threats", Medicine Meets Virtual Reality 13: The Magical Next Becomes the Medical Now, Long Beach, CA, January 2005, 185-190
- Sergey Bratus, Nihal D'Cunha, Evan Sparks and Sean Smith, "TOCTOU, Traps, and Trusted Computing", Proceedings of the Trust 2008 Conference, Villach, Austria, March 11-12, 2008
- Jason Liu, David Nicol, Felipe Perrone and Michael Liljenstam, "Towards High Performance Modeling of the 802.11 Wireless Protocol", Proceedings of the 2001 Winter Simulation Conference (WSC 2001), Arlington, VA, 9-12 December 2001
- Sheng-Hsiung Liang, Xiaorong Xiong and Karl F. Bohringer, "Towards Optimal Designs for Self-alignment in Surface-tension Driven Micro-assembly", Proceedings of the IEEE Conference of Micro Electro Mechanical Systems (MEMS), Maastricht, Holland, 2004
- Yong Sheng, George Cybenko, Valentino Crespi and Guofei Jiang, "Trackability Analysis of Multiple Processes Using Multi-Distributed Agents", Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005), Waltham, MA, 18-21 April 2005, 111-116
- Valentino Crespi, George Cybenko and Yong Sheng, "Trackability in complex situations and environments", Unattended Ground, Sea, and Air Sensor Technologies and Applications VIII Conference, Orlando, FL, April 2006
- Andrew Campbell, Shane B. Eisenman, Kristof Fodor, Nicholas Lane, Hong Lu, Emiliano Miluzzo, Mirco Musolesi, Ron Peterson and Xiao Zheng, "Transforming the Social Networking Experience with Sensing Presence from Mobile Phones", Proceedings of the 6th ACM International Conference on Embedded Networked Sensor Systems(SENSYS'08), Raleigh, NC, November 5-7, 2008.
- Sean Smith and Eileen Ye, "Trusted Paths for Browsers", 11th Usenix Security Symposium. August 2002
- Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Christopher Masone and Sean Smith, "TwoKind Authentication: Usable Authenticators for Untrustworthy Environments", Symposium on Usable Privacy and Security (SOUPS 2007), Pittsburgh, Pennsylvania, July 18-20, 2007
- George Bakos and Sergey Bratus, "Ubiquitous Redirection as Access Control Response", Proceedings of the 3rd Annual Conference on Privacy, Security and Trust (PST2005), New Brunswick, Canada, 12-14 October 2005
- Dennis McGrath and Doug Hill, "UnrealTriage: A Game-Based Simulation for Emergency Response", Proceedings of the Huntsville Simulation Conference, Huntsville, AL, October 2004
- David L. Pepyne, Jinghua Hu and Weibo Gong, "User Profiling for Computer Security ", Proceedings of the 2004 American Control Conference, Boston, Massachusetts, 30 June - 2 July 2004
- Suzanne Wendelken, Susan McGrath, Metin Akay and George Blike, "Using a Forehead Reflectance Pulse Oximeter to Detect Changes In Sympathetic Tone", Proceedings of the 26th Annual International Conference of the IEEE and Engineering in Medicine and Biology Society, San Francisco, CA 1-5 September 2004, 325-328
- Bethany Knorr, Susan McGrath and George Blike, "Using a Generalized Neural Network to Identify Airway Obstructions in Anesthetized Patients Post-Operatively Based on Photoplethysmography", In Proceedings of the 28th Annual Engineering in Medicine and Biology Conference, New York, NY, September 2006
- Stephen Linder, Suzanne Wendelken and Susan McGrath, "Using PPG Morphology to Detect Blood Sequestration", Proceedings of the Society for Technology in Anesthesia Annual Meeting, San Diego, CA. January 2006. Best New Technology Award
- Ian Gregorio-de Souza, Vincent Berk and A Barsamian, "Using principal component analysis for selecting network behavioral anomaly metrics", Proc. SPIE, Vol. 7666, 766605 (2010); doi:10.1117/12.852399. Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX. April 2010. Orlando, FL.
- S Nazareth and Sean Smith, "Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth", Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 6-9 October 2004, Volume 1, 218-226
- Stephen Linder and Suzanne Wendelken, "Using the Morphology of the Photoplethysmogram Envelope to Automatically Detect Hypovolemia", Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems, Salt Lake City, UT, 22-23 June 2006
- Paul Thompson, "Utility - Theoretic Information Retrieval, Cognitive Hacking, and Intelligence and Security Informatics", Proceedings of the 7th International Conference on Computer Science and Informatics, Cary, NC, 28 September, 2003
- Jiandong Fang and Karl F. Bohringer, "Vertical and Horizontal Parallel Mounting of Micro Components on a Substrate with High Surface Coverage", Proceedings of the 19th IEEE International Conference on Micro Electro Mechanical Systems (MEMS 2006), Istanbul, Turkey, 22-26 January 2006
- Emiliano Miluzzo, Nicholas Lane and Andrew Campbell, "Virtual Sensing Range", Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), Boulder, CO 1-3 November 2006
- Apu Kapadia, Tristan Henderson, Jeffrey Fielding and David Kotz, "Virtual Walls: Protecting Digital Privacy in Pervasive Environments", In Proceedings of the 5th International Conference on Pervasive Computing, pp. 162-179, Toronto, Canada, May 13-16, 2007
- Paul Thompson, "Weak Models for Insider Threat Detection", Proceedings of the Defense and Security Symposium (SPIE 2004), Orlando, Florida, 12-16 April 2004
- Guofei Jiang, "Weak Process Models for Robust Process Detection", Proceedings of the Defense and Security Symposium (SPIE 2004) Orlando, Florida, 12-16 April 2004
- George Cybenko, Valentino Crespi and Guofei Jiang, "What is Trackable?", Proceedings of the SPIE Vol. 6201, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV, Orlando, Florida, April 2006
- M. Eric Johnson and Nicholas Willey, "Will HITECH Heal Patient Data Hemorrhages?", Proceedings of the 44th Hawaii International Conference on System Sciences, Kauai, HI, January 4-7, 2011.
- Gabriel Weaver and Sean Smith, "XUTools: Unix Commands for Processing Next-Generation Structured Text", USENIX 26th Large Installation System Administration Conference (LISA '12). December 2012
- Patrick P. Tsang and Sean Smith, "YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems", Proceedings of the 23rd International Information Security Conference (SEC 2008), Milan, Italy, September 8-10, 2008.
- Shrirang Mare, Andres Molina-Markham, Cory Cornelius, Ron Peterson and David Kotz, "ZEBRA: Zero-Effort Bilateral Recurring Authentication", IEEE Symposium on Security & Privacy, 2014
In Proceedings (Workshop)
- Keren Tan, Guanhua Yan, Jihwang Yeo and David Kotz, "A Correlation Attack Against User Mobility Privacy in a Large-scale WLAN network", In Proceedings of the ACM MobiCom'10 S3 workshop, pages 33-35, September, 2010. ACM Press
- Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius and David Kotz, "Adaptive security and prvacy for mHealth sensing", Proceeding of the 2nd USENIX Workshop on Healthcare Security and Privacy (HealthSec'11), San Francisco, CA, 9 August 2011.
- Shrirang Mare, Jacob Sorber, Cory Cornelius, David Kotz and Minho Shin, "Adapt-lite: Privacy-aware, secure, and efficient mHealth sensing", In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), pages 137-142, October, 2011. DOI 10.1145/2046556.2046574.
- Nicholas Lane, Hong Lu and Andrew Campbell, "Ambient Beacon Localization: Using Sensed Characteristics of the Physical World to Localize Mobile Sensors", Proceedings of the Fourth Workshop on Embedded Networked Sensors (EmNets 2007), Cork, Ireland, June 25-26, 2007
- Jacob Sorber, Minho Shin, Ron Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer and David Kotz, "An Amulet for Trustworthy Wearable mHealth", In Workshop on Mobile Computing Systems and Applications
(HotMobile), Feb 2012, pages 7:1--7:6, DOI 10.1145/2162081.2162092
- Gabriel Mateescu, Masha Sosonkina and Paul Thompson, "A New Model for Probabilistic Information Retrieval on the Web", Second SIAM International Conference on Data Mining (SDM 2002) Workshop on Web Analytics
- Patrick P. Tsang, Apu Kapadia and Sean Smith, "Anonymous IP-address Blocking in Tor with Trusted Computing (Short Paper: Work in Progress)", In the 2nd Workshop on Advances in Trusted Computing (WATC '06 Fall), 2006
- Juhee Kwon and M. Eric Johnson, "An Organizational Learning Perspective on Proactive vs. Reactive investment in Information Security", The 10th Workshop on the Economics of Information Security (WEIS), Fairfax, VA George Mason University, June 14-15, 2011
- David Kotz, Sasikanth Avancha and Amit Baxi, "A Privacy Framework for Mobile Health and Home-Care Systems", Proceedings of the Security and Privacy in Medical and Home-Care Systems Workshop (SPIMACS), Chicago, IL, November 13, 2009.
- Aarathi Prasad, Ron Peterson, Jacob Sorber and David Kotz, "A Provenance Framework for mHealth", In Proceedings of the Workshop for Mobile Systems, Applications, and Services for Healthcare (mHealthSys) Poster Track, November, 2012. ACM Press. DOI 10.1145/2396276.2396287
- Jue Wang, Guanling Chen and David Kotz, "A Sensor-Fusion Approach for Meeting Detection", Workshop on Context Awareness at 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys), Boston, MA, 6-9 June 2004
- Guofei Jiang and George Cybenko, "A Simple Protocol for Infrastructure Monitoring and Management", IEEE 3rd Annual Workshop on Information Assurance, West Point, NY, June 17-19, 2002
- Rima Murthy and David Kotz, "Assessing blood-pressure measurement in tablet-based mHealth apps", In Workshop on Networked Healthcare Technology (NetHealth), January, 2014. IEEE Press.
- Felipe Perrone and Samuel Nelson, "A Study of On-Off Attack Models for Wireless Ad Hoc Networks", Proceedings of the First International Workshop on Operator-Assisted (Wireless Mesh) Community Networks 2006, Berlin, Germany, 18-19 September 2006
- David Kotz, "A threat taxonomy for mHealth privacy", Proceedings of the NetHealth 2011: Workshop on Networked Healthcare Technology, Bangalore, India, January 2011.
- Kwang-Hyun Baek, Sergey Bratus, S Sinclair and Sean Smith, "Attacking and Defending Networked Embedded Devices", Proceedings of the 2nd Workshop on Embedded Systems Security (WESS'2007), Salzburg, Austria, October 4, 2007
- Massimiliano Pala and Sean Smith, "AutoPKI: a PKI Resources Discovery System", Proceedings of the 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007
- Patrick P. Tsang, Sherman Chow and Sean Smith, "Batch Pairing Delegation", Proceedings of the 2nd International Workshop on Security (IWSEC '07) Nara, Japan, Oct 29-31, 2007
- Hong Lu, Nicholas Lane, Shane B. Eisenman and Andrew Campbell, "Bubble-Sensing: A New Paradigm for Binding a Sensing Task to the Physical World using Mobile Phones", Proceedings of the International Workshop on Mobile Devices and Urban Sensing, St. Louis, Missouri, April 21, 2008
- Aarathi Prasad and David Kotz, "Can I access your Data? Privacy Management in mHealth.", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- Chen Qin, Emily Freebairn and Sean Smith, "Capability Exchange: Improving Access Control Usability in Health IT", 2013 Usenix Workshop on Health Information Technologies
- Udayan Deshpande, Tristan Henderson and David Kotz, "Channel Sampling Strategies for Monitoring Wireless Networks", In Proceedings of the Second International Workshop On Wireless Network Measurement (WiNMee). IEEE Computer Society Press, April 2006
- Celeste Campos-Castillo and Denise Anthony, "Characteristics of Health Care Users Who Track Their Health Information Online: Evidence from a National Survey", Workshop on Personal Health Portfolios: Technology, Usability, and Policy. Information Law Institute & Media, Culture, and Communication, New York University
- George Cybenko, Annarita Giani and Paul Thompson, "Cognitive Hacking and the Value of Information", Workshop on Economics and Information Security, Berkeley, CA, 16-17 May, 2002
- Scott Dynes, Eva Andrijcic and M. Eric Johnson, "Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic Data", Proceedings of the 5th Workshop on the Economics of Information Security (WEIS 2006), Cambridge University, England, 26-28 June 2006
- Sergey Bratus, David Kotz, William Taylor, Anna Shubina, Bennet Vance and Michael Locasto, "Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed", Proceeding of the 2nd Workshop on Cyber Security Experimentation and Test (CSET09), Montreal, Canada, August 10, 2009. USENIX Association.
- S Lyu and H Farid, "Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines", 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002
- M Johnson and H Farid, "Detecting Photographic Composites of People", Proceedings of the 6th International Workshop on Digital Watermarking, Guangzhou, China, November 21-23, 2007
- Apu Kapadia, Prasad Naldurg and Roy Campbell, "Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall ", IEEE Workshop on Policies for Distributed Systems and Networks (POLICY'07), Bologna, Italy, June 13 - 15, 2007
- Chrisil Arackaparambil, Sergey Bratus, Joshua Brody and Anna Shubina, "Distributed Monitoring of Conditional Entropy for Anomaly Detection in Streams", Proceedings of the IEEE Workshop on Scalable Stream Processing Systems (SSPS) [part of the Parallel Distributed Processing, Workshops and PhD Forum (IPDPSW)] . April 19-23, 2010, Atlanta, GA
- Joseph Cooley and Sean Smith, "Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare", 1st USENIX Workshop on Health Security and Privacy. HealthSec '10. Washington, DC, on August 10, 2010.
- L.R. Ray, James Joslin, John Murphy, Jon Barlow, Devin Brande and Devin Balkcom, "Dynamic Mobile Robots for Emergency Surveillance and Situational Awareness", IEEE International Workshop on Safety, Security, and Rescue Robotics, August 2006
- Phil Fazio, Keren Tan and David Kotz, "Effects of network trace sampling methods on privacy and utility metrics", Proceedings of the Annual Workshop on Wireless Systems: Advanced Research and Development (WISARD), January 2012,
Copyright 2012 IEEE
- Samuel Tan, Rebecca Shapiro and Sean Smith, "Electronic Prescription for Controlled Substances: A Cybersecurity Perspective", 2013 Usenix Workshop on Health Information Technologies, August 12, 2013
- Libo Song and David Kotz, "Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces", ACM MobiCom Workshop on Challenged Networks (CHANTS 2007), Montreal, Canada, September 9-14, 2007
- Emiliano Miluzzo, James M.H. Oakley, Hong Lu, Nicholas Lane, Ron Peterson and Andrew Campbell, "Evaluating the iPhone as a Mobile Platform for People-Centric Sensing Applications", Proceedings of the International Workshop on Urban, Community, and Social Applications of Networked Sensing Systems (UrbanSense08), Raleigh, NC, November 4, 2008
- Meiyuan Zhao, Sean Smith and David Nicol, "Evaluating the Performance Impact of PKI on BGP Security", 4th Annual PKI Research and Development Workshop. NIST/NIH/Internet2. April 2005
- M Johnson and H Farid, "Exposing Digital Forgeries by Detecting Inconsistencies in Lighting", ACM Multimedia and Security Workshop, New York City, August 1, 2005
- H Farid, "Exposing Digital Forgeries in Scientific Images", Proceedings of the 8th ACM Multimedia and Security Workshop, Geneva, Switzerland, 26-27 September 2006
- Weihong Wang and H Farid, "Exposing Digital Forgeries in Video by Detecting Double MPEG Compression", Proceedings of the 8th ACM Multimedia and Security Workshop, Geneva, Switzerland, 26-27 September 2006
- Weihong Wang and H Farid, "Exposing Digital Forgeries in Video by Detecting Duplication", Proceedings of the 9th ACM Multimedia and Security Workshop, Dallas, TX, September 20-21, 2007
- M Johnson and H Farid, "Exposing Digital Forgeries Through Chromatic Aberration", Proceedings of the 8th ACM Multimedia and Security Workshop, Geneva, Switzerland, 26-27 September 2006
- M Johnson and H Farid, "Exposing Digital Forgeries Through Specular Highlights on the Eye ", 9th International Workshop on Information Hiding, Saint Malo, France, June 2007
- Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony and David Kotz, "Exposing privacy concerns in mHealth", Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, San Francisco, CA, 9 August 2011
- Nicholas Goffee, Sung Kim, Sean Smith, Punch Taylor, Meiyuan Zhao and John Marchesini, "Greenpass: Decentralized, PKI-based Authorization for Wireless LANs", 3rd Annual PKI Research and Development Workshop Proceedings. Internet2/NIST/NIH. NISTIR 7122. 26--41, 2004
- Ming Li and David Kotz, "Group-aware Stream Filtering", Proceedings of the Fourth Workshop on Wireless Ad hoc and Sensor Networks (WWASN), Toronto, ON, Canada, June 2007
- Ajit Appari, M. Eric Johnson and Denise Anthony, "Health Information Technology and Hospital Patient Safety Performance - A Cross-sectional Study of US Acute Care Hospitals", Third Workshop on Health IT and Economics, Washington DC
- H Farid and S Lyu, "Higher-Order Wavelet Statistics and their Application to Digital Forensics", IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR), Madison, Wisconsin, 2003
- Ajit Appari, Denise Anthony and M. Eric Johnson, "HIPAA Compliance: An Examination of Institutional and Market Forces", Proceedings of the 8th Workshop on Economics of Information Systems (WEIS 2009), London, England, June 24-25, 2009.
- Xia Zhao and M. Eric Johnson, "Information Governance: Flexibility and Control through Escalation and Incentives", Proceedings of the Seventh Workshop on the Economics of Information Security (WEIS), Dartmouth College, June 26-27, 2008
- M. Eric Johnson and Igor Macura, "Information Risk and the Evolution of the Security Rating Industry", Proceedings of the 8th Workshop on the Economics of Information Security (WEIS 2009), University College London, England, June 24-25, 2009.
- S Sinclair, Sean Smith, Stephanie Trudeau, M. Eric Johnson and Anthony Portera, "Information Risk in Financial Institutions: Field Study and Research Roadmap", Proceedings of 3rd International Workshop on Enterprise Applications and Service in the Financial Industry (FinanceCom 2007), Montreal, Canada, December 8, 2007
- Scott Dynes, Hans Brechbühl and M. Eric Johnson, "Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm", Proceedings of the Fourth Workshop on the Economics of Information Security, Harvard University, June 2005
- Shrirang Mare and David Kotz, "Is Bluetooth the right technology for mHealth?", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- John Marchesini, Sean Smith and Meiyuan Zhao, "Keyjacking: Risks of the Current Client-side Infrastructure", Proceedings of the 2nd Annual PKI Research Workshop, Gaithersburg, MD, 28-29 April 2003
- Ajit Appari, M. Eric Johnson and Denise Anthony, "Meaningful Use of EHR Systems and Patient Safety: A National Study of US Hospitals", Academy of Management- Healthcare Management Professional Development Workshop, Boston
- S Sinclair, "Meta-Observations from an Outsider's Study of Clinical Environments", Inaugural Security and Privacy in Medical and Home-Care Systems (SPIMACS) Workshop, co-located with the 16th ACM Conference on Computer and Communications Security (CCS 2009). Chicago, IL, November 13, 2009
- Shane B. Eisenman, Nicholas Lane, Emiliano Miluzzo, Ron Peterson, Gahng-Seop Ahn and Andrew Campbell, "MetroSense Project: People-Centric Sensing at Scale", First Workshop on World-Sensor-Web: Mobile Device Centric Sensory Networks and Applications, Boulder, CO, 31 October 2006
- Robert Savell and George Cybenko, "Mining for Social Processes in Intelligence Data Streams", Proceeding of the First International Workshop on Social Computing, Behavioral Modeling, and Prediction (SBP 2008), Phoenix, AZ, April 1-2, 2008.
- Xiaorong Xiong, Yael Hanein, Jiandong Fang, Daniel Schwartz and Karl F. Bohringer, "Multi-batch Self-assembly for Microsystem Integration", Proceedings of the 3rd International Workshop on Microfactories (IWMF 02). Minneapolis, MN, 2002
- Peter Johnson, Apu Kapadia, Patrick P. Tsang and Sean Smith, "Nymble: Anonymous IP-Address Blocking", Proceedings of the 7th Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 20 - 22, 2007
- Zhengyi Le, Yi Ouyang, James Ford and Fillia Makedon, "OC: A System for Open Collaborations", In the First International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2005), in conjunction with IEEE ICPS 05, Santorini Island, Greece, July 14, 2005
- David Robinson, George Cybenko and Vincent Berk, "Online Behavioral Analysts and Modeling Methodology (OBAMM)", Proceedings of the First International Workshop on Social Computing, Behavioral Modeling, and Prediction (SBP 2008), Phoenix, AZ, April 1-2, 2008
- Cory Cornelius and David Kotz, "On Usable Authentication for Wireless Body Area Networks", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare and David Kotz, "Passive Biometrics for Pervasive Wearable Devices", In Proceedings of Hotmobile, February 2012, Publisher acmpress, Copyright"ACM"
- Sergey Bratus, Travis Goodspeed, Peter Johnson, Sean Smith and Ryan Speers, "Perimeter-Crossing Buses: a New Attack Surface for Embedded Systems", 7th Workshop on Embedded Systems Security (WESS 2012).
October 2012
- Kwang-Hyun Baek and Sean Smith, "Preventing Theft of Quality of Service on Open Platforms", In The First IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks, September 2005
- A Iliev and Sean Smith, "Privacy-Enhanced Credential Services", Proceedings of the 2nd Annual PKI Research Workshop, Gaithersburg, MD, 28-29 April 2003
- A Iliev and Sean Smith, "Private Information Storage with Logarithmic-space Secure Hardware", Information Security Management, Education, and Privacy (containing the Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems (i-NetSec 04)), Toulouse, France, 22-27 August 2004, 201-216
- Juhee Kwon and M. Eric Johnson, "Proactive vs. Reactive Security Investment in the Healthcare Sector", Workshop on Information Systems Economics (WISE), Shanghai, China December 7-9, 2012
- Aarathi Prasad, Ron Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul and David Kotz, "Provenance framework for mHealth", In Workshop on Networked Healthcare Systems, pages 1-6, January, 2013. IEEE Computer Society Press. DOI 10.1109/COMSNETS.2013.6465599
- Aarathi Prasad, Ron Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul and David Kotz, "Provenance framework for mHealth", In Workshop on Networked Healthcare Systems, IEEE Computer Society Press.
- Paul Thompson and Steven Lulich, "Question Answering in the Infosphere: Semantic Interoperability and Lexicon Development", Language Evaluation Resources Conference Workshop on Question Answering Strategies, May 28, 2002, Las Palmas de Gran Canaria, Spain
- Michael Locasto, Matthew Burnside and Darrell Bethea, "Research Directions for Network Intrusion Recovery", Symposium on Usable Privacy and Security (SOUPS): Workshop on Usable IT Security Management (USM '08), Pittsburgh, PA, July 23-25, 2008
- Sean Smith, "Research Ideas for National Information Security", NSF Setting a National Research Agenda: A Workshop on Research Issues in Security, Privacy, and Trust. February 2002
- Michael Liljenstam, Jason Liu, David Nicol, Yougu Yuan, Guanhua Yan and Chris Grier, "RINSE: the Real-time Immersive Network Simulation Environment for Network Security Exercises", Workshop on Principle of Advanced and Distributed Simulation, June 2005
- Keren Tan and David Kotz, "Saluki: a High-Performance Wi-Fi Sniffing Program", In: Proceedings of the 6th International Workshop on Wireless Network Measurements (WiNMee’10), May 2010
- Juhee Kwon and M. Eric Johnson, "Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance", The 11st Workshop on the Economics of Information Security (WIES), Berlin, Germany June 25-26, 2012
- Dennis McGrath, Mark Ryan and Doug Hill, "Simulation Interoperability with a Commercial Game Engine", European Simulation Interoperability Workshop 2005, 27-30 June 2005
- David Nicol and Guanhua Yan, "Simulation of Network Traffic at Coarse Time-scales", Workshop on Principles of Advanced and Distributed Simulation, June 2005
- A Iliev and Sean Smith, "Small, Stupid, and Scalable: Secure Computing with Faerieplay", The Fifth Annual Workshop on Scalable Trusted Computing (STC '10). October 4, 2010. Chicago, IL.
- A Popescu and H Farid, "Statistical Tools for Digital Forensics", 6th International Workshop on Information Hiding, Toronto, Canada, 2004
- Sergey Bratus, Peter Johnson, Michael Locasto, Ashwin Ramaswany and Sean Smith, "The Cake is a Lie: Privilege Rings as a Policy Resource", Proceeding of the Second Workshop on Virtual Machine Security (VMSec 09), Chicago, IL, November 9, 2009.
- Anna Shubina, Sergey Bratus, Wyllys Ingersoll and Sean Smith, "The Diversity of TPMs and its Effects on Development; A Case Study of Integrating the TPM into OpenSolaris", The Fifth Annual Workshop on Scalable Trusted Computing (STC '10). October 4, 2010. Chicago, IL.
- Stephanie Trudeau, S Sinclair and Sean Smith, "The effects of introspection on creating privacy policy", Eighth ACM Workshop on Privacy in the Electronic Society (WPES ’09), 2009
- Zach Zhou and M. Eric Johnson, "The Impact of Information Security Ratings on Vendor Competition", Proceedings of the Third China Summer Workshop on Information Management (CSWIM 2009), Guangzhou, China, June 2009
- Zach Zhou and M. Eric Johnson, "The Impact of Information Security Ratings on Vendor Competition", Proceedings of the Eighth Workshop on the Economics of Information Security, University College London, England, June 24-25, 2009
- Zach Zhou and M. Eric Johnson, "The Impact of Professional Information Security Ratings on Vendor Competition", Twenty first Workshop on Information Systems and Economics (WISE 2009), Phoenix, December 14-15, 2009
- Nicholas Lane and Andrew Campbell, "The Influence of Microprocessor Instructions on the Energy Consumption of Wireless Sensor Networks", Proceedings of the 3rd Workshop on Embedded Networked Sensors (EmNets 2006), Cambridge, MA, 30-31 May 2006, 41-45
- Ajit Appari, M. Eric Johnson and Denise Anthony, "The Neo-Institutional View of HIPAA Compliance in Home Health Care", Workshop on Information Security & Privacy (WISP09), December 14, 2009, Phoenix, AZ.
- Julian Bangert, Sergey Bratus, Rebecca Shapiro and Sean Smith, "The Page-Fault Weird Machine: Lessons in Instruction-less Computation", 7th Usenix Workshop on Offensive Technologies, August 13, 2013
- Andrew Campbell and Tanzeem Choudhury, "Toward Societal Scale Sensing using Mobile Phones", White paper presented at the NSF Workshop on Future Directions in Networked Sensing Systems, Arlington, USA, November, 12-13, 2009
- Tilmann Steinberg, James Ford, Yi Ouyang, Li Shen, Yuhang Wang, W Zheng and Fillia Makedon, "Tracking Resource Usage Using Heterogeneous Feature Spaces with Local Exceptions", Proc. ClustWeb 04, workshop of EDBT 04, 9th International Conference on Extending Database Technology, Crete, Greece, March 2004
- Sergey Bratus, Michael Locasto, Ashwin Ramaswany and Sean Smith, "Traps, Events, Emulation, and Enforcement: Managing the Yin and Yang of Virtualization-based Security", Proceedings of the First Workshop on Virtual Machine Security (VMSec08), George Mason University, Fairfax, VA, October 31, 2008.
- Denise Anthony, Tristan Henderson and James Kitts, "Trust and Privacy in Distributed Work Groups", Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling, and Prediction, Phoenix, Arizona, March 31-April 1, 2009.
- Katelin Bailey and Sean Smith, "Trusted Virtual Containers on Demand", The Fifth Annual Workshop on Scalable Trusted Computing (STC '10). October 4, 2010. Chicago, IL.
- Katelin Bailey, Apu Kapadia, Linden Vongsathorn and Sean Smith, "TwoKind Authentication: Protecting Private Information in Untrustworthy Environments", Proceedings of the Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08), Alexandria, VA, October 27, 2008
- Christopher Carella, Jeff Dike, Naomi Fox and Mark Ryan, "UML Extensions for Honeypots in the ISTS Distributed Honeypot Project", Proceedings of the 2004 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY 10-11 June
- Aarathi Prasad, Jacob Sorber, Denise Anthony and David Kotz, "Understanding Sharing Preferences and Behavior for mHealth Devices", 19th ACM Conference on Computer and Communications Security
Raleigh, NC
pages 117-128, ACM Press. DOI 10.1145/2381966.2381983.
- Nicholas Lane, Shane B. Eisenman, Mirco Musolesi, Emiliano Miluzzo and Andrew Campbell, "Urban Sensing Systems: Opportunistic or Participatory", Proceedings of Ninth Workshop on Mobile Computing Systems and Applications (HotMobile 2008), Napa Valley, CA, February 25-26, 2008
- Massimiliano Pala and Scott Rea, "Usable Trust Anchor Management", Proceedings of the Identity and Trust on the Internet (IDtrust Symposiums), Gaithersburg, MD, April 14-16, 2009.
- Javed Aslam, Marco Cremonini, David Kotz and Daniela Rus, "Using Mobile Agents for Analyzing Intrusion in Computer Networks", Proceedings of the European Conference on Object Oriented Programming (ECOOP) 2001 Workshop on Mobile Object Systems, June 2001
- John Marchesini and Sean Smith, "Virtual Hierarchies: An Architecture for Building and Maintaining Efficient and Resilient Trust Chains", Proceedings of the 7th Nordic Workshop on Secure IT Systems--NORDSEC 2002. Karlstad University Studies. November 2002
- Rebecca Shapiro, Sergey Bratus and Sean Smith, "“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata", 7th Usenix Workshop on Offensive Technologies, August 13, 2013
- Ajit Appari, Denise Anthony and M. Eric Johnson, "Which Hospitals Are Complying with HIPAA: An Empirical Investigation of US Hospitals", Proceedings Of Third annual Workshop on Information Security and Privacy (WISP 2008), Paris, France, December 13, 2008.
Presentation
- Kevin O'Shea, "Cyber Attack Investigative Tools and Technologies", TAG Presentation at HTCIA, Silicon Valley, May 7 2003
- James Ford, Fillia Makedon, Li Shen, Tilmann Steinberg, Andrew Saykin and Heather Wishart, "Evaluation Metrics for User-Centered Ranking of Content in METADLs", Fourth DELOS Workshop on Evaluation of Digital Libraries: Testbeds, Measurements, and Metrics, Budapest, Hungary, May 2002
- Technical Analysis Group (TAG), "Examining the Cyber Capabilities of Islamic Terrorist Groups", November 2003
- George Bakos, "Honeypots in the Enterprise - Intelligence Based Risk Management", New York State Cyber Security Conference, Albany, NY, April 21-22, 2004
- George Bakos and Jay Beale, "How a Honeypot Can Add Value to Your Organization", Counter-Intelligence in Internet Security: Honeypot Best Practices, LasVegas, November 7-8, 2002
- George Bakos, "Internet Worms and the Dartmouth ICMP BCC: System", 5th Annual NYS Information Security Conference, Albany, NY, April 10-11, 2002
- Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson and Daniela Rus, "Kerf: Machine Learning to Aid Intrusion Analysts", Proceedings of the 13th USENIX Security Symposium, San Diego, CA, 9-13 August 2004
- David Nicol, Sean Smith, C Hawblitzel, E Feustel, John Marchesini and B Yee, "Survivable Trust for Critical Infrastructure", Internet2 Collaborative Computing in Higher Education: Peer-to-Peer and Beyond. January 2002
Self-Published Analysis Report
- Julie Cullen, Vincent Berk and Marion Bates, "A Theoretical Superworm", April 2002
- Investigative Research for Infrastructure Assurance, "Best Practices for E-Commerce Consumers", October 2002
- Michael Vatis, "Combating Terrorism", A Compendium of Recent Counterterrorism Recommendations from Authoritative Commissions and Subject Matter Experts, September 2001
- David Koconis, "Comprehensive Review of Windows 2000 Security Policy Templates and Security Configuration Tool", March 2001
- Technical Analysis Group (TAG), "Crisis Information Management Software (CIMS) Interoperability", October 2004
- Michael Vatis, "Cyber Attacks During the War on Terrorism: A Predictive Analysis", September 2001
- Eric Goetz, Vincent Berk, Guofei Jiang and Dan Burroughs, "Cyber Attack Techniques and Defense Mechanisms", June 2002
- Eric Goetz, "Cyber Security of the Electric Power Industry", December 2002
- Michael Vatis, "Cyber Terrorism: The State of U.S. Preparedness", September 2001
- Charles Billo and Welton Chang, "Cyber Warfare: An Analysis of the Means and Motivations of Selected Nation States", December 2004
- Eric Goetz, "Diversification of Cyber Threats", May 2002
- Eric Goetz and M. Eric Johnson, "Embedding Information Security Risk Management into the Extended Enterprise", Proceedings from a Workshop on Developing a Secure Organization, 2006
- Kevin C. Hudak and Maxwell Young, "First Responder Communications and Interoperability in New Hampshire ", PRS Policy Brief 0506-05, November 14 2006
- Eric Goetz, "Information and Telecommunications Sector Vulnerabilities and Threats", September 2002
- Robert Bruce, Scott Dynes, Hans Brechbühl, Bill Brown, Eric Goetz, Pascal Verhoest, Eric Luiijf and Sandra Helmus, "International Policy Framework for Protecting Critical Information Infrastructure: A Discussion Paper Outlining Key Policy Issues", TNO Report, June 2005
- Michael Vatis, "Law Enforcement Tools and Technologies for Investigating Cyber Attacks", June 2002
- Technical Analysis Group (TAG), "Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A National Research and Development Agenda", June 2004
- Technical Analysis Group (TAG), "Law Enforcement Tools and Technologies for Investigating Cyber Attacks: Gap Analysis Report", February 2004
- Cyber Security Exercise Development (CSED), "Livewire After-Action Report", March 2, 2004
- Eric Goetz, "On the Road to Transportation Security", February 2003
- Eric Goetz, "Survey and Analysis of Security Issues in the U.S. Banking and Finance Sector", September 2003
- Michael Freeman, Scott Dynes and Adam Golodner, "The Known Unknowns of Cyber Security and Cyber Terrorism", Working paper, 2004
- Eric Goetz, Guofei Jiang and William Stearns, "Viruses and Worms", March 2002
Self-Published Technical Report
- Y. Wang, Sean Smith and Andrew Gettinger, "Access Control Hygiene and the Empathy Gap in Medical IT", Dartmouth Computer Science Technical Report TR2012-713, (2012).
Also In Proceedings of the USENIX Workshop on Health Security and Privacy
3rd USENIX Workshop on Health Security and Privacy
Bellevue, WA
Published
August 6-7, 2012.
- S Sinclair, "Access Control In and For the Real World", Dartmouth Technical Report TR2013-745
- S Sinclair and Sean Smith, "Access Control Realities As Observed in a Clinical Medical Setting", Department of Computer Science, Dartmouth Technical Report TR2012-714, April 2012
- Soumendra Nanda, Zhenhui Jiang and David Kotz, "A Combined Routing Method for Wireless Ad Hoc Networks", Department of Computer Science, Dartmouth Technical Report TR2007-588, June 2007
- Gabriel Weaver, Scott Rea and Sean Smith, "A Computational Framework for Certificate Policy Operations", Department of Computer Science, Dartmouth Technical Report, TR2009-650, June 2009.
- Sergey Bratus, Cory Cornelius, Daniel Peebles and David Kotz, "Active behavioral fingerprinting of wireless devices", Department of Computer Science, Dartmouth Technical Report TR2008-610, March 25, 2008
- Meiyuan Zhao, Sean Smith and David Nicol, "Aggregated Path Authentication for Efficient BGP Security", Department of Computer Science, Dartmouth Technical Report TR2005-541, May 2005
- Keren Tan, "A Large-scale Wireless Local-area Network Measurement and Privacy Analysis", Department of Computer Science, Dartmouth Technical Report TR2011-703, August 2011
- Chris Bailey-Kellogg and Naren Ramakrishnan, "Ambiguity-Directed Sampling for Qualitative Analysis of Sparse Data from Spatially-Distributed Physical Systems", Dartmouth Computer Science Technical Report, TR2001-384, 2001
- Daniel Peebles, Cory Cornelius, Apu Kapadia, David Kotz, Minho Shin and Nikos Triandopoulos, "AnonyTL Specification", Dartmouth Computer Science Technical Report TR2010-660, January 2010
- Guanling Chen and David Kotz, "Application-Controlled Loss-Tolerant Data Dissemination", Dartmouth Computer Science Technical Report TR2004-488, February 2004
- Evan Sparks, "A Security Assessment of Trusted Platform Modules", Department of Computer Science, Dartmouth Technical Report TR2007-597, June 2007
- Kwang-Hyun Baek, Sean Smith and David Kotz, "A Survey of WPA and 802.11i RSN Authentication Protocols", Dartmouth Computer Science Technical Report TR2004-524. November 2004
- Patrick P. Tsang, Rouslan V. Solomakhin and Sean Smith, "Authenticated Streamwise On-line Encryption", Department of Computer Science, Dartmouth Technical Report TR2009-640, March 2009.
- Rich MacDonald, Sean Smith, John Marchesini and O Wild, "Bear: An Open-Source Virtual Secure Coprocessor based on TCPA", Department of Computer Science, Dartmouth Technical Report TR2003-471, August 2003
- Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean Smith, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version)", Department of Computer Science, Dartmouth Technical Report TR2007-601, September 2007
- Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean Smith, "BLAC: Revoking Repeatedly Misbehaving Anonymous Users Without Relying on TTPs", Department of Computer Science, Dartmouth Technical Report TR2008-635, October 1, 2008
- H Farid, "Creating and Detecting Doctored and Virtual Images: Implications to The Child Pornography Prevention Act", Department of Computer Science, Dartmouth Technical Report TR2004-518
- H Farid, "Detecting Steganographic Messages in Digital Images", Technical Report, TR2001-412, Dartmouth College, Computer Science
- Vincent Berk, Annarita Giani and George Cybenko, "Detection of Covert Channel Encoding in Network Packet Delays", Dartmouth Computer Science Technical Report TR2005-536, August 2005, revised November 2005
- H Farid, "Digital Image Ballistics from JPEG Quantization", Dartmouth Computer Science Technical Report, TR2006-583, September 2006
- Chrisil Arackaparambil, Sergey Bratus, Joshua Brody and Anna Shubina, "Distributed Monitoring of Conditional Entropy for Network Anomaly Detection", Department of Computer Science, Dartmouth Technical Report TR2009-653, July 2009.
- Kwang-Hyun Baek, Sergey Bratus, S Sinclair and Sean Smith, "Dumbots: Unexpected Botnets through Networked Embedded Devices", Department of Computer Science, Technical Report TR2007-591, May 2007
- Phil Fazio, "Effects of network trace sampling methods on privacy and utility metrics", Department of Computer Science, Dartmouth College TR2011-697, June 2011
- Julian Bangert, Sergey Bratus, Rebecca Shapiro, Michael Locasto, Jason Reeves, Sean Smith and Anna Shubina, "ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection ", Dartmouth Technical Report TR2013-727
- Cliff Changchun Zou, Don Towsley and Weibo Gong, "Email Virus Propagation Modeling and Analysis", University of Massachusetts, Amherst, Department of Computer Science Technical Report TR-CSE-03-04
- John Marchesini, Sean Smith, O Wild and Rich MacDonald, "Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear", Dartmouth Computer Science Technical Report, TR2003-476, December 2003
- Nihal D'Cunha, "Exploring the Integration of Memory Mangement and Trusted Computing", Department of Computer Science, Dartmouth College, Technical Report TR2007-594, May 2007
- A Popescu and H Farid, "Exposing Digital Forgeries by Detecting Duplicated Image Regions", Technical Report, TR2004-515, Dartmouth College, Computer Science
- Vincent Berk and George Cybenko, "File Sharing Protocols: A Tutorial on Gnutella", March 2001
- Sean Smith, Nicholas Goffee, Sung Kim, Punch Taylor, Meiyuan Zhao and John Marchesini, "Greenpass: Flexible and Scalable Authorization for Wireless Networks", Dartmouth Computer Science Technical Report, TR2004-484, January 7, 2004
- Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius and David Kotz, "Hide-n-Sense: Privacy-aware secure mHealth sensing", Dartmouth Computer Science Technical Report TR2011-702
- Guanhua Yan, "Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models", Dartmouth Computer Science Technical Report TR2005-558, September 2005
- M Johnson, "Lighting and Optical Tools for Image Forensics", Department of Computer Science, Dartmouth Technical Report TR2008-629, July 2008
- Sergey Bratus, Anna Shubina and Axel Hansen, "LZfuzz: a fast compression-based fuzzer for poorly documented protocols", Department of Computer Science, Dartmouth Technical Report TR2008-634, September 16, 2008
- M Johnson and H Farid, "Metric Measurements on a Plane from a Single Image", Dartmouth Computer Science Technical Report, TR2006-579, August 2006
- A Iliev and Sean Smith, "More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties", Dartmouth Computer Science Technical Report TR2005-551, July 2005
- Chrisil Arackaparambil, Sergey Bratus, Anna Shubina and David Kotz, "On the Reliability of Wireless Fingerprinting using Clock Skews", Department of Computer Science, Dartmouth Technical Report TR2010-661, January 2010.
- Peter Johnson, Apu Kapadia, David Kotz and Nikos Triandopoulos, "People-Centric Urban Sensing: Security Challenges for the New Paradigm", Dartmouth Computer Science Technical Report, TR2007-586, February 2007
- Meiyuan Zhao, "Performance Evaluation of Distributed Security Protocols Using Discrete Event Simulation", Dartmouth Computer Science Technical Report TR2005-559, October 2005
- Shloka Kini, "Please Take My Survey: Compliance with smartphone-based EMA/ESM studies", Dartmouth Technical Report TR2013-734. Senior Honors Thesis. Advisors: David Kotz and Shrirang Mare.
- Patrick P. Tsang and Sean Smith, "PPAA: Peer-to-Peer Anonymous Authentication", Department of Computer Science, Dartmouth Technical Report TR2008-615, April 8, 2008
- Keren Tan, Guanhua Yan, Jihwang Yeo and David Kotz, "Privacy Analysis of User Association Logs in a Large-scale Wireless LAN", Department of Computer Science, Dartmouth Technical Report TR2011-679
- Keren Tan, Guanhua Yan, Jihwang Yeo and David Kotz, "Privacy Analysis of User Association Logs in a Large-Scale Wireless LAN", Computer Science Department, Dartmouth Technical Report TR2011-679, January 2011
- Joseph Cooley and Sean Smith, "Privacy-Preserving Screen Capture: Closing the Loop for Medical Informatics Usability", Department of Computer Science, Dartmouth Technical Report TR2012-725, July 2012
- Vincent Berk, Wayne Chung, Valentino Crespi, George Cybenko, Robert Gray, Diego Hernando, Guofei Jiang, Han Li and Yong Sheng, "Process Query Systems for Surveillance and Awareness", Thayer School of Engineering
- Javed Aslam, David Kotz and Daniela Rus, "Sawmill: Infrastructure for Distributed Collaboration in Detecting Network Attacks", Feb. 2002
- Joseph Cooley, "Screen Capture for Sensitive Systems", Department of Computer Science, Dartmouth College TR2011-690, May 2011.
- K Minami and David Kotz, "Secure context-sensitive authorization", Dartmouth Computer Science Technical Report TR2004-529, December 2004
- Gabriel Weaver, "Semantic and Visual Encoding of Diagrams", Department of Computer Science, Dartmouth Technical Report TR2009-654, August 2009.
- Emma Smithayer, "Sensor-based system for verifying blood-pressure measurement position", Technical Report TR2012-720, Dartmouth Computer Science, June, 2012
- John Marchesini and Sean Smith, "SHEMP: Secure Hardware Enhanced MyProxy", Dartmouth Computer Science TR2005-532
- Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, Daniela Rus and Brett Tofel, "The Kerf Toolkit for Intrusion Analysis", Department of Computer Science and the Institute for Security Technology Studies, Dartmouth College, March 12, 2004
- Tim Williamson, Sean Smith and Denise Anthony, "The Quality of Open Source Production: Zealots and Good Samaritans in the Case of Wikipedia", Department of Computer Science, Dartmouth Technical Report TR2007-606, September 2007
- Valentino Crespi, George Cybenko and Guofei Jiang, "The Theory of Trackability with Applications to Sensor Networks", Dartmouth Computer Science Technical Report TR2005-555, August 2005
- A Iliev and Sean Smith, "Towards Tiny Trusted Third Parties", Dartmouth Computer Science Technical Report TR2005-547, July 2005
- Katelin Bailey, Apu Kapadia, Linden Vongsathorn and Sean Smith, "TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version)", Department of Computer Science, Dartmouth Technical Report TR2008-632, August 2008
- Dennis McGrath, "Unauthorized Access via the IRIX Telnetd Exploit in a College Computer Laboratory", November 21, 2000
- Cory Cornelius, "Usable Security for Wireless Body-Area Networks", Dartmouth Technical Report TR2013-741
Ph.D Dissertation. Advisor: David Kotz
- H Farid and J.B. Woodward, "Video Stabilization and Enhancement ", Department of Computer Science, Dartmouth Technical Report, TR2007-605, 2007
- Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare and David Kotz, "Vocal resonance as a biometric for pervasive wearable devices", Technical Report TR2014-747, Dartmouth Computer Science
- Yougu Yuan, Eileen Ye and Sean Smith, "Web Spoofing 2001", Dartmouth Computer Science Technical Report, TR2001-409, July 2001
- Eileen Ye, Yougu Yuan and Sean Smith, "Web Spoofing Revisited: SSL and Beyond", Dartmouth Computer Science Technical Report, TR2002-417, February 1, 2002
- Patrick P. Tsang and Sean Smith, "YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems", Department of Computer Science, Dartmouth Technical Report, TR2007-603, September 2007
Thesis (Masters)
- Zhenhui Jiang, "A Combined Routing Method for Ad hoc Wireless Networks", Masters Thesis, Dartmouth College, Computer Science Department, Hanover, NH, available as Technical Report TR2005-566, December 2005
- Yasir Ali, "Adding Public Key Security to SSH", Masters Thesis, Dartmouth College, Computer Science, Hanover, NH February 2003
- Ashwin Ramaswany, "Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing", Master of Science, Dartmouth College, Computer Science Department, Hanover, NH, available as a technical report TR2009-644, May 2009
- Anne Loomis, "Computation Reuse in Stacking and Unstacking", Masters Thesis, Dartmouth College, Computer Science Department, Hanover, NH; available as Technical Report TR2005-563, November 4, 2005
- Anne Loomis, "Computation Reuse in Statics and Dynamics Problems for Assemblies of Rigid Bodies", Dartmouth Computer Science Technical Report, TR2006-576, June 2006
- Ashwin Ramaswany, "Detecting kernel rootkits", Department of Computer Science, Dartmouth Technical Report TR2008-627, September 2, 2008
- K Kain, "Electronic Documents and Digitial Signatures", Masters Thesis, Dartmouth College, Computer Science Department, May 30, 2003
- Aarathi Prasad, "Exposing Privacy Concerns in mHealth Data Sharing", Department of Computer Science, Dartmouth Technical Report TR2012-711, February 2012
Note: M.S. Thesis. Advisor: David Kotz.
- Nicholas Goffee, "Greenpass Client Tools for Delegated Authorization in Wireless Networks", Masters Thesis, Dartmouth College, Computer Science Department, Hanover, NH, June 3, 2004
- Sung Kim, "Greenpass RADIUS Tools for Delegated Authorization in Wireless Networks", Masters Thesis, Dartmouth College, Computer Science Department, Hanover, NH, June 3, 2004
- A Barsamian, "Network Characterization for Botnet Detection Using Statistical-Behavioral Methods", Masters Thesis, Dartmouth College, Thayer School of Engineering, Hanover, NH, June 2009.
- Douglas Madory, "New Methods of Spoof Detection in 802.11b Wireless Networking", Masters Thesis, Dartmouth College, Thayer School of Engineering, Hanover, NH, June 2006
- Jue Wang, "Performance Evaluation of a Resource Discovery Service", Masters Thesis, Dartmouth College, Computer Science Department, Hanover, NH, available as Technical Report TR2004-513, October 2004
- Jue Wang, "Performance Evaluation of Solars Resource Discovery Service", Masters Thesis, Dartmouth College, Computer Science Department, Hanover, NH, October 5, 2004
- Chad Behre, "Practical Autonomic Computing: Performance Monitoring for Instability Prediction", Master Thesis, Dartmouth College, Thayer School of Engineering, Hanover, NH, January 2008.
- Christopher Roblee, "Process Query Systems: Advanced Technologies for Process Detection and Tracking", Masters Thesis, May 2005
- Suzanne Wendelken, "Using a Forehead Reflectance Pulse Oximeter to Detect Changes In Sympathetic Tone", Masters Thesis, Dartmouth College, Thayer School of Engineering, Hanover, NH 2004
Thesis (PhD)
- Udayan Deshpande, "A Dynamically Refocusable Sampling Infrastructure for 802.11 Networks", Department of Computer Science, Dartmouth Technical Report TR2008-620, May 29, 2008
- Chrisil Arackaparambil, "Anomaly Detection in Network Streams Through a Distributional Lens", Department of Computer Science, Dartmouth Technical Report TR2011-707, September 2011 Note: Ph.D Dissertation. Advisor: Amit Chakrabarti
- Sheng Zhang, "Building Trustworthy Recommender Systems", Ph.D. Thesis, Dartmouth College, Computer Science Department, Hanover, NH, February 2007
- Weihong Wang, "Digital Video Forensics", Ph.D. Thesis, Dartmouth College, Computer Science Department, Hanover, NH, June 2009.
- Ming Li, "Group-Aware Stream Filtering", Department of Computer Science, Dartmouth Technical Report TR2008-621, May 2008
- Soumendra Nanda, "Mesh-Mon: a Monitoring and Management System for Wireless Mesh Networks", Department of Computer Science, Dartmouth Technical Report TR2008-619, May 2008
- S Lyu, "Natural Image Statistics for Digital Image Forensics", Ph.D. Thesis, Dartmouth College, Computer Science, Hanover, NH, August 2005
- Shane B. Eisenman, "People-Centric Mobile Sensing Networks", Ph.D. Thesis, Columbia University, October 2008
- K Minami, "Secure Context-sensitive Authorization", Ph.D. Thesis, Dartmouth College, Computer Science, Hanover, NH (available as Technical Report TR2006-571), February 2006
- Anna Shubina, "Settling for Limited Privacy: How Much Does it Help?", Ph.D. Thesis, Dartmouth College, Computer Science Department, Hanover, NH, November 2007
- Guanling Chen, "Solar: Building A Context Fusion Network for Pervasive Computing", Ph.D. Thesis, Dartmouth College, Computer Science Department, Hanover, NH, August 2004
- A Popescu, "Statistical Tools for Digital Image Forensics", Ph.D. Thesis, Dartmouth College, Computer Science, Hanover, NH, December 2004
- Yong Sheng, "The Theory of Trackability and Robustness for Process Detection", Ph.D. Thesis, Dartmouth College, Thayer School of Engineering, Hanover, NH, August 2006
Thesis (Senior)
- Samuel Nelson, "A Simulation Study of Connectivity Metrics for Wireless Ad Hoc Networks", Bachelor of Science with Honors in Computer Science, Bucknell University, Lewisburg, PA, May 2006
- Loren Sands-Ramshaw, "Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration", Department of Computer Science, Dartmouth Technical Report TR2010-668, June 2010
- Nicholas Santos, "Limited Delegation (Without Sharing Secrets) for Web Applications", Dartmouth Computer Science Technical Report TR2006-574, May 31, 2006
- Jeffrey Fielding, "Linkability in Activity Inference Data Sets", Department of Computer Science, Dartmouth Technical Report TR2008-623, June 2008