Search results

  • 2015

    A quantum Diffie-Hellman protocol

    Subramaniam, P. & Parakh, A., Feb 6 2015, Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc., p. 523-524 2 p. 7035733. (Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • A Testbed and Process for Analyzing Attack Vectors and Vulnerabilities in Hybrid Mobile Apps Connected to Restful Web Services

    Hale, M. L. & Hanson, S., Aug 13 2015, Proceedings - 2015 IEEE World Congress on Services, SERVICES 2015. Bahsoon, R. & Zhang, L-J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 181-188 8 p. 7196523. (Proceedings - 2015 IEEE World Congress on Services, SERVICES 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Authentication bypass and remote escalated I/O command attacks

    Grandgenett, R., Mahoney, W. & Gandhi, R., Apr 7 2015, Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015. Association for Computing Machinery, 2. (ACM International Conference Proceeding Series; vol. 06-08-April-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Implementing Diffie-Hellman key exchange using quantum EPR pairs

    Mandal, S. & Parakh, A., 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950006. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Measuring the Potential for Victimization in Malicious Content

    Hale, M. L., Gamble, R., Hale, J., Haney, M., Lin, J. & Walter, C., Aug 13 2015, Proceedings - 2015 IEEE International Conference on Web Services, ICWS 2015. Miller, J. A. & Zhu, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 305-312 8 p. 7195583. (Proceedings - 2015 IEEE International Conference on Web Services, ICWS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Modifications to GCC for increased software privacy

    Mahoney, W. R., 2015, In: International Journal of Information and Computer Security. 7, 2-4, p. 160-176 17 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • New key agreement techniques for sensor networks

    Parakh, A. & Kak, S., Mar 1 2015, In: Infocommunications Journal. 7, 1, p. 15-21 7 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Quantum teleportation for keyless cryptography

    Parakh, A., 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950005. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security

    Hale, M. L., Ellis, D., Gamble, R., Waler, C. & Lin, J., Aug 26 2015, Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015. Zhang, J. & Altintas, O. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 97-104 8 p. 7226677. (Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security

    Mandal, S., Gandhi, R. & Siy, H., Nov 16 2015, 8th International Workshop on Requirements Engineering and Law, RELAW 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. 7330205. (8th International Workshop on Requirements Engineering and Law, RELAW 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Towards a new quasigroup block cipher for a single-chip FPGA implementation

    Mahoney, W. & Parakh, A., Oct 2 2015, 24th International Conference on Computer Communications and Networks, ICCCN 2015. Institute of Electrical and Electronics Engineers Inc., 7288479. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2014

    A quantum Diffie-Hellman protocol using commuting transformations

    Subramaniam, P. & Parakh, A., 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057257. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Cryptanalysis of the quasigroup block cipher

    Battey, M. & Parakh, A., Mar 28 2014, Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014. Association for Computing Machinery, Inc, 2737600. (Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Exploitation of Allen Bradley's implementation of etherNet/IP for denial of service against industrial control systems

    Grandgenett, R., Gandhi, R. & Mahoney, W., 2014, 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014. Liles, S. (ed.). Academic Conferences Limited, p. 58-65 8 p. (9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Gauging the impact of FISMA on software security

    Gandhi, R. A., Crosby, K., Siy, H. & Mandal, S., Sep 1 2014, Computer, 47, 9, p. 103-107 5 p.

    Research output: Contribution to specialist publicationArticle

    2 Scopus citations
  • Hardware implementation of quasigroup encryption for SCADA networks

    Mahoney, W., Parakh, A. & Battey, M., Oct 14 2014, Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 301-305 5 p. 6924243. (Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Improving the efficiency of entanglement based quantum key exchange

    Parakh, A. & Verma, P., Sep 25 2014, 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings. Institute of Electrical and Electronics Engineers Inc., 6911853. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Limits on detecting eavesdropper in QKD protocols

    Subramaniam, P. & Parakh, A., 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057239. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • My PLC makes an excellent web server

    Mahoney, W., 2014, 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014. Liles, S. (ed.). Academic Conferences Limited, p. 149-157 9 p. (9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Toward increasing awareness of suspicious content through game play

    Hale, M. & Gamble, R., Sep 18 2014, Proceedings - 2014 IEEE 10th World Congress on Services, SERVICES 2014. Zhang, L-J. & Bahsoon, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 113-120 8 p. 6903253. (Proceedings - 2014 IEEE 10th World Congress on Services, SERVICES 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2013

    A design and verification framework for service composition in the cloud

    Hale, M. L., Gamble, M. T. & Gamble, R. F., 2013, Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013. p. 317-324 8 p. 6655716. (Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • An efficient quasigroup block cipher

    Battey, M. & Parakh, A., Nov 2013, In: Wireless Personal Communications. 73, 1, p. 63-76 14 p.

    Research output: Contribution to journalArticlepeer-review

    12 Scopus citations
  • A probabilistic quantum key transfer protocol

    Parakh, A., Nov 2013, In: Security and Communication Networks. 6, 11, p. 1389-1395 7 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    17 Scopus citations
  • A quantum oblivious transfer protocol

    Parakh, A., 2013, The Nature of Light: What are Photons? V. SPIE, 883204. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8832).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • A social dimensional cyber threat model with formal concept analysis and fact-proposition inference

    Sharma, A., Gandhi, R., Zhu, Q., Mahoney, W. R. & Sousan, W., 2013, In: International Journal of Information and Computer Security. 5, 4, p. 301-333 33 p.

    Research output: Contribution to journalArticlepeer-review

    3 Scopus citations
  • Assessing individual performance in Agile undergraduate software engineering teams

    Gamble, R. F. & Hale, M. L., 2013, 2013 Frontiers in Education Conference: Energizing the Future, FIE 2013 - Proceedings. p. 1678-1684 7 p. 6685123. (Proceedings - Frontiers in Education Conference, FIE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Building a compliance vocabulary to embed security controls in cloud SLAs

    Hale, M. L. & Gamble, R., 2013, Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013. p. 118-125 8 p. 6655684. (Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Lightweight formal models of software weaknesses

    Gandhi, R., Siy, H. & Wu, Y., 2013, 2013 1st FME Workshop on Formal Methods in Software Engineering, FormaliSE 2013 - Proceedings. IEEE Computer Society, p. 50-56 7 p. 6612277. (2013 1st FME Workshop on Formal Methods in Software Engineering, FormaliSE 2013 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy preserving computations using implicit security

    Parakh, A. & Mahoney, W., 2013, 22nd International Conference on Computer Communications and Networks, ICCCN 2013 - Conference Proceedings. 6614172. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • SCADA threats in the modern airport

    McCarthy, J. & Mahoney, W., 2013, 8th International Conference on Information Warfare and Security 2013. Academic Conferences Ltd, p. 141-146 6 p. (8th International Conference on Information Warfare and Security, ICIW 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SEncrypt: An encryption algorithm inspired from biological processes

    Bonham-Carter, O., Parakh, A. & Bastola, D., 2013, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013. p. 321-327 7 p. 6680858. (Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2012

    A freshman level course on information assurance: Can it be done? here's how

    Gandhi, R., Jones, C. & Mahoney, W., Sep 2012, ACM Inroads, 3, 3, p. 50-61 12 p.

    Research output: Contribution to specialist publicationArticle

    5 Scopus citations
  • A new small world lattice

    Parakh, A. & Kak, S., 2012, Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Revised Selected Papers. p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7135 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Communication efficient oblivious transfer using elliptic curves

    Parakh, A., 2012, Proceedings - IEEE 14th International Symposium on High-Assurance Systems Engineering, HASE 2012. p. 173-174 2 p. 6375613. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Early security patterns: A collection of constraints to describe regulatory security requirements

    Gandhi, R. A. & Rahmani, M., 2012, 2012 2nd IEEE International Workshop on Requirements Patterns, RePa 2012 - Proceedings. p. 17-22 6 p. 6359966. (2012 2nd IEEE International Workshop on Requirements Patterns, RePa 2012 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Efficient quasigroup block cipher for sensor networks

    Battey, M. & Parakh, A., 2012, 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings. 6289294. (2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Reverse engineering - Is it art?

    Mahoney, W. & Gandhi, R. A., Mar 2012, ACM Inroads, 3, 1, p. 56-61 6 p.

    Research output: Contribution to specialist publicationArticle

    6 Scopus citations
  • 2011

    An integrated framework for control system simulation and regulatory compliance monitoring

    Mahoney, W. & Gandhi, R. A., Apr 2011, In: International Journal of Critical Infrastructure Protection. 4, 1, p. 41-53 13 p.

    Research output: Contribution to journalArticlepeer-review

    18 Scopus citations
  • Dimensions of cyber-attacks: Cultural, social, economic, and political

    Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q. & Laplante, P., Mar 2011, In: IEEE Technology and Society Magazine. 30, 1, p. 28-38 11 p., 5725605.

    Research output: Contribution to journalArticlepeer-review

    107 Scopus citations
  • Discovering multidimensional correlations among regulatory requirements to understand risk

    Gandhi, R. A. & Lee, S. W., Sep 2011, In: ACM Transactions on Software Engineering and Methodology. 20, 4, 16.

    Research output: Contribution to journalArticlepeer-review

    11 Scopus citations
  • Empirical results on the study of software vulnerabilities (NIER track)

    Wu, Y., Siy, H. & Gandhi, R., 2011, ICSE 2011 - 33rd International Conference on Software Engineering, Proceedings of the Conference. p. 964-967 4 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Matrix based key agreement algorithms for sensor networks

    Parakh, A. & Kak, S., 2011, ANTS 2011 - 5th IEEE International Conference on Advanced Networks and Telecommunication Systems. 6163684. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Using anomalous event patterns in control systems for tamper detection

    Sousan, W., Gandhi, R., Zhu, Q. & Mahoney, W., 2011, 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    Building a social dimensional threat model from current and historic events of cyber attacks

    Sharma, A., Gandhi, R. A., Mahoney, W., Sousan, W. & Zhu, Q., 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 981-986 6 p. 5591394. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Exploring social contexts along the time dimension: Temporal analysis of named entities

    Walenz, B., Gandhi, R., Mahoney, W. & Zhu, Q., 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 508-512 5 p. 5591316. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Studying software vulnerabilities

    Gandhi, R. A., Siy, H. & Wu, Y., 2010, In: CrossTalk. 23, 9-10, p. 16-20 5 p.

    Research output: Contribution to journalArticlepeer-review

    8 Scopus citations
  • Using semantic templates to study vulnerabilities recorded in large software repositories

    Wu, Y., Gandhi, R. A. & Siy, H., 2010, 2010 ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, in Conjunction with the 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010. p. 22-28 7 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Using term extraction patterns to discover coherent relationships from open source intelligence

    Sousan, W. L., Zhu, Q., Gandhi, R., Mahoney, W. & Sharma, A., 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 967-972 6 p. 5591400. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    A coherent measurement of web-search Relevance

    Mahoney, W. R., Hospodka, P., Sousan, W., Nickell, R. & Zhu, Q., Nov 2009, In: IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans. 39, 6, p. 1176-1187 12 p.

    Research output: Contribution to journalArticlepeer-review

    4 Scopus citations
  • Assurance case driven case study design for requirements engineering research

    Gandhi, R. A. & Lee, S. W., 2009, Requirements Engineering: Foundation for Software Quality - 15th International Working Conference, REFSQ 2009, Proceedings. p. 190-196 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5512 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations