Search results

  • 2015

    Authentication bypass and remote escalated I/O command attacks

    Grandgenett, R., Mahoney, W. & Gandhi, R., Apr 7 2015, Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015. Association for Computing Machinery, 2. (ACM International Conference Proceeding Series; vol. 06-08-April-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Implementing Diffie-Hellman key exchange using quantum EPR pairs

    Mandal, S. & Parakh, A., 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950006. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Measuring the Potential for Victimization in Malicious Content

    Hale, M. L., Gamble, R., Hale, J., Haney, M., Lin, J. & Walter, C., Aug 13 2015, Proceedings - 2015 IEEE International Conference on Web Services, ICWS 2015. Zhu, H. & Miller, J. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 305-312 8 p. 7195583. (Proceedings - 2015 IEEE International Conference on Web Services, ICWS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Modifications to GCC for increased software privacy

    Mahoney, W. R., 2015, In: International Journal of Information and Computer Security. 7, 2-4, p. 160-176 17 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • New key agreement techniques for sensor networks

    Parakh, A. & Kak, S., Mar 1 2015, In: Infocommunications Journal. 7, 1, p. 15-21 7 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Quantum teleportation for keyless cryptography

    Parakh, A., 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950005. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security

    Hale, M. L., Ellis, D., Gamble, R., Waler, C. & Lin, J., Aug 26 2015, Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015. Zhang, J. & Altintas, O. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 97-104 8 p. 7226677. (Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security

    Mandal, S., Gandhi, R. & Siy, H., Nov 16 2015, 8th International Workshop on Requirements Engineering and Law, RELAW 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. 7330205. (8th International Workshop on Requirements Engineering and Law, RELAW 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Towards a new quasigroup block cipher for a single-chip FPGA implementation

    Mahoney, W. & Parakh, A., Oct 2 2015, 24th International Conference on Computer Communications and Networks, ICCCN 2015. Institute of Electrical and Electronics Engineers Inc., 7288479. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Using the oldest military force for the newest national defense

    Claus, B., Gandhi, R. A., Rawnsley, J. & Crowe, J., 2015, In: Journal of Strategic Security. 8, 4, p. 1-22 22 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    3 Scopus citations
  • 2014

    A quantum Diffie-Hellman protocol using commuting transformations

    Subramaniam, P. & Parakh, A., 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057257. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Cryptanalysis of the quasigroup block cipher

    Battey, M. & Parakh, A., Mar 28 2014, Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014. Association for Computing Machinery, Inc, 2737600. (Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Exploitation of Allen Bradley's implementation of etherNet/IP for denial of service against industrial control systems

    Grandgenett, R., Gandhi, R. & Mahoney, W., 2014, 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014. Liles, S. (ed.). Academic Conferences Limited, p. 58-65 8 p. (9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Gauging the impact of FISMA on software security

    Gandhi, R. A., Crosby, K., Siy, H. & Mandal, S., Sep 1 2014, Computer, 47, 9, p. 103-107 5 p.

    Research output: Contribution to specialist publicationArticle

    1 Scopus citations
  • Hardware implementation of quasigroup encryption for SCADA networks

    Mahoney, W., Parakh, A. & Battey, M., Oct 14 2014, Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 301-305 5 p. 6924243. (Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Improving the efficiency of entanglement based quantum key exchange

    Parakh, A. & Verma, P., Sep 25 2014, 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings. Institute of Electrical and Electronics Engineers Inc., 6911853. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Limits on detecting eavesdropper in QKD protocols

    Subramaniam, P. & Parakh, A., 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057239. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • My PLC makes an excellent web server

    Mahoney, W., 2014, 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014. Liles, S. (ed.). Academic Conferences Limited, p. 149-157 9 p. (9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    An efficient quasigroup block cipher

    Battey, M. & Parakh, A., Nov 2013, In: Wireless Personal Communications. 73, 1, p. 63-76 14 p.

    Research output: Contribution to journalArticlepeer-review

    11 Scopus citations
  • A probabilistic quantum key transfer protocol

    Parakh, A., Nov 2013, In: Security and Communication Networks. 6, 11, p. 1389-1395 7 p.

    Research output: Contribution to journalArticlepeer-review

    17 Scopus citations
  • A quantum oblivious transfer protocol

    Parakh, A., 2013, The Nature of Light: What are Photons? V. SPIE, 883204. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8832).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • A social dimensional cyber threat model with formal concept analysis and fact-proposition inference

    Sharma, A., Gandhi, R., Zhu, Q., Mahoney, W. R. & Sousan, W., 2013, In: International Journal of Information and Computer Security. 5, 4, p. 301-333 33 p.

    Research output: Contribution to journalArticlepeer-review

    3 Scopus citations
  • Lightweight formal models of software weaknesses

    Gandhi, R., Siy, H. & Wu, Y., 2013, 2013 1st FME Workshop on Formal Methods in Software Engineering, FormaliSE 2013 - Proceedings. IEEE Computer Society, p. 50-56 7 p. 6612277. (2013 1st FME Workshop on Formal Methods in Software Engineering, FormaliSE 2013 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Privacy preserving computations using implicit security

    Parakh, A. & Mahoney, W., 2013, 22nd International Conference on Computer Communications and Networks, ICCCN 2013 - Conference Proceedings. 6614172. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • SCADA threats in the modern airport

    McCarthy, J. & Mahoney, W., 2013, 8th International Conference on Information Warfare and Security 2013. p. 141-146 6 p. (8th International Conference on Information Warfare and Security, ICIW 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SEncrypt: An encryption algorithm inspired from biological processes

    Bonham-Carter, O., Parakh, A. & Bastola, D., 2013, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013. p. 321-327 7 p. 6680858. (Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    A freshman level course on information assurance: Can it be done? here's how

    Gandhi, R., Jones, C. & Mahoney, W., Sep 2012, ACM Inroads, 3, 3, p. 50-61 12 p.

    Research output: Contribution to specialist publicationArticle

    5 Scopus citations
  • A new small world lattice

    Parakh, A. & Kak, S., 2012, Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Revised Selected Papers. p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7135 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Communication efficient oblivious transfer using elliptic curves

    Parakh, A., 2012, Proceedings - IEEE 14th International Symposium on High-Assurance Systems Engineering, HASE 2012. p. 173-174 2 p. 6375613. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Early security patterns: A collection of constraints to describe regulatory security requirements

    Gandhi, R. A. & Rahmani, M., 2012, 2012 2nd IEEE International Workshop on Requirements Patterns, RePa 2012 - Proceedings. p. 17-22 6 p. 6359966. (2012 2nd IEEE International Workshop on Requirements Patterns, RePa 2012 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Efficient quasigroup block cipher for sensor networks

    Battey, M. & Parakh, A., 2012, 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings. 6289294. (2012 21st International Conference on Computer Communications and Networks, ICCCN 2012 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Reverse engineering - Is it art?

    Mahoney, W. & Gandhi, R. A., Mar 2012, ACM Inroads, 3, 1, p. 56-61 6 p.

    Research output: Contribution to specialist publicationArticle

    5 Scopus citations
  • 2011

    An integrated framework for control system simulation and regulatory compliance monitoring

    Mahoney, W. & Gandhi, R. A., Apr 2011, In: International Journal of Critical Infrastructure Protection. 4, 1, p. 41-53 13 p.

    Research output: Contribution to journalArticlepeer-review

    18 Scopus citations
  • Dimensions of cyber-attacks: Cultural, social, economic, and political

    Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q. & Laplante, P., Mar 2011, In: IEEE Technology and Society Magazine. 30, 1, p. 28-38 11 p., 5725605.

    Research output: Contribution to journalArticlepeer-review

    89 Scopus citations
  • Discovering multidimensional correlations among regulatory requirements to understand risk

    Gandhi, R. A. & Lee, S. W., Sep 2011, In: ACM Transactions on Software Engineering and Methodology. 20, 4, 16.

    Research output: Contribution to journalArticlepeer-review

    11 Scopus citations
  • Empirical results on the study of software vulnerabilities (NIER track)

    Wu, Y., Siy, H. & Gandhi, R., 2011, ICSE 2011 - 33rd International Conference on Software Engineering, Proceedings of the Conference. p. 964-967 4 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Language-driven assurance for regulatory compliance of control systems

    Gandhi, R., Mahoney, W., Dick, K. & Wilson, Z., 2011, 5th European Conference on Information Management and Evaluation, ECIME 2011. p. 407-415 9 p. (5th European Conference on Information Management and Evaluation, ECIME 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Matrix based key agreement algorithms for sensor networks

    Parakh, A. & Kak, S., 2011, ANTS 2011 - 5th IEEE International Conference on Advanced Networks and Telecommunication Systems. 6163684. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Using anomalous event patterns in control systems for tamper detection

    Sousan, W., Gandhi, R., Zhu, Q. & Mahoney, W., 2011, 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2010

    Building a social dimensional threat model from current and historic events of cyber attacks

    Sharma, A., Gandhi, R. A., Mahoney, W., Sousan, W. & Zhu, Q., 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 981-986 6 p. 5591394. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Exploring social contexts along the time dimension: Temporal analysis of named entities

    Walenz, B., Gandhi, R., Mahoney, W. & Zhu, Q., 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 508-512 5 p. 5591316. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Studying software vulnerabilities

    Gandhi, R. A., Siy, H. & Wu, Y., 2010, In: CrossTalk. 23, 9-10, p. 16-20 5 p.

    Research output: Contribution to journalArticlepeer-review

    8 Scopus citations
  • Using semantic templates to study vulnerabilities recorded in large software repositories

    Wu, Y., Gandhi, R. A. & Siy, H., 2010, 2010 ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, in Conjunction with the 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010. p. 22-28 7 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Using term extraction patterns to discover coherent relationships from open source intelligence

    Sousan, W. L., Zhu, Q., Gandhi, R., Mahoney, W. & Sharma, A., 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 967-972 6 p. 5591400. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    A coherent measurement of web-search Relevance

    Mahoney, W. R., Hospodka, P., Sousan, W., Nickell, R. & Zhu, Q., Nov 2009, In: IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans. 39, 6, p. 1176-1187 12 p.

    Research output: Contribution to journalArticlepeer-review

    4 Scopus citations
  • Assurance case driven case study design for requirements engineering research

    Gandhi, R. A. & Lee, S. W., 2009, Requirements Engineering: Foundation for Software Quality - 15th International Working Conference, REFSQ 2009, Proceedings. p. 190-196 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5512 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Ontology guided risk analysis: From informal specifications to formal metrics

    Gandhi, R. & Lee, S. W., 2009, Advances in Information and Intelligent Systems. Ras, Z. & Ribarsky, W. (eds.). p. 227-249 23 p. (Studies in Computational Intelligence; vol. 251).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Requirements engineering visualization: A survey on the state-of-the-art

    Cooper, J. R., Lee, S. W., Gandhi, R. A. & Gotel, O., 2009, 2009 4th International Workshop on Requirements Engineering Visualization, REV 2009. p. 46-55 10 p. 5460248. (2009 4th International Workshop on Requirements Engineering Visualization, REV 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • 2008

    IDEA: A new intrusion detection data source

    Mahoney, W. & Sousan, W., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 15-19 5 p. 4511526. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • IDEA: A new intrusion detection data source

    Mahoney, W. & Sousan, W., 2008, In: International Journal of Security and its Applications. 2, 3, p. 17-24 8 p.

    Research output: Contribution to journalArticlepeer-review