Publications in Journals, Conferences and Magazines
Chem / Bio Protection
- Sriram Srinivasan, Gavin Barnard and Tillman Gerngross, "A Novel High-Cell-Density Protein Expression System Based on Ralstonia eutropha", Applied and Environmental Microbiology, December 2002, 68(12):5925-5932
- Sriram Srinivasan, Tillman Gerngross, Gavin Barnard and Grant Henderson, "High level recombinant protein expression in Ralstonia eutropha using T7 RNA polymerase based amplication", Protein Expression and Purification, December 2004, 38(2): 264-271
- Markus Testorf and M. Fiddy, "k-Space design methods for optical and imaging ", SPIE Proc. Vol. 6316, pp. 63160H (2006)
- Markus Testorf, "Nano-optics: Fitting a new emperor into old clothes", IEEE URIS/APS, Albuquerque, New Mexico, July 2006
- Markus Testorf, "Nanophotonics based matched spectroscopy", Proceeding of the Optical Society of Americas Annual Meeting - Frontiers in Optics 2006(OSA), Rochester, NY, 8-12 October 2006
Cognitive Hacking
- Paul Thompson, "Categorization: Information and Misinformation", ASIS&T 2001: Information in a Networked World: Harnessing the Flow Washington, D.C., 2-8 November 2001
- George Cybenko, Annarita Giani and Paul Thompson, "Cognitive Hacking: A Battle for the Mind", IEEE Computer, August 2002, 35(8): 50-56
- Paul Thompson, "Cognitive Hacking and Digital Government: Digital Identity", Proceedings of the International Conference on Politics and Information Systems: Technologies and Applications, Orlando, FL, 2 August, 2003
- Paul Thompson, "Cognitive Hacking and Intelligence and Security Informatics", Proceedings of the Defense and Security Symposium (SPIE 2004), Orlando, Florida, April 12-16, 2004
- George Cybenko, Paul Thompson and Annarita Giani, "Cognitive Hacking and the Value of Information", Workshop on Economics and Information Security, Berkeley, CA, 16-17 May, 2002
- Carey Heckman, George Cybenko, Annarita Giani and Paul Thompson, "Cognitive Hacking: Technological and Legal Issues", Law Tech 2002, 7-9 November, 2002
- Paul Thompson, "From Probabilistic Information Retrieval to Question Answering in the InfoSphere", National Energy Research Scientific Computing Center seminar series Lawrence Berkeley National Laboratory University of California, Berkeley, 15 May 2002
- Paul Thompson and Steven Lulich, "Question Answering in the Infosphere: Semantic Interoperability and Lexicon Development", Language Evaluation Resources Conference Workshop on Question Answering Strategies, May 28, 2002, Las Palmas de Gran Canaria, Spain
- Paul Thompson, "Utility - Theoretic Information Retrieval, Cognitive Hacking, and Intelligence and Security Informatics", Proceedings of the 7th International Conference on Computer Science and Informatics, Cary, NC, 28 September, 2003
Computer Security and Vulnerabilities
- David Nicol, Sean Smith and Meiyuan Zhao, "Aggregated Path Authentication for Efficient BGP Security", Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, 7-11 November 2005, 128-138
- Brian Levine, Clay Shields, Micah Adler and Matthew Wright, "An Analysis of the Degradation of Anonymous Protocols", Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), San Diego, CA, 6-8 February 2002, 38-50
- Michael Locasto and S Sinclair, "An Experience Report on Undergraduate Cyber-Security Education and Outreach", Proceedings of the Second Annual Conference on Education in Information Security (ACEIS), Ames, Iowa, February 19-20, 2009.
- Maurice Aburdene, Xiannong Meng and Felipe Perrone, "Approaches to Undergraduate Instruction in Computer Security", Proceedings of the 2005 American Association for Engineering Education Conference and Exposition, Portland, Oregon, 12-15 June, 2005
- Vincent Berk, George Cybenko and Annarita Giani, "Data Exfiltration and Covert Channels", Proceedings of the SPIE Vol. 6201, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV Orlando, Florida, April 2006
- M. Eric Johnson and Eric Goetz, "Embedding Information Security into the Organization", IEEE Security and Privacy, May/June 2007 (Vol. 5, No. 3)
- George Cybenko, David Robinson and Vincent Berk, "Online Behavioral Analysts and Modeling Methodology (OBAMM)", Proceedings of the First International Workshop on Social Computing, Behavioral Modeling, and Prediction (SBP 2008), Phoenix, AZ, April 1-2, 2008
- Sean Smith, Doug McIlroy, Alex Ferguson and Sergey Bratus, "Pastures: Towards Usable Security Policy Engineering", Proceedings of the Second International Conference on Availability, Reliability and Security, IEEE Computer Society, pages 1052-1059, April 2007
- Panagiotis Papadimitratos and Zygmunt J. Haas, "Secure Routing for Mobile Ad hoc Networks", Proceedings of the SCS Communication Networks and Distributed Systems, Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, 27-31 January 2002
- Fabeah Adu-Oppong, Casey Gardiner, Apu Kapadia and Patrick P. Tsang, "Social Circles: Tackling Privacy in Social Networks ", Proceedings of the Fourth Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, July 23-25, 2008
- Brian Levine, Matthew Wright, Clay Shields and Micah Adler, "The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems", ACM Transactions on Information and System Security (TISSEC), 4(7): 489-522, November 2004
- Jinghua Hu, Weibo Gong and David L. Pepyne, "User Profiling for Computer Security ", Proceedings of the 2004 American Control Conference, Boston, Massachusetts, 30 June - 2 July 2004
Digital Image Forensics
- S Lyu, D Rockmore and H Farid, "A Digital Technique for Art Authentication", Proceedings of the National Academy of Sciences, 101(49):17006-17010, 2004
- H Farid, S Lyu and D Rockmore, "A Digital Technique for Authentication in the Visual Arts", International Foundation for Art Research, (8)2:12-23, 2006
- H Farid and A Popescu, "Blind Removal of Image Non-Linearities", Proceedings of the 8th International Conference on Computer Vision (ICCV), Vancouver, Canada, 9-12 July 2001
- H Farid and M Johnson, "Detecting Photographic Composites of People", Proceedings of the 6th International Workshop on Digital Watermarking, Guangzhou, China, November 21-23, 2007
- H Farid and Weihong Wang, "Detecting Re-Projected Video", Proceedings of the 10th International Workshop on Information Hiding, Santa Barbara, CA, May 19-21, 2008
- H Farid, "Digital Forensics: How Experts Uncover Doctored Images", Scientific American, June 2008
- H Farid, "Digitial Doctoring: How to tell the real from the fake", Significance, 3(4):162-166, 2006
- H Farid and M Johnson, "Exposing Digital Forgeries by Detecting Inconsistencies in Lighting", ACM Multimedia and Security Workshop, New York City, August 1, 2005
- A Popescu and H Farid, "Exposing Digital Forgeries by Detecting Traces of Re-sampling", IEEE Transactions on Signal Processing, 53(2):758-767, 2005
- H Farid, "Exposing Digital Forgeries from JPEG Ghosts", IEEE Transactions on Information Forensics and Security, 4(1):154-160, 2009.
- H Farid and A Popescu, "Exposing Digital Forgeries in Color Filter Array Interpolated Images", IEEE Transactions on Signal Processing, 53(10):3948-3959, 2005
- H Farid and M Johnson, "Exposing Digital Forgeries in Complex Lighting Environments", IEEE Transactions on Information Forensics and
Security, Volume 2, Number 3, pp. 450-461, September 2007
- Weihong Wang and H Farid, "Exposing Digital Forgeries in Interlaced and De-Interlaced Video", IEEE Transactions on Information Forensics and Security, Number 2, Volume 3, pp. 438-449, 2007
- H Farid, "Exposing Digital Forgeries in Scientific Images", Proceedings of the 8th ACM Multimedia and Security Workshop, Geneva, Switzerland, 26-27 September 2006
- H Farid and Weihong Wang, "Exposing Digital Forgeries in Video by Detecting Double MPEG Compression", Proceedings of the 8th ACM Multimedia and Security Workshop, Geneva, Switzerland, 26-27 September 2006
- H Farid and Weihong Wang, "Exposing Digital Forgeries in Video by Detecting Duplication", Proceedings of the 9th ACM Multimedia and Security Workshop, Dallas, TX, September 20-21, 2007
- H Farid and M Johnson, "Exposing Digital Forgeries Through Chromatic Aberration", Proceedings of the 8th ACM Multimedia and Security Workshop, Geneva, Switzerland, 26-27 September 2006
- H Farid and M Johnson, "Exposing Digital Forgeries Through Specular Highlights on the Eye ", 9th International Workshop on Information Hiding, Saint Malo, France, June 2007
- S Lyu and H Farid, "Higher-Order Wavelet Statistics and their Application to Digital Forensics", IEEE Workshop on Statistical Analysis in Computer Vision (in conjunction with CVPR), Madison, Wisconsin, 2003
- H Farid and S Lyu, "How Realistic is Photorealistic", IEEE Transactions on Signal Processing, 53(2):845-850, 2005
- S Lyu, "Mercer Kernels for Object Recognition with Local Features", Proceedings of the International Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, 20-25 June 2005
- A Popescu and H Farid, "Statistical Tools for Digital Forensics", 6th International Workshop on Information Hiding, Toronto, Canada, 2004
E-Commerce
- M. Eric Johnson, "A broader context for information security", Financial Times, September 16, 2005
- G Pantziou, Fillia Makedon, C Sudborough and M Conalis-Kontos, "A Safe Information Sharing Framework for E-Government Communication", Proceedings of the Electronic Democracy: Information Society and Citizens Rights, Athens, Greece, September 2003
- Yan Zhao, B Sudborough, Z Xiao, Fillia Makedon, Song Ye and Tilmann Steinberg, "A Security Incident Sharing and Classification System for Building Trust in Cross Media Enterprises", CMSD-2003, International Conference on Cross-Media Service Delivery, Greece, May 2003
- Sarantos Kapidakis, Fillia Makedon, Li Shen, Tilmann Steinberg and Song Ye, "Data Brokers: Building Collections Through Negotiation", in submission to EJETA.org
- Sean Smith, R Asokan and K Kain, "Digital Signatures and Electronic Documents: A Cautionary Tale", IFIP Conference on Communications and Multimedia Security. September 2002. Advanced Communications and Multimedia Security. Kluwer Academic Publishers. pp. 293-307. September 2002
- Yan Zhao, Song Ye, L Wang, Fillia Makedon, Carey Heckman, A Meer and Tilmann Steinberg, "Ecomrisk.org, An E-Commerce Security Resource", Proceedings of the Computer Science and Information Technologies (CSIT), Patras, Greece, September 2002
- Vangelis Karkaletsis, Illias Maglogiannis, Georgios Giannakopoulos, Fillia Makedon, George Vassilakopoulos and James Ford, "Health Grid Cyberinfrastructure: Computational Perspectives", Proceedings of the 4th ICICTH International Conference on Information Communication Technologies in Health, Samos Island, Greece, 13-15 July 2006
- Sarantos Kapidakis, Heather Wishart, Andrew Saykin, Tilmann Steinberg, Li Shen, James Ford and Fillia Makedon, "MetaDL: A Digital Library of Metadata for Sensitive or Complex Research Data", European Conference on Digital Libraries (ECDL2002), Rome, Italy, September 2002
- Yuhang Wang, Heather Wishart, Aria Tzika, Laurence Rahme, Tilmann Steinberg and Fillia Makedon, "Multi-Functional Data Collection Interfaces for Biomedical Research Collaboration", Human-Computer Interface International, Crete, Greece, June 2003
- Fillia Makedon, W Zheng, James Ford, Sheng Zhang and Yi Ouyang, "Node Clustering Based on Link Delay in P2P Networks", Proceedings of the 20th Annual ACM Symposium on Applied Computing (SAC05-DSGC), Santa Fe, NM, 13-17 March 2005
- Yan Zhao, Song Ye and Fillia Makedon, "On the Design and Implementation of a Web-Based Negotiation System", Proceedings of the 9th Panhellenic Conference on Informatics (PCI 2003), Thessaloniki, Greece, November 2003
- Yan Zhao, Fillia Makedon, James Ford, Tilmann Steinberg, Song Ye, Li Shen, Yuhang Wang and Sarantos Kapidakis, "SCENS - A System for the Mediated Sharing of Sensitive Information", JCDL 2003: Joint Conference on Digital Libraries, Houston, Texas, May 2003
- Li Shen, Tilmann Steinberg, James Ford, Yi Ouyang, Yuhang Wang, W Zheng and Fillia Makedon, "Tracking Resource Usage Using Heterogeneous Feature Spaces with Local Exceptions", Proc. ClustWeb 04, workshop of EDBT 04, 9th International Conference on Extending Database Technology, Crete, Greece, March 2004
- Sean Smith and Anna Shubina, "Using caching for browsing anonymity", ACM SIGecom Exchanges, Vol. 4, No. 2, September 2003, pages 11-20
- Sean Smith, "WebALPS: A Survey of E-Commerce Privacy and Security Applications", ACM SIGecom Exchanges, September 2001, 2(3): 29-36
Emergency Response
- Susan McGrath, Katherine Farmer and George Blike, "An Experimental Architecture for Observation of Triage Related Decision Making", IEEE Engineering in Medicine and Biology Annual Conference, Lyon, France, August, 2007
- Suzanne Wendelken, Susan McGrath and Stephen Linder, "A preliminary study of respiratory variations in the photoplethysmogram during lower body negative pressure", Proceeding of the 19th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2006), Salt Lake City, UT, 22-23 June 2006
- Marion Bates, Amy Hunt and Dennis McGrath, "A Simple Distributed Simulation Architecture for Emergency Response Exercises", Proceedings of the 9th IEEE International Symposium on Distributed Simulation and Real-time Applications (DS-RT 2005), Montreal, Canada, 10-12 October 2005, 221-227
- Michael Hart, Robert Harris, Susan McGrath, Veljko Popov and Josh Pyke, "A Tele-ultrasound System for Real-time Medical Imaging in Resource-limited Settings", IEEE Engineering in Medicine and Biology Annual Conference, Lyon, France, August, 2007
- Jeffrey Clayman, Stephen Linder and Suzanne Wendelken, "Detecting Exercise Induced Stress using the Photoplethysmogram", Proceeding of the IEEE International Conference of the Engineering in Medicine and Biology Society, New York, NY, 30 August 2006
- Janelle Chang, Susan McGrath, Metin Akay, George Blike and Suzanne Wendelken, "Investigating Respiratory Variation in the Plethysmograph to Identify Obstructive Sleep Apnea", Proceedings of the Society for Technology in Anesthesia Conference, Miami, FL, January 2005
- Benjamin Farmer and M. Eric Johnson, "NetHope-Collaborating for the Future of Relief and Development", Microsoft Corp., Seattle, May 8-9, 2007
- Mark Stanovich, "Network-Centric Emergency Response: Training for a New Command and Control Paradigm", Journal of Emergency Management, ISSN: 1543-5865, Vol 4, Number 2, March/April 2006, pages 57-64
- David Kotz and K Minami, "Secure context-sensitive authorization", Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai, Hawaii, 8-12 March 2005, 257-268
- K Minami and David Kotz, "Secure Context-sensitive Authorization", Journal of Pervasive and Mobile Computing, 1(1): 123-156, March 2005
- Dennis McGrath and Susan McGrath, "Simulation and Network-Centric Emergency Response", Proceedings of the 2005 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC), Orlando FL, November 28 - December 1, 2005
- Dennis McGrath, Doug Hill and Mark Ryan, "Simulation Interoperability with a Commercial Game Engine", European Simulation Interoperability Workshop 2005, 27-30 June 2005
- Christopher Carella and Dennis McGrath, "Synthetic Environments for Emergency Response Simulation", Proceedings of the 2005 Game Developers Conference, San Jose, CA, 7-11 March 2005
- Doug Hill and Dennis McGrath, "UnrealTriage: A Game-Based Simulation for Emergency Response", Proceedings of the Huntsville Simulation Conference, Huntsville, AL, October 2004
- Bethany Knorr, George Blike and Susan McGrath, "Using a Generalized Neural Network to Identify Airway Obstructions in Anesthetized Patients Post-Operatively Based on Photoplethysmography", In Proceedings of the 28th Annual Engineering in Medicine and Biology Conference, New York, NY, September 2006
- Susan McGrath, Stephen Linder and Suzanne Wendelken, "Using PPG Morphology to Detect Blood Sequestration", Proceedings of the Society for Technology in Anesthesia Annual Meeting, San Diego, CA. January 2006. Best New Technology Award
- Suzanne Wendelken, Edward Wei, Susan McGrath and Stephen Linder, "Using the Morphology of Photoplethysmogram Peaks to Detect Changes in Posture", Journal of Clinical Monitoring and Computing (2006), 20:151-158
- Stephen Linder and Suzanne Wendelken, "Using the Morphology of the Photoplethysmogram Envelope to Automatically Detect Hypovolemia", Proceedings of the 19th IEEE International Symposium on Computer-Based Medical Systems, Salt Lake City, UT, 22-23 June 2006
Healthcare
- David Kotz, "A threat taxonomy for mHealth privacy", Proceedings of the NetHealth 2011: Workshop on Networked Healthcare Technology, Bangalore, India, January 2011.
- M. Eric Johnson and Nicholas Willey, "Will HITECH Heal Patient Data Hemorrhages?", Proceedings of the 44th Hawaii International Conference on System Sciences, Kauai, HI, January 4-7, 2011.
HoneyPots
- George Bakos and Sergey Bratus, "Ubiquitous Redirection as Access Control Response", Proceedings of the 3rd Annual Conference on Privacy, Security and Trust (PST2005), New Brunswick, Canada, 12-14 October 2005
- Mark Ryan, Christopher Carella, Jeff Dike and Naomi Fox, "UML Extensions for Honeypots in the ISTS Distributed Honeypot Project", Proceedings of the 2004 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY 10-11 June
Information Security and Privacy
- David Kotz, Keren Tan, Guanhua Yan and Jihwang Yeo, "A Correlation Attack Against User Mobility Privacy in a Large-scale WLAN network", In Proceedings of the ACM MobiCom'10 S3 workshop, pages 33-35, September, 2010. ACM Press
- David Kotz, Sasikanth Avancha and Amit Baxi, "A Privacy Framework for Mobile Health and Home-Care Systems", Proceedings of the Security and Privacy in Medical and Home-Care Systems Workshop (SPIMACS), Chicago, IL, November 13, 2009.
- David Kotz and Aarathi Prasad, "Can I access your Data? Privacy Management in mHealth.", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- Anna Shubina, Chrisil Arackaparambil, Sergey Bratus and Joshua Brody, "Distributed Monitoring of Conditional Entropy for Anomaly Detection in Streams", Proceedings of the IEEE Workshop on Scalable Stream Processing Systems (SSPS) [part of the Parallel Distributed Processing, Workshops and PhD Forum (IPDPSW)] . April 19-23, 2010, Atlanta, GA
- Joseph Cooley and Sean Smith, "Dr. Jekyll or Mr. Hyde: Information Security in the Ecosystem of Healthcare", 1st USENIX Workshop on Health Security and Privacy. HealthSec '10. Washington, DC, on August 10, 2010.
- Andrew Campbell, Emiliano Miluzzo and Tianyu Wang, "EyePhone: Activating Mobile Phones with Your Eyes", Proceedings of The Second ACM SIGCOMM Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld'10), New Delhi, India, August 30, 2010
- Nicholas Willey and M. Eric Johnson, "Healthcare Data Hemorrhages: Inadvertent Disclosure and HITECH", Proceedings from the IEEE Symposium on Security and Privacy, Oakland, California, May 16- 19, 2010.
- M. Eric Johnson, Ajit Appari and Denise Anthony, "HIPAA Compliance: An Examination of Institutional and Market Forces", Proceedings of the 8th Workshop on Economics of Information Systems (WEIS 2009), London, England, June 24-25, 2009.
- M. Eric Johnson, Denise Anthony and Ajit Appari, "HIPAA Compliance: An Institutional Theory Perspective", in Proceedings of the 15th Americas Conference on Information Systems, San Francisco, CA, August 6-9, 2009.
- M. Eric Johnson, Ajit Appari and Denise Anthony, "Impact of Health Information Technology Portfolio on Hospital Quality: A National Study of U.S. Acute Care Facilities", AcademyHealth's Annual Research Meeting (ARM). June 26-28, 2010. Boston, MA.
- Xia Zhao and M. Eric Johnson, "Information Governance: Flexibility and Control through Escalation and Incentives", Proceedings of the Seventh Workshop on the Economics of Information Security (WEIS), Dartmouth College, June 26-27, 2008
- M. Eric Johnson and Igor Macura, "Information Risk and the Evolution of the Security Rating Industry", Proceedings of the 8th Workshop on the Economics of Information Security (WEIS 2009), University College London, England, June 24-25, 2009.
- M. Eric Johnson and Ajit Appari, "Information Security Risk and Privacy in Healthcare: Current State of Research", International Journal of Internet and Enterprise Management, 6(4), pp. 279-314, 2010.
- Shrirang Mare and David Kotz, "Is Bluetooth the right technology for mHealth?", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- S Sinclair, "Meta-Observations from an Outsider's Study of Clinical Environments", Inaugural Security and Privacy in Medical and Home-Care Systems (SPIMACS) Workshop, co-located with the 16th ACM Conference on Computer and Communications Security (CCS 2009). Chicago, IL, November 13, 2009
- Sean Smith, Anna Shubina, Sergey Bratus and Wyllys Ingersoll, "The Diversity of TPMs and its Effects on Development; A Case Study of Integrating the TPM into OpenSolaris", The Fifth Annual Workshop on Scalable Trusted Computing (STC '10). October 4, 2010. Chicago, IL.
- S Sinclair, Sean Smith and Stephanie Trudeau, "The effects of introspection on creating privacy policy", Eighth ACM Workshop on Privacy in the Electronic Society (WPES ’09), 2009
- Zach Zhou and M. Eric Johnson, "The Impact of Information Security Rating on Vendor Competition", Proceedings of the 15th Americas Conference on Information Systems, San Francisco, CA, August 6-9, 2009
- M. Eric Johnson and Zach Zhou, "The Impact of Information Security Ratings on Vendor Competition", Proceedings of the Third China Summer Workshop on Information Management (CSWIM 2009), Guangzhou, China, June 2009
- Zach Zhou and M. Eric Johnson, "The Impact of Information Security Ratings on Vendor Competition", Proceedings of the Eighth Workshop on the Economics of Information Security, University College London, England, June 24-25, 2009
- Zach Zhou and M. Eric Johnson, "The Impact of Professional Information Security Ratings on Vendor Competition", Twenty first Workshop on Information Systems and Economics (WISE 2009), Phoenix, December 14-15, 2009
- M. Eric Johnson, Denise Anthony and Ajit Appari, "The Neo-Institutional View of HIPAA Compliance in Home Health Care", Workshop on Information Security & Privacy (WISP09), December 14, 2009, Phoenix, AZ.
- Katelin Bailey and Sean Smith, "Trusted Virtual Containers on Demand", The Fifth Annual Workshop on Scalable Trusted Computing (STC '10). October 4, 2010. Chicago, IL.
- Massimiliano Pala and Scott Rea, "Usable Trust Anchor Management", Proceedings of the Identity and Trust on the Internet (IDtrust Symposiums), Gaithersburg, MD, April 14-16, 2009.
- M. Eric Johnson, Ajit Appari and Denise Anthony, "Which Hospitals Are Complying with HIPAA: An Empirical Investigation of US Hospitals", Proceedings Of Third annual Workshop on Information Security and Privacy (WISP 2008), Paris, France, December 13, 2008.
Infrastructure Protection
- XenoFontas Dimitropoulos, George Riley, Jintae Kim, David Nicol and Steven Ko, "A BGP Attack Against Traffic Engineering", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2005, 319-326
- Scott Dynes and M. Eric Johnson, "A Field Study of Extended Enterprise Security", Proceedings of the CABIT 3rd Annual Security Symposium, Tempe, AZ, 8-9 September 2005
- George Cybenko and Guofei Jiang, "A Simple Protocol for Infrastructure Monitoring and Management", IEEE 3rd Annual Workshop on Information Assurance, West Point, NY, June 17-19, 2002
- Scott Dynes, M. Eric Johnson and Eva Andrijcic, "Costs to the U.S. Economy of Information Infrastructure Failures: Estimates from Field Studies and Economic Data", Proceedings of the 5th Workshop on the Economics of Information Security (WEIS 2006), Cambridge University, England, 26-28 June 2006
- Guofei Jiang and George Cybenko, "Developing a Distributed System for Infrastructure Protection", IEEE IT Professional, July/August 2000, 2(4): 17-22
- Meiyuan Zhao, David Nicol and Sean Smith, "Evaluating the Performance Impact of PKI on BGP Security", 4th Annual PKI Research and Development Workshop. NIST/NIH/Internet2. April 2005
- Jeffrey Farris and David Nicol, "Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable Scada Systems", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December, 2005, 300-308
- Sankalp Singh, David Nicol and James Lyons, "Fast Model-Based Penetration Testing", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2005, 309-317
- Wayne Chung, Robert Savell, Jan-Peter Schutt and George Cybenko, "Identifying and Tracking Dynamic Processes in Social Networks", Proceedings of the SPIE Vol. 6201, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV Orlando, Florida, April 2006
- M. Eric Johnson, Scott Dynes and Hans Brechbühl, "Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm", Proceedings of the Fourth Workshop on the Economics of Information Security, Harvard University, June 2005
- Dennis McGrath, George Cybenko and Guofei Jiang, "Infrastructure web: distributed monitoring and managing critical infrastructures", Proceeding of SPIE Conference on Enabling Technologies for Law Enforcement and Security, Boston, MA, November 2000
- Guofei Jiang, "Inside the IIS Extended Unicode Vulnerability", SANS Windows Security Digest, 2001, 4(10)
- Sean Smith, Meiyuan Zhao and John Marchesini, "Keyjacking: Risks of the Current Client-side Infrastructure", Proceedings of the 2nd Annual PKI Research Workshop, Gaithersburg, MD, 28-29 April 2003
- Dennis McGrath, "Measuring the 4:11 Effect: The power failure and the Internet", IEEE Security & Privacy, 1(5):16-18, September/October 2003
- Sean Smith and John Marchesini, "Modeling Public Key Infrastructure in the Real World", Public Key Infrastructure: EurpoPKI 2005. Springer-Verlag LNCS, June 2005
- Guofei Jiang, "Multiple Vulnerabilities in SNMP", IEEE Security and Privacy (Supplement to IEEE Computer), 2002, 35(4), 2-4
- Michael Liljenstam and David Nicol, "On-Demand Computation of Policy Based Routes for Large-Scale Network Simulation", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2005, 217-223
- Sean Smith and Kwang-Hyun Baek, "Preventing Theft of Quality of Service on Open Platforms", In The First IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks, September 2005
- Sean Smith and A Iliev, "Privacy-Enhanced Credential Services", Proceedings of the 2nd Annual PKI Research Workshop, Gaithersburg, MD, 28-29 April 2003
- D Song, J Tygar, Sean Smith and A Perrig, "SAM: A Flexible and Secure Auction Architecture using Trusted Hardware", eJETA.org, January 2002, 1(1)
- James Ford, Fillia Makedon, Vassilios Spiliopoulos, Vangelis Karkaletsis and Zhengyi Le, "Secure Group Collaboration in an Open Healthcare Environment", Proceedings of the 4th ICICTH International Conference on Information Communication Technologies in Health, Samos Island, Greece, 13-15 July 2006
- Guofei Jiang and Han Li, "Semantic Message Oriented Middleware for Publish/Subscribe Network", Proceedings of the Defense and Security Symposium (SPIE 2004), Orlando, Florida, 12-16 April 2004
- Guofei Jiang and George Cybenko, "Temporal and Spatial Distributed Event Correlation for Network Security", Proceedings of the 2004 American Control Conference (ACC), Boston, MA, June-July 2004, 996-1001
- Paul Thompson, "Weak Models for Insider Threat Detection", Proceedings of the Defense and Security Symposium (SPIE 2004), Orlando, Florida, 12-16 April 2004
- Guofei Jiang, "Weak Process Models for Robust Process Detection", Proceedings of the Defense and Security Symposium (SPIE 2004) Orlando, Florida, 12-16 April 2004
Intrusion Detection and Analysis
- Douglas Madory, George Cybenko and Yong Sheng, "An Experimental Comparison of Hypothesis Management Approaches for Process Query Systems", Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, March 2005
- Guanling Chen, David Kotz and Jue Wang, "A Sensor-Fusion Approach for Meeting Detection", Workshop on Context Awareness at 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys), Boston, MA, 6-9 June 2004
- Kwong H. Yung, "Detecting Long Connection Chains of Interactive Terminal Sessions", Proceedings of the 5th International Symposium Recent Advances in Intrusion Detection (RAID 2002), Zurich, Switzerland, October 16-18 2002
- Douglas Madory, George Bakos, Ian Gregorio - de Souza, Vincent Berk, George Cybenko, Marion Bates and Annarita Giani, "Detection of Complex Cyber Attacks ", Proceedings of the SPIE Defense and Security Symposium, Vol. 6201, Orlando, FL, April 2006
- George Cybenko and Yong Sheng, "Distance Measure for Non-Parametric Weak Process Models", Proceedings of IEEE International Conference on Systems, Man and Cybernetic, Big Island, Hawaii, October 2005, pp.722-727
- Anna Shubina, Chrisil Arackaparambil, Sergey Bratus and Joshua Brody, "Distributed Monitoring of Conditional Entropy for Anomaly Detection in Streams", Proceedings of the IEEE Workshop on Scalable Stream Processing Systems (SSPS) [part of the Parallel Distributed Processing, Workshops and PhD Forum (IPDPSW)] . April 19-23, 2010, Atlanta, GA
- George Cybenko, Vincent Berk and Christopher Roblee, "Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems", Proceedings of the IEEE Autonomic Computing Conference, Seattle, WA, June 2005
- Matthew Burnside, Darrell Bethea and Michael Locasto, "Research Directions for Network Intrusion Recovery", Symposium on Usable Privacy and Security (SOUPS): Workshop on Usable IT Security Management (USM '08), Pittsburgh, PA, July 23-25, 2008
- Diego Hernando and Valentino Crespi, "Sampling Theory for Process Detection with Applications to Surveillance and Tracking", Proceedings of the SPIE Vol. 5403, Sensors and Command, Control, Communications, and Intelligence (C31) Technologies for Homeland Security and Homeland Defense III, Orlando, Florida, April 2004
- Sergey Bratus, Virgil Pavlu and Javed Aslam, "Semi-supervised data organization for interactive anomaly analysis", Proceedings of the 5th International Conference on Machine Learr (ICMLA 06), Orlando, FL, 14-16 December 2006
- Javed Aslam, Ron Peterson, Brett Tofel, Daniela Rus, David Kotz and Sergey Bratus, "The Kerf toolkit for intrusion analysis", IEEE Security and Privacy, November/December 2004, 2(6): 42-52
- Daniela Rus, Ron Peterson, David Kotz, Sergey Bratus and Javed Aslam, "The Kerf toolkit for intrusion analysis", IAnewsletter, Summer 2005, 8(2): 12-16
- Yong Sheng, Valentino Crespi and George Cybenko, "Trackability in complex situations and environments", Unattended Ground, Sea, and Air Sensor Technologies and Applications VIII Conference, Orlando, FL, April 2006
- Denise Anthony, Eileen Ye and Sean Smith, "Trusted Paths for Browsers", ACM Transactions on Information System Security, 2005, 8(2): 153-186
- Sean Smith and Eileen Ye, "Trusted Paths for Browsers", 11th Usenix Security Symposium. August 2002
- David Kotz, Daniela Rus, Marco Cremonini and Javed Aslam, "Using Mobile Agents for Analyzing Intrusion in Computer Networks", Proceedings of the European Conference on Object Oriented Programming (ECOOP) 2001 Workshop on Mobile Object Systems, June 2001
Network Simulation
- Jason Liu, Robert Gray, Calvin Newport, David Kotz, David Nicol, Felipe Perrone and Yougu Yuan, "Empirical Validation of Wireless Models in Simulations of Ad Hoc Routing Protocols", Simulation: Transactions of the Society for Modeling and Simulation International, April 2005, 81(4): 307-323
- David Nicol, Meiyuan Zhao and Sean Smith, "Evaluation of Efficient Security for BGP Route Announcements using Parallel Simulation", Simulation Modelling Practice and Theory, 12(3-4): 187-216, 2004
- Amy Hunt, Dennis McGrath and Doug Hill, "IC2020: Embedded Simulation for Next Generation Incident Command Software", Proceedings of the 2006 Huntsville Simulation Conference, Huntsville, AL, 18-19 October 2006
- Timothy Smith, Doug Hill, Amy Hunt, Mark Ryan and Dennis McGrath, "NetSim: A Distributed Network Simulation to Support Cyber Exercises", Proceedings of the Huntsville Simulation Conference, Huntsville, AL, October 2004
- Yougu Yuan, Jason Liu, Michael Liljenstam, Chris Grier, Guanhua Yan and David Nicol, "RINSE: the Real-time Immersive Network Simulation Environment for Network Security Exercises", Workshop on Principle of Advanced and Distributed Simulation, June 2005
- David Nicol, Michael Goldsby and Michael Johnson, "Simulation Analysis of Virtual Geographic Routing", Proceedings of the Winter Simulation Conference, Washington, DC, 5-8 December 2004, Pages 857-865
- Guanhua Yan and David Nicol, "Simulation of Network Traffic at Coarse Time-scales", Workshop on Principles of Advanced and Distributed Simulation, June 2005
Robotics
- Igor Paprotny, Craig D. McGray, Christopher G. Levey, Bruce R. Donald and Daniela Rus, "An Untethered, Electrostatic, Globally-Controllable MEMS Micro-Robot", Journal of Microelectromechanical Systems, 2006, 15(1):1-15
- Igor Paprotny, Bruce R. Donald, Daniela Rus, Craig D. McGray and Christopher G. Levey, "A Steerable, Untethered, 250 x 60 micrometer MEMS Mobile Micro-Robot", Proceedings of 12th International Symposium of Robotics Research (ISRR), San Francisco, CA, 12-15 October 2005
- L.R. Ray, "Autonomous Terrain Parameter Estimation for Wheeled Vehicles", Proceedings of the SPIE Defense and Security, Intelligent and Unmanned Systems Conference, Orlando, Florida, March 2008.
- Anne Loomis and Devin Balkcom, "Computation reuse for rigid-body dynamics", Proceedings of the 2006 International Conference on Intelligent Robots and Systems, Beijing, China, October 9-15, 2006
- Yael Hanein, Y. Wang, W. Wang, Daniel Schwartz, Jiandong Fang, Karl F. Bohringer and Xiaorong Xiong, "Controlled multibatch self-assembly of microdevices", Journal of Microelectromechanical Systems, 2003. 12(2): p. 117-127
- Devin Brande, James Joslin, John Murphy and L.R. Ray, "Cooperative Control of Autonomous Mobile Robots in Unknown Terrain", Proceedings of the 2006 ASME International Mechanical Engineering Conference and Exposition, Chicago, Illinois, November 5-10 2006
- MohammadTaghi Hajiaghayi, Erik D. Demaine and Jonathan L. Bredin, "Deploying Sensor Networks with Guaranteed Capacity and Fault Tolerance", Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), Urbana-Champaign, IL, 25-28 May 2005
- James Joslin, Devin Balkcom, Devin Brande, Jon Barlow, John Murphy and L.R. Ray, "Dynamic Mobile Robots for Emergency Surveillance and Situational Awareness", IEEE International Workshop on Safety, Security, and Rescue Robotics, August 2006
- Xiaorong Xiong, Sheng-Hsiung Liang and Karl F. Bohringer, "Geometric Binding Site Design for Surface-Tension Driven Self-Assembly", Proceedings of the IEEE International Conference on Robotics and Automation (ICRA). New Orleans, LA, 2004
- Peter Corke, Daniela Rus and Ron Peterson, "Localization and Navigation Assisted by Networked Cooperating Sensors and Robots", The International Journal of Robotics Research, Vol. 24, No. 9, September 2005, pages 771-786
- A. Streeter, J.H. Lever and L.R. Ray, "Mobility and Power Budget for a Solar-Powered Polar Rover", Proceedings of the 10th European Conference of the International Society for Terrain-Vehicle Systems (ISTVS), Budapest, Hungary, 3 - 6 October, 2006
- J. Lienemann, Karl F. Bohringer, Yael Hanein, Xiaorong Xiong, J.G. Korvink and A. Greiner, "Modelling, Simulation and Experimentation of a Promising New Packaging Technology - Parallel Fluidic Self-Assembly of Micro Devices", Sensors Update, 2003. 13(1): p. 3-43
- Yael Hanein, Karl F. Bohringer, Xiaorong Xiong, Jiandong Fang and Daniel Schwartz, "Multi-batch Self-assembly for Microsystem Integration", Proceedings of the 3rd International Workshop on Microfactories (IWMF 02). Minneapolis, MN, 2002
- Karl F. Bohringer and Jiandong Fang, "Parallel micro component-to-substrate assembly with controlled poses and high surface coverage", IOP Journal of Micromechanics and Microengineering (JMM) 16:721-730, 2006
- L.R. Ray, A. Streeter and J.H. Lever, "Performance of a Solar-Powered Robot for Polar Instrument Networks", Proceedings of the 2006 IEEE International Conference on Robotics and Automation (ICRA 06), Orlando, FL, 15-19 May 2006
- Chris Bailey-Kellogg, Ryan Lilien, Bruce R. Donald and John J. Kelley, III, "Physical Geometric Algorithms for Structural Molecular Biology", Proceedings of the International Conference on Robotics and Automation (2001), Seoul, Korea, 21-26 May 2001
- Bruce R. Donald, Mike Sinclair, Daniela Rus, Craig D. McGray and Christopher G. Levey, "Power Delivery and Locomotion of Untethered Micro-Actuators", Journal of Microelectromechanical Systems, 2003,10(6):947-959
- Mike Sinclair, Daniela Rus, Craig D. McGray, Christopher G. Levey and Bruce R. Donald, "Power Delivery and Locomotion of Untethered Micro-Actuators", IEEE MEMS (Proceedings IEEE International Conference on Micro Electro Mechanical Systems), Kyoto, Japan, 19-23 January 2003, 124-129
- Sheng-Hsiung Liang, Xiaorong Xiong and Karl F. Bohringer, "Towards Optimal Designs for Self-alignment in Surface-tension Driven Micro-assembly", Proceedings of the IEEE Conference of Micro Electro Mechanical Systems (MEMS), Maastricht, Holland, 2004
- Karl F. Bohringer and Jiandong Fang, "Vertical and Horizontal Parallel Mounting of Micro Components on a Substrate with High Surface Coverage", Proceedings of the 19th IEEE International Conference on Micro Electro Mechanical Systems (MEMS 2006), Istanbul, Turkey, 22-26 January 2006
- Jiandong Fang and Karl F. Bohringer, "Wafer-Level Packaging Based on Uniquely Orienting Self-Assembly (The DUO-SPASS Processes)", Journal of Microelectromechanical Systems, Vol. 15, No. 3, June 2006
Securing Systems and Software
- Apu Kapadia, "A Case (Study) For Usability in Secure Email Communication", IEEE Security and Privacy, vol. 5, no. 2, pp. 80-84, Mar/Apr, 2007
- George Cybenko and Alexy Khrabrov, "A Language of Life: Characterizing People using Cell Phone Tracks", IEEE Social Computing Conference, Vancouver, B.C., August 28-September 1, 2009
- Sean Smith, Patrick P. Tsang and Apu Kapadia, "Anonymous IP-address Blocking in Tor with Trusted Computing (Short Paper: Work in Progress)", In the 2nd Workshop on Advances in Trusted Computing (WATC '06 Fall), 2006
- David Kotz, Cory Cornelius, Minho Shin, Daniel Peebles, Nikos Triandopoulos and Apu Kapadia, "AnonySense: Privacy-Aware People-Centric Sensing", Proceeding of the 6th ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MOBISYS '08), Breckenridge, Colorado, June 17-20, 2008
- Kwang-Hyun Baek, S Sinclair, Sergey Bratus and Sean Smith, "Attacking and Defending Networked Embedded Devices", Proceedings of the 2nd Workshop on Embedded Systems Security (WESS'2007), Salzburg, Austria, October 4, 2007
- Sean Smith and Massimiliano Pala, "AutoPKI: a PKI Resources Discovery System", Proceedings of the 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007
- Patrick P. Tsang, Sherman Chow and Sean Smith, "Batch Pairing Delegation", Proceedings of the 2nd International Workshop on Security (IWSEC '07) Nara, Japan, Oct 29-31, 2007
- Sergey Bratus, Brian Schulte and Michael Locasto, "Bickering In-Depth: Rethinking the Composition of Competing Security Systems", IEEE Security & Privacy, Volume 7, Number 6, pp. 77-81, November/December 2009.
- Man Ho Au, Apu Kapadia, Sean Smith and Patrick P. Tsang, "Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs", Proceeding of the 14th ACM Conference on Computer and Communication Security (CCS '07), Alexandria, VA, October 29-November 2, 2007
- R Perez, S Weingart, L Doorn, Sean Smith, R Sailer, M Lindemann and J Dyer, "Building the IBM 4758 Secure Coprocessor", IEEE Computer, October 2001, 34(10): 57-66
- James Ford, Song Ye and Fillia Makedon, "Collaborative Automated Trust Negotiation in Peer-to-Peer Systems ", Proceedings of the 4th International Conference on Peer-to-Peer Computing, Zurich, Switzerland, 25-27 August 2004, 108-115
- Hong Lu, Nicholas Lane, Shane B. Eisenman and Andrew Campbell, "Cooperative Techniques Supporting Sensor-based People-centric Inferencing", in Proceedings of Sixth Conf. on Pervasive Computing, Sydney, Australia, May 19-22, 2008
- Sean Smith and Anna Shubina, "Design and Prototype of a Coercion-Resistant, Voter Verifiable Electronic Voting System", Proceedings of the 2nd Annual Conference on Privacy, Security and Trust, New Brunswick, Canada, 13-15 October 2004, 29-39
- Apu Kapadia, Roy Campbell and Prasad Naldurg, "Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall ", IEEE Workshop on Policies for Distributed Systems and Networks (POLICY'07), Bologna, Italy, June 13 - 15, 2007
- John Marchesini, Gabriel Vanrenen and Sean Smith, "Distributing Security-Mediated PKI", International Journal of Information Security, July 2005, 5(1): 3-17
- Roberto Tamassia and Nikos Triandopoulos, "Efficient Content Authentication in Peer-to-peer Networks", Proceedings of the International Conference on Applied Cryptography and Network Security, LNCS, Vol 4521, Springer-Verlag, pp 354-372, Zhuhai, China, June 2007
- Christopher Masone, Sean Smith and S Sinclair, "Expressing Trust in Distributed Systems: the Mismatch Between Tools and Reality", Proceedings of the 42 Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2004
- Andrew Campbell, Emiliano Miluzzo and Tianyu Wang, "EyePhone: Activating Mobile Phones with Your Eyes", Proceedings of The Second ACM SIGCOMM Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld'10), New Delhi, India, August 30, 2010
- Nicholas Goffee, Sung Kim, Sean Smith, Punch Taylor, Meiyuan Zhao and John Marchesini, "Greenpass: Decentralized, PKI-based Authorization for Wireless LANs", 3rd Annual PKI Research and Development Workshop Proceedings. Internet2/NIST/NIH. NISTIR 7122. 26--41, 2004
- Nikos Triandopoulos and Apu Kapadia, "Halo: High-Assurance Locate for Distributed Hash Tables", Proceedings of the 15th Annual Network & Distributed System Security Symposium (NDSS), San Diego CA, February 10-13, 2008
- M Lindemann and Sean Smith, "Improving DES Coprocessor Throughput for Short Operations", Proceedings of the 10th USENIX Security Symposium, Washington, DC, 13-17 August 2001
- Scott Rea, Massimiliano Pala, Shreyas Cholia and Sean Smith, "Interoperable PKI Data Distribution in Computational Grids", International Journal of Grid and High Performance Computing (IJGHPC), IGI Publishing, 1(2): 56-73, 2009.
- Sean Smith, Meiyuan Zhao and John Marchesini, "Keyjacking: the Surprising Insecurity of Client-side SSL", Computers and Security, 2005, 24(2): 109-123
- Sean Smith, "Magic Boxes and Boots: Security in Hardware", IEEE Computer, October 2004, 37(10): 106-109
- Zhengyi Le, Yi Ouyang, James Ford and Fillia Makedon, "OC: A System for Open Collaborations", In the First International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2005), in conjunction with IEEE ICPS 05, Santorini Island, Greece, July 14, 2005
- O Wild, John Marchesini, A Barsamian, J Stabiner and Sean Smith, "Open-Source Applications of TCPA Hardware", Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 04), Tuscson, AZ, 5-9 December 2005, 294-303
- Sean Smith, "Outbound Authentication for Programmable Secure Coprocessors", Proceedings of the 7th European Symposium on Research in Computer Security, 2002
- Sean Smith, "Outbound Authentication for Programmable Secure Coprocessors", International Journal of Information Security, 3(1): 28-41, October 2004
- Minho Shin, Patrick P. Tsang, Daniel Peebles, David Kotz, Apu Kapadia and Cory Cornelius, "Poster Abstract: Reliable People-Centric Sensing with Unreliable Voluntary Carriers", In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2008. ACM Press
- Sean Smith and D Safford, "Practical Server Privacy Using Secure Coprocessors", IBM Systems Journal, 2001, 40(3): 683-695
- Sean Smith and Kwang-Hyun Baek, "Preventing Theft of Quality of Service on Open Platforms", In The First IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks, September 2005
- Tristan Henderson, David Kotz and Denise Anthony, "Privacy in Location-Aware Computing Environments", Pervasive Computing, Vol. 6, No. 4, October-December 2007, pp. 64-72
- A Iliev and Sean Smith, "Private Information Storage with Logarithmic-space Secure Hardware", Information Security Management, Education, and Privacy (containing the Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems (i-NetSec 04)), Toulouse, France, 22-27 August 2004, 201-216
- Sean Smith, "Probing End-User IT Security Practices - Through Homework", The EDUCAUASE Quarterly, November 2004, 27(4): 68-71
- Matthew Burnside, Darrell Bethea and Michael Locasto, "Research Directions for Network Intrusion Recovery", Symposium on Usable Privacy and Security (SOUPS): Workshop on Usable IT Security Management (USM '08), Pittsburgh, PA, July 23-25, 2008
- Sean Smith, "Research Ideas for National Information Security", NSF Setting a National Research Agenda: A Workshop on Research Issues in Security, Privacy, and Trust. February 2002
- David Kotz and K Minami, "Scalability in a Secure Distributed Proof System", Proceedings of the 4th International Conference on Pervasive Computing (PERVASIVE 2006), Dublin, Ireland, 7-10 May 2006
- David Kotz and K Minami, "Secure context-sensitive authorization", Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai, Hawaii, 8-12 March 2005, 257-268
- K Minami and David Kotz, "Secure Context-sensitive Authorization", Journal of Pervasive and Mobile Computing, 1(1): 123-156, March 2005
- Patrick P. Tsang and Sean Smith, "Secure Cryptographic Precomputation with Insecure Memory", Proceedings of the 4th Information Security Practice and Experience Conference(ISPEC 2008), Sydney, Australia, 21-23 April 2008
- Sean Smith, K Minami and S Jiang, "Securing Web Servers against Insider Attack", ACSA/ACM Annual Computer Security Applications Conference, December 2001, 265-276
- A Iliev and Sean Smith, "Small, Stupid, and Scalable: Secure Computing with Faerieplay", The Fifth Annual Workshop on Scalable Trusted Computing (STC '10). October 4, 2010. Chicago, IL.
- Fabeah Adu-Oppong, Casey Gardiner, Apu Kapadia and Patrick P. Tsang, "Social Circles: Tackling Privacy in Social Networks ", Proceedings of the Fourth Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, July 23-25, 2008
- Andrew Campbell, Mirco Musolesi and Kristof Fodor, "Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones", In Proceedings of Eighth International Conference on Pervasive Computing, Helsinki, May 2010
- Anna Shubina, Michael Locasto and Sergey Bratus, "Teaching the Principles of the Hacker Curriculum to Undergraduates", Proceedings of the 41st ACM Technical Symposium on Computer Science Education (SIGCSE ’10), Milwaukee, Wisconsin, March 10-13, 2010.
- Sergey Bratus, Sean Smith, Ashwin Ramaswany, Michael Locasto and Peter Johnson, "The Cake is a Lie: Privilege Rings as a Policy Resource", Proceeding of the Second Workshop on Virtual Machine Security (VMSec 09), Chicago, IL, November 9, 2009.
- Angelos Stavrou and Michael Locasto, "The Hidden Difficulties of Watching and Rebuilding Networks", IEEE Security and Privacy, vol. 6, no. 2, pp. 79-82, Mar/Apr, 2008
- Sean Smith and S Sinclair, "The TIPPI Point: Towards Trustworthy Interfaces", IEEE Security and Privacy, July/August 2005, 3(4): 68:71
- Evan Sparks, Sergey Bratus, Nihal D'Cunha and Sean Smith, "TOCTOU, Traps, and Trusted Computing", Proceedings of the Trust 2008 Conference, Villach, Austria, March 11-12, 2008
- Ashwin Ramaswany, Sean Smith, Sergey Bratus and Michael Locasto, "Traps, Events, Emulation, and Enforcement: Managing the Yin and Yang of Virtualization-based Security", Proceedings of the First Workshop on Virtual Machine Security (VMSec08), George Mason University, Fairfax, VA, October 31, 2008.
- Sean Smith, "Turing is from Mars, Shannon is from Venus: Computer Science and Computer Engineering", IEEE Security and Privacy. 3 (2): 66-69, March/April 2005
- Sean Smith, Linden Vongsathorn, Katelin Bailey and Apu Kapadia, "TwoKind Authentication: Protecting Private Information in Untrustworthy Environments", Proceedings of the Seventh ACM Workshop on Privacy in the Electronic Society (WPES '08), Alexandria, VA, October 27, 2008
- Katelin Bailey, Sean Smith, Apu Kapadia, Christopher Masone and Linden Vongsathorn, "TwoKind Authentication: Usable Authenticators for Untrustworthy Environments", Symposium on Usable Privacy and Security (SOUPS 2007), Pittsburgh, Pennsylvania, July 18-20, 2007
- S Nazareth and Sean Smith, "Using SPKI/SDSI for Distributed Maintenance of Attribute Release Policies in Shibboleth", Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 6-9 October 2004, Volume 1, 218-226
- Sean Smith and John Marchesini, "Virtual Hierarchies: An Architecture for Building and Maintaining Efficient and Resilient Trust Chains", Proceedings of the 7th Nordic Workshop on Secure IT Systems--NORDSEC 2002. Karlstad University Studies. November 2002
- Apu Kapadia, Tristan Henderson, Jeffrey Fielding and David Kotz, "Virtual Walls: Protecting Digital Privacy in Pervasive Environments", In Proceedings of the 5th International Conference on Pervasive Computing, pp. 162-179, Toronto, Canada, May 13-16, 2007
Sensor Networks
- Tanzeem Choudhury, Janani Sriram, Minho Shin and David Kotz, "Activity-aware ECG-based patient authentication for remote health monitoring", Proceedings of the International Conference on Multimodal Interfaces and Workshop on Machine Learning for Multi-modal Interaction (ICMI-MLMI), Cambridge, MA, November 2-4, 2009.
- Hong Lu, Andrew Campbell and Nicholas Lane, "Ambient Beacon Localization: Using Sensed Characteristics of the Physical World to Localize Mobile Sensors", Proceedings of the Fourth Workshop on Embedded Networked Sensors (EmNets 2007), Cork, Ireland, June 25-26, 2007
- David Kotz, Apu Kapadia, Daniel Peebles, Cory Cornelius, Minho Shin and Nikos Triandopoulos, "AnonySense: A System for Anonymous Opportunistic Sensing", Journal of Pervasive and Mobile Computing. (2010), doi:10.1016/j.pmcj.2010.04.001.
- Apu Kapadia, David Kotz, Daniel Peebles, Cory Cornelius and Nikos Triandopoulos, "AnonySense: Opportunistic and Privacy-Preserving Context Collection", Proceedings of the 6th International Conference on Pervasive Computing, Sydney, Australia, May 19-22, 2008
- Shane B. Eisenman, Nicholas Lane, Hong Lu and Andrew Campbell, "Bubble-Sensing: A New Paradigm for Binding a Sensing Task to the Physical World using Mobile Phones", Proceedings of the International Workshop on Mobile Devices and Urban Sensing, St. Louis, Missouri, April 21, 2008
- Andrew Campbell, Reza Olfati-Saber, Emiliano Miluzzo and Nicholas Lane, "CaliBree: a Self-Calibration System for Mobile Sensor Networks", Proceedings of the International Conference on Distributed Computing in Sensor Networks (DCOSS 2008), Santorini Island, Greece, June 11-14, 2008
- Shane B. Eisenman, Xiao Zheng, Ron Peterson, Mirco Musolesi, Emiliano Miluzzo, Kristof Fodor, Andrew Campbell, Nicholas Lane and Hong Lu, "CenceMe: Injecting Sensing Presence into Social Network Applications using Mobile Phones (Demo Abstract)", Proceedings of the Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), Hong Kong, May 27-30, 2008
- Zack Butler and Daniela Rus, "Controlling Mobile Sensors for Monitoring Events with Coverage Constraints", Proceedings of IEEE International Conference on Robotics and Automation, New Orleans, April 2004, 1568-1573
- Hong Lu, Nicholas Lane, Shane B. Eisenman and Andrew Campbell, "Cooperative Techniques Supporting Sensor-based People-centric Inferencing", in Proceedings of Sixth Conf. on Pervasive Computing, Sydney, Australia, May 19-22, 2008
- Emiliano Miluzzo, Zhigang Liu, Tanzeem Choudhury, Ashwin Ramaswany, Cory Cornelius and Andrew Campbell, "Darwin Phones: The Evolution of Sensing and Inference on Mobile Phones", in Proc. of Eighth International ACM Conference on Mobile Systems, Applications, and Services (MobiSys '10), San Francisco, CA, USA, June 15-18, 2010.
- Minho Shin, Cory Cornelius, David Kotz and Patrick P. Tsang, "DEAMON: Energy-efficient sensor monitoring", Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks(SECON), Roma, Italy, June 22-26, 2009.
- David Kotz, Ming Li and Guanling Chen, "Design and implementation of a large-scale context fusion network", Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous), Boston, MA, 22-26 August 2004, 246-255
- Glenn Nofsinger and George Cybenko, "Distributed Chemical Plume Process Detection: Milcom 2005 1644", Proceedings of the Military Communications Conference (MILCOM 2005), Atlantic City, NJ, 17-20 October 2005, 1-7
- Alex Jordan, Wayne Chung, George Cybenko and Valentino Crespi, "Distributed Sensing and UAV Scheduling for Surveillance and Tracking of Unidentifiable Targets", Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, 28 March - 1 April 2005
- Yi Ouyang, Fillia Makedon, James Ford, Guanling Chen and Zhengyi Le, "Entrapping Adversaries for Source Protection in Sensor Networks", Proceedings of the 7th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), Niagara-Falls, Buffalo-NY, 26-29 June 2006
- Hong Lu, James M.H. Oakley, Emiliano Miluzzo, Andrew Campbell, Nicholas Lane and Ron Peterson, "Evaluating the iPhone as a Mobile Platform for People-Centric Sensing Applications", Proceedings of the International Workshop on Urban, Community, and Social Applications of Networked Sensing Systems (UrbanSense08), Raleigh, NC, November 4, 2008
- Zack Butler and Daniela Rus, "Event-based Motion Control for Mobile-Sensor Networks", IEEE Pervasive Computing, October-December 2003, 2(4): 34-42
- Keith Kotay, Daniela Rus and Ron Peterson, "Experiments with Robot and Sensor Networks for Mapping and Navigation", Proceedings of the International Conference on Field and Service Robotics, Port Douglas Australia, 29-31 July 2005
- Andrew Campbell, Emiliano Miluzzo and Tianyu Wang, "EyePhone: Activating Mobile Phones with Your Eyes", Proceedings of The Second ACM SIGCOMM Workshop on Networking, Systems, and Applications on Mobile Handhelds (MobiHeld'10), New Delhi, India, August 30, 2010
- Francesca Cuomo, Gahng-Seop Ahn, Emiliano Miluzzo, Andrew Campbell and Se Gi Hong, "Funneling-MAC: A Localized, Sink Oriented MAC For Boosting Fidelity in Sensor Networks", In Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), pages 293-306, Boulder, Colorado, November 2006
- Daniela Rus and Qun Li, "Global Clock Synchronization in Sensor Networks", Proceedings of the IEEE Infocom, Hong Kong, 7-11 March 2004
- David Kotz and Ming Li, "Group-aware Stream Filtering", Proceedings of the Fourth Workshop on Wireless Ad hoc and Sensor Networks (WWASN), Toronto, ON, Canada, June 2007
- Hong Lu, Shane B. Eisenman and Andrew Campbell, "Halo: Managing Node Rendezvous in Opportunistic Sensor Networks", To appear in Proc. of 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10), Santa Barbara, California, USA, June 21-23, 2010
- James Ford, Zhengyi Le, Yi Ouyang and Fillia Makedon, "Local Data Protection for In-Network Processing in Sensor Networks", Proceedings of the IEEE International Conference on Pervasive Services (ICPS 2005), Santorini, Greece, 11-14 July 2005
- George Cybenko and Valentino Crespi, "Metrics for Situational Awareness using Sensor Networks", Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, March 2005
- Emiliano Miluzzo, Shane B. Eisenman, Nicholas Lane, Ron Peterson, Gahng-Seop Ahn and Andrew Campbell, "MetroSense Project: People-Centric Sensing at Scale", First Workshop on World-Sensor-Web: Mobile Device Centric Sensory Networks and Applications, Boulder, CO, 31 October 2006
- Shane B. Eisenman, Nicholas Lane, Emiliano Miluzzo, Ron Peterson, Gahng-Seop Ahn and Andrew Campbell, "MetroSense Project: People-Centric Sensing at Scale", Proceedings of the ACM SenSys Workshop on World-Sensor-Web (WSW 2006), Boulder, Colorado, October 31, 2006
- Hong Lu, Gahng-Seop Ahn, Andrew Campbell, Reza Olfati-Saber and Mirco Musolesi, "MetroTrack: Predictive Tracking of Mobile Events using Mobile Phones", To appear in Proc. of 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10), Santa Barbara, California, USA, June 21-23, 2010.
- Zack Butler, "Motion-Constrained Mobile Sensor Networks", Proceedings of the International Conference on Advanced Robotics, 2005
- Daniela Rus and Qun Li, "Navigation Protocols in Sensor Networks", ACM Transactions on Sensor Networks, Vol. 1, No. 1, August 2005, Pages 1-33
- Nikos Triandopoulos, David Kotz and Apu Kapadia, "Opportunistic Sensing: Security Challenges for the New Paradigm", Proceedings of the 1st International Conference on COMmunication Systems and NETworkS (COMNETS), Bangalore, India, January 2009.
- Andrew Campbell, Shane B. Eisenman, Nicholas Lane and Emiliano Miluzzo, "PeopleCentric Urban Sensing", Proceedings of the 2nd ACM/IEEE Annual International Wireless Internet Conference (WICON), Boston, MA, 2-5 August 2006
- David Kotz and Guanling Chen, "Policy-driven data dissemination for context-aware applications", Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai, HI, 8-12 March 2005, 283-289
- George Cybenko and Guofei Jiang, "Query Routing Optimization in Sensor Communication Networks", Proceedings of the IEEE 41th Conference on Decision and Control, Las Vegas, NV, 10-13 December 2002
- Andrew Campbell and Shane B. Eisenman, "SkiScape Sensing", Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), Boulder, CO, 1-3 November 2006
- Seoung-Bum Lee, Kyung Joon Kwak and Andrew Campbell, "Solicitation-Based Forwarding for Sensor Networks", Proceeding of the 3rd Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2006), Reston, VA, Sept 25-28, 2006
- Andrew Campbell, Nicholas Lane, Wei Pan, Hong Lu and Tanzeem Choudhury, "SoundSense: Scalable Sound Sensing for People?Centric Applications on Mobile Phones", Proceedings of the 7th Annual International Conference on Mobile Systems (MobiSys 2009), Krakow, Poland, June 22-25, 2009.
- Andrew Campbell, Mirco Musolesi and Kristof Fodor, "Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones", In Proceedings of Eighth International Conference on Pervasive Computing, Helsinki, May 2010
- Andrew Campbell, Nicholas Lane and Shane B. Eisenman, "Techniques for Improving Opportunistic Sensor Networking Performance", Proceedings of the International Conference on Distributed Computing in Sensor Networks (DCOSS 2008), Santorini Island, Greece, June 11-14, 2008
- Andrew Campbell and Nicholas Lane, "The Influence of Microprocessor Instructions on the Energy Consumption of Wireless Sensor Networks", Proceedings of the 3rd Workshop on Embedded Networked Sensors (EmNets 2006), Cambridge, MA, 30-31 May 2006, 41-45
- Kristof Fodor, Hong Lu, Xiao Zheng, Mirco Musolesi, Gahng-Seop Ahn, Shane B. Eisenman, Andrew Campbell, Nicholas Lane, Emiliano Miluzzo and Ron Peterson, "The Rise of People-Centric Sensing", IEEE Internet Computing: Mesh Networking, pp. 30-39, July/August 2008.
- Mirco Musolesi, Emiliano Miluzzo, Nicholas Lane, Shane B. Eisenman, Tanzeem Choudhury and Andrew Campbell, "The Second Life of a Sensor: Integrating Real-world Experience in Virtual Worlds using Mobile Phones", Proceedings of the 5th Workshop on Embedded Networked Sensors (EmNets 2008), Charlottesville, VA, June 2-3, 2008
- Valentino Crespi, George Cybenko and Guofei Jiang, "The theory of trackability with applications to sensor networks", ACM Transactions on Sensor Networks, May 2008, Volume 4, Number 3, pp. 1-42
- Guofei Jiang, Valentino Crespi and George Cybenko, "The Theory of Trackability with Applications to Sensor Networks", ACM Transaction on Sensor Networks, July 2006. This revision: July 2007
- Andrew Campbell and Tanzeem Choudhury, "Toward Societal Scale Sensing using Mobile Phones", White paper presented at the NSF Workshop on Future Directions in Networked Sensing Systems, Arlington, USA, November, 12-13, 2009
- Valentino Crespi, Yong Sheng, Guofei Jiang and George Cybenko, "Trackability Analysis of Multiple Processes Using Multi-Distributed Agents", Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS 2005), Waltham, MA, 18-21 April 2005, 111-116
- Hong Lu, Nicholas Lane, Xiao Zheng, Andrew Campbell, Mirco Musolesi, Emiliano Miluzzo, Shane B. Eisenman, Kristof Fodor and Ron Peterson, "Transforming the Social Networking Experience with Sensing Presence from Mobile Phones", Proceedings of the 6th ACM International Conference on Embedded Networked Sensor Systems(SENSYS'08), Raleigh, NC, November 5-7, 2008.
- Andrew Campbell, Nicholas Lane, Emiliano Miluzzo, Mirco Musolesi and Shane B. Eisenman, "Urban Sensing Systems: Opportunistic or Participatory", Proceedings of Ninth Workshop on Mobile Computing Systems and Applications (HotMobile 2008), Napa Valley, CA, February 25-26, 2008
- Emiliano Miluzzo, Nicholas Lane and Andrew Campbell, "Virtual Sensing Range", Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys 2006), Boulder, CO 1-3 November 2006
- Valentino Crespi, George Cybenko and Guofei Jiang, "What is Trackable?", Proceedings of the SPIE Vol. 6201, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV, Orlando, Florida, April 2006
Steganography
- H Farid, "Detecting Hidden Messages Using Higher-Order Statistical Models", International Conference on Image Processing, Rochester, NY, 2002
- H Farid and S Lyu, "Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines", 5th International Workshop on Information Hiding, Noordwijkerhout, The Netherlands, 2002
- M Johnson, H Farid and S Lyu, "Steganalysis of Recorded Speech", Proceedings of the SPIE Symposium on Electronic Imaging, San Jose, CA, 16-20 January 2005
- H Farid and S Lyu, "Steganalysis Using Color Wavelet Statistics and One-Class Support Vector Machines", Proceedings of the SPIE Symposium on Electronic Imaging, San Jose, CA, 18-22 January 2005
- H Farid and S Lyu, "Steganalysis Using Higher-Order Image Statistics", IEEE Transactions on Information Forensics and Security, March 2006, 1(1):111-119
Trust
- Sean Smith and Patrick P. Tsang, "Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers", Proceedings of the 4th Information Security Practice and Experience Conference (ISPEC 2008), Sydney, Australia, 21-23 April 2008
- A Iliev and Sean Smith, "Faerieplay on Tiny Trusted Third Parties ", The 2nd Workshop on Advances in Trusted Computing (WATC '06), Tokyo, Japan, November 30 - December 1, 2006
- M. Eric Johnson, Denise Anthony and Ajit Appari, "HIPAA Compliance: An Institutional Theory Perspective", in Proceedings of the 15th Americas Conference on Information Systems, San Francisco, CA, August 6-9, 2009.
- Ajit Appari, Denise Anthony and M. Eric Johnson, "HIPAA compliance in home health: a neo-institutional theoretic perspective", Proceeding of Security and Privacy in Medical and Home-Care Systems, Chicago, IL, Nov 15, 2009
- M. Eric Johnson, Ajit Appari and Denise Anthony, "Impact of Health Information Technology Portfolio on Hospital Quality: A National Study of U.S. Acute Care Facilities", AcademyHealth's Annual Research Meeting (ARM). June 26-28, 2010. Boston, MA.
- Sergey Bratus, Sean Smith, Ashwin Ramaswany and Michael Locasto, "New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)", Proceedings of the Future of Trust in Computing, Berlin, Germany, June 30-July 2, 2008.
- S Sinclair, Sean Smith and Stephanie Trudeau, "The effects of introspection on creating privacy policy", Eighth ACM Workshop on Privacy in the Electronic Society (WPES ’09), 2009
- Evan Sparks, Sergey Bratus, Nihal D'Cunha and Sean Smith, "TOCTOU, Traps, and Trusted Computing", Proceedings of the Trust 2008 Conference, Villach, Austria, March 11-12, 2008
- James Kitts, Denise Anthony and Tristan Henderson, "Trust and Privacy in Distributed Work Groups", Proceedings of the 2nd International Workshop on Social Computing, Behavioral Modeling, and Prediction, Phoenix, Arizona, March 31-April 1, 2009.
- Katelin Bailey and Sean Smith, "Trusted Virtual Containers on Demand", The Fifth Annual Workshop on Scalable Trusted Computing (STC '10). October 4, 2010. Chicago, IL.
- Sean Smith and S Sinclair, "What's Wrong with Access Control in the Real World?", IEEE Security and Privacy, vol. 8, no. 4, pp. 74-77, July/Aug. 2010, doi:10.1109/MSP.2010.139.
Wireless Networks
- David Kotz, Keren Tan, Guanhua Yan and Jihwang Yeo, "A Correlation Attack Against User Mobility Privacy in a Large-scale WLAN network", In Proceedings of the ACM MobiCom'10 S3 workshop, pages 33-35, September, 2010. ACM Press
- Cory Cornelius, Daniel Peebles, David Kotz and Sergey Bratus, "Active behavioral fingerprinting of wireless devices ", Proceedings of the First ACM Conference on Wireless Network Security (WiSec), Alexandria, VA, March 31-April 2, 2008
- George Cybenko and Alexy Khrabrov, "A Language of Life: Characterizing People using Cell Phone Tracks", IEEE Social Computing Conference, Vancouver, B.C., August 28-September 1, 2009
- Kimaya Sanzgiri, Bridget Dahill, Brian Levine, Elizabeth Belding-Royer and Clay Shields, "A Secure Routing Protocol for Ad hoc Networks", Proceedings of IEEE International Conference on Network Protocols (ICNP), pages 78-89, November 2002
- Samuel Nelson and Felipe Perrone, "A Study of On-Off Attack Models for Wireless Ad Hoc Networks", Proceedings of the First International Workshop on Operator-Assisted (Wireless Mesh) Community Networks 2006, Berlin, Germany, 18-19 September 2006
- Daniel LaFlamme, Elizabeth Belding-Royer, Kimaya Sanzgiri, Bridget Dahill, Brian Levine and Clay Shields, "Authenticated Routing for Ad hoc Networks", IEEE/ACM Journal of Selected Areas in Communications: Special issue on Wireless Ad hoc Networks (JSAC), March 2005, 23(30): 598-610
- David Kotz and Aarathi Prasad, "Can I access your Data? Privacy Management in mHealth.", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- David Kotz, Udayan Deshpande and Tristan Henderson, "Channel Sampling Strategies for Monitoring Wireless Networks", In Proceedings of the Second International Workshop On Wireless Network Measurement (WiNMee). IEEE Computer Society Press, April 2006
- David Kotz, Udayan Deshpande and Chris McDonald, "Coordinated Sampling to Improve the Efficiency of Wireless Network Monitoring", Proceedings of the Fifteenth IEEE International Conference on Networks (ICON), Adelaide, South Australia, November 19-21, 2007
- Anna Shubina, William Taylor, Sergey Bratus, Michael Locasto, David Kotz and Bennet Vance, "Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed", Proceeding of the 2nd Workshop on Cyber Security Experimentation and Test (CSET09), Montreal, Canada, August 10, 2009. USENIX Association.
- Emiliano Miluzzo, Zhigang Liu, Tanzeem Choudhury, Ashwin Ramaswany, Cory Cornelius and Andrew Campbell, "Darwin Phones: The Evolution of Sensing and Inference on Mobile Phones", in Proc. of Eighth International ACM Conference on Mobile Systems, Applications, and Services (MobiSys '10), San Francisco, CA, USA, June 15-18, 2010.
- Kristof Fodor, Xiao Zheng, Ron Peterson, Mirco Musolesi, Shane B. Eisenman, Emiliano Miluzzo, Hong Lu, Nicholas Lane and Andrew Campbell, "Demo Abstract: Transforming the Social Networking Experience with Sensing Presence from Mobile Phones", Proceedings of the 6th ACM International Conference on Embedded Networked Sensor Systems(SENSYS '08), Raleigh, NC, November 5-7, 2008.
- Vijay Bhuse, Ala Al-Fuqaha and Ajay Gupta, "Detection of Masquerade Attacks for Wireless Sensor Networks", Proceedings of the IEEE International Conference of Communications, Glasgow, Scotland, June 2007
- Libo Song and David Kotz, "Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces", ACM MobiCom Workshop on Challenged Networks (CHANTS 2007), Montreal, Canada, September 9-14, 2007
- Yougu Yuan, Jason Liu, David Kotz, Robert Gray, Calvin Newport and Chip Elliott, "Experimental Evaluation of Wireless Simulation Assumptions", Proceedings of the ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Venice, Italy, 4-6 October 2004
- Robert Gray, Jason Liu, Yougu Yuan, Chip Elliott, Calvin Newport and David Kotz, "Experimental Evaluation of Wireless Simulation Assumptions", SIMULATION: Transactions of The Society for Modeling and Simulation International,September 2007, Vol. 83, No. 9, pages 643-661
- Anurag Kumar, Shrirang Mare and David Kotz, "Experimental Validation of Analytical Performance Models for IEEE 802.11 Networks", In Proceedings of the Workshop on WIreless Systems: Advanced Research and Development (WISARD 2010), pages 1-8, January, 2010. IEEE Computer Society Press
- Shrirang Mare and David Kotz, "Is Bluetooth the right technology for mHealth?", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- Guanling Chen, Joshua Wright, Tristan Henderson, Chris McDonald, Andrew Campbell, David Kotz, Bennet Vance, Udayan Deshpande, Keren Tan, Hongda Yin and Yong Sheng, "MAP: A scalable monitoring system for dependable 802.11 wireless networks", IEEE Wireless Communications, Vol 15, No 5, p 10-18, October 2008
- Guanling Chen and Bo Yan, "Model-based Fault Diagnosis for IEEE 802.11 Wireless LANs", Proceedings of the Sixth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous), Toronto, Canada, July 2009.
- Sergey Bratus, Anna Shubina, Chrisil Arackaparambil and David Kotz, "On the Reliability of Wireless Fingerprinting using Clock Skews", Proceedings of the Third ACM Conference on Wireless Network Security (WiSec’10), Hoboken, New Jersey, March 22–24, 2010.
- Cory Cornelius and David Kotz, "On Usable Authentication for Wireless Body Area Networks", In USENIX Workshop on Health Security (HealthSec), August, 2010. Position paper
- Yougu Yuan, Robert Gray, David Kotz, Calvin Newport, Nikita Dubrovsky, Aaron Fiske, Jason Liu, Christopher Masone and Susan McGrath, "Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms", Proceeedings of the ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Venice, Italy, 4-6 October 2004
- Yi Ouyang, Zhengyi Le, Fillia Makedon, Yurong Xu, Nikos Triandopoulos, Sheng Zhang and James Ford, "Providing Anonymity in Wireless Sensor Networks", Proceedings of IEEE International Conference on Pervasive Services (ICPS), Istanbul, Turkey, July 15-20, 2007
- Kristof Fodor, Andrew Campbell, Xiao Zheng and Emiliano Miluzzo, "Radio Characterization of 802.15.4 and its Impact on the Design of Mobile Sensor Networks", Proceedings of the 5th European Conference on Wireless Sensor Networks (EWSN 2008), Bologna, Italy, January 30-February 1, 2008
- David Kotz, Udayan Deshpande and Chris McDonald, "Refocusing in 802.11 Wireless Measurement", In Proceedings of the Passive and Active Measurement Conference (PAM 2008), pages 142-151, April, 2008. Springer-Verlag. DOI 10.1007/978-3-540-79232-1_15.
- Hongda Yin, Bo Yan, Guanling Chen and Jie Wang, "Robust Detection of Unauthorized Wireless Access Points", ACM/Springer Mobile Networks and Applications (MONET), 14(4):508-522, August 2009
- David Kotz and Keren Tan, "Saluki: a High-Performance Wi-Fi Sniffing Program", In: Proceedings of the 6th International Workshop on Wireless Network Measurements (WiNMee’10), May 2010
- Mirco Musolesi, Hong Lu, Xiao Zheng, Shane B. Eisenman, Andrew Campbell, Ron Peterson, Kristof Fodor, Nicholas Lane and Emiliano Miluzzo, "Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application", Proceedings of the 6th ACM International Conference on Embedded Networked Sensor Systems(SENSYS '08), Raleigh, NC, November 5-7, 2008.
- Bing Wang, Yuan Song, Xian Chen, Yoo-Ah Kim and Guanling Chen, "Sniffer Channel Section for Monitoring Wireless LANs", Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications (WASA),Boston, MA, August 16- 18, 2009.
- Gahng-Seop Ahn, Andrew Campbell, Nicholas Lane, Emiliano Miluzzo, Ron Peterson and Shane B. Eisenman, "The BikeNet Mobile Sensing System for Cyclist Experience Mapping", Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems, Sydney, Australia, Nov 6-9, 2007
- Felipe Perrone, David Nicol, Jason Liu and Michael Liljenstam, "Towards High Performance Modeling of the 802.11 Wireless Protocol", Proceedings of the 2001 Winter Simulation Conference (WSC 2001), Arlington, VA, 9-12 December 2001
- Vincent Berk, A Barsamian and Ian Gregorio-de Souza, "Using principal component analysis for selecting network behavioral anomaly metrics", Proc. SPIE, Vol. 7666, 766605 (2010); doi:10.1117/12.852399. Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IX. April 2010. Orlando, FL.
Worms
- Weibo Gong, Don Towsley and Cliff Changchun Zou, "Code Red Worm Propagation Modeling and Analysis", Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS 02), Washington, DC, 18-22 November 2002
- David Nicol and Michael Liljenstam, "Comparing Passive and Active Worm Defenses", Proceedings of the Conference on Quantitative Evaluation of Systems (QEST 04), Enschede, Netherlands, 27-30 September 2004, 18-27
- George Bakos and Vincent Berk, "Early Detection of Internet Worm Activity by Metering ICMP Destination Unreachable Activity", Proceeding of SPIE Conference on Sensors, and Command, Control, Communications and Intelligence, Orlando, FL, April 2002
- Michael Liljenstam and David Nicol, "Models and Analysis of Active Worm Defense", MMM-ACNS 2005, LNCS 3685, pp. 38-53, 2005
- David Nicol and Michael Liljenstam, "Models of Active Worm Defenses", IPSI Conference, Studenica, Serbia, 3-6 June 2004