Filter
Conference contribution

Search results

  • 2022

    Evaluating different topologies for multi-photon quantum key distribution

    Burr, J., Parakh, A. & Subramaniam, M., 2022, Quantum Information Science, Sensing, and Computation XIV. Donkor, E., Hayduk, M., Frey, M. R., Lomonaco, S. J. & Myers, J. M. (eds.). SPIE, 1209309. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 12093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Evaluating Security of Executable Steganography for Digital Software Watermarking

    Mullins, J. A., McDonald, J. T., Mahoney, W. R. & Andel, T. R., 2022, SoutheastCon 2022. Institute of Electrical and Electronics Engineers Inc., p. 666-673 8 p. (Conference Proceedings - IEEE SOUTHEASTCON; vol. 2022-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2021

    A Digital Forensics Investigation of a Smart Scale IoT Ecosystem

    Grispos, G., Tursi, F., Choo, K. K. R., Mahoney, W. & Glisson, W. B., 2021, Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021. Zhao, L., Kumar, N., Hsu, R. C. & Zou, D. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 710-717 8 p. (Proceedings - 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • A New Approach for Analyzing Safety and Performance Factors in Civil Infrastructures Using Correlation Networks and Population Analysis

    Chetti, P., Ali, H. H., Ghersi, D., Ghandi, R. A., Ricks, B. & Najjar, L., 2021, Structural Health Monitoring 2021: Enabling Next-Generation SHM for Cyber-Physical Systems - Proceedings of the 13th International Workshop on Structural Health Monitoring, IWSHM 2021. Farhangdoust, S., Guemes, A. & Chang, F-K. (eds.). DEStech Publications Inc., p. 593-600 8 p. (Structural Health Monitoring 2021: Enabling Next-Generation SHM for Cyber-Physical Systems - Proceedings of the 13th International Workshop on Structural Health Monitoring, IWSHM 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Network routing protocols for multi-photon quantum cryptography

    Parakh, A. & Subramaniam, M., 2021, Quantum Communications and Quantum Imaging XIX. Deacon, K. S. & Meyers, R. E. (eds.). SPIE, 118350L. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 11835).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2020

    A machine-learning based framework for detection of fake political speech

    Purevdagva, C., Zhao, R., Huang, P. C. & Mahoney, W., Dec 2020, Proceedings - 2020 IEEE 14th International Conference on Big Data Science and Engineering, BigDataSE 2020. Wang, G., Westphall, C. B. & Castiglione, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 80-87 8 p. 9343368. (Proceedings - 2020 IEEE 14th International Conference on Big Data Science and Engineering, BigDataSE 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • A Novel Approach for Embedding and Traversing Problems in Serious Games

    Parakh, A., Subramaniam, M., Chundi, P. & Ostler, E., Oct 7 2020, SIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, p. 229-235 7 p. (SIGITE 2020 - Proceedings of the 21st Annual Conference on Information Technology Education).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • Knock! Knock! Who is there? Investigating data leakage from a medical internet of things hijacking attack

    Flynn, T., Grispos, G., Glisson, W. B. & Mahoney, W., 2020, Proceedings of the 53rd Annual Hawaii International Conference on System Sciences, HICSS 2020. Bui, T. X. (ed.). IEEE Computer Society, p. 6456-6465 10 p. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2020-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Minitrack introduction: Self-adaptive systems: Technologies, domains, principles, and practices

    Gamble, R. & Hale, M., 2020, Proceedings of the 53rd Annual Hawaii International Conference on System Sciences, HICSS 2020. Bui, T. X. (ed.). IEEE Computer Society, p. 6548 1 p. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2020-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Welcome? Investigating the reception of new contributors to organizational-communal open source software projects

    Lumbard, K., Wethor, G., Goggins, S., Buhman, A., Hale, M. & Germonprez, M., 2020, 26th Americas Conference on Information Systems, AMCIS 2020. Association for Information Systems, (26th Americas Conference on Information Systems, AMCIS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2019

    Analyzing and predicting player performance in a quantum cryptography serious game

    Abeyrathna, D., Vadla, S., Bommanapally, V., Subramaniam, M., Chundi, P. & Parakh, A., 2019, Games and Learning Alliance - 7th International Conference, GALA 2018, Proceedings. Söbke, H., Gentile, M. & Allegra, M. (eds.). Springer Verlag, p. 267-276 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11385 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • An approach towards designing problem networks in serious games

    Parakh, A., Chundi, P. & Subramaniam, M., Aug 2019, IEEE Conference on Games 2019, CoG 2019. IEEE Computer Society, 8848055. (IEEE Conference on Computatonal Intelligence and Games, CIG; vol. 2019-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Detecting dynamic security threats in multi-component IoT systems

    Shrestha, I. & Hale, M. L., 2019, Proceedings of the 52nd Annual Hawaii International Conference on System Sciences, HICSS 2019. Bui, T. X. (ed.). IEEE Computer Society, p. 7146-7155 10 p. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Minitrack introduction: Software development for self-adaptation in services, wearables, and IoT devices

    Gamble, R. & Hale, M., 2019, Proceedings of the 52nd Annual Hawaii International Conference on System Sciences, HICSS 2019. Bui, T. X. (ed.). IEEE Computer Society, p. 7471 1 p. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2019-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Bootstrapped QKD: Improving key rate and multiphoton resistance

    Parakh, A. & Subramaniam, M., 2018, Quantum Information Science and Technology IV. Gruneisen, M. T., Dusek, M. & Rarity, J. G. (eds.). SPIE, 2500438. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10803).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Leave it to Weaver

    Mahoney, W., Franco, J., Hoff, G. & McDonald, J. T., Dec 3 2018, Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, SSPREW 2018. Association for Computing Machinery, (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Multimodal data fusion and behavioral analysis tooling for exploring trust, trust-propensity, and phishing victimization in online environments

    Hefley, M., Wethor, G. E. & Hale, M. L., 2018, Proceedings of the 51st Annual Hawaii International Conference on System Sciences, HICSS 2018. Bui, T. X. (ed.). IEEE Computer Society, p. 862-871 10 p. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Open data standards for open source software risk management routines: An examination of SPDX

    Gandhi, R., Germonprez, M. & Link, G. J. P., Jan 7 2018, GROUP 2018 - Proceedings of the 2018 ACM Conference on Supporting Groupwork. Association for Computing Machinery, p. 219-229 11 p. (Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Providing variable levels of security in quantum cryptography

    Parakh, A., 2018, Quantum Communications and Quantum Imaging XVI. Meyers, R. E., Shih, Y. & Deacon, K. S. (eds.). SPIE, 107710R. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • The hidden crisis: Developing smart big data pipelines to address grand challenges of bridge infrastructure health in the United States

    Gandhi, R., Linzel, D., Sim, C., Khazanchi, D. & Ricks, B., 2018, Conference Proceedings - 15th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2018. Tomaszewski, B. & Boersma, K. (eds.). Information Systems for Crisis Response and Management, ISCRAM, p. 1003-1015 13 p. (Proceedings of the International ISCRAM Conference; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Using fewer qubits to correct errors in the three-stage QKD protocol

    Parakh, A., 2018, Quantum Information Science and Technology IV. Gruneisen, M. T., Dusek, M. & Rarity, J. G. (eds.). SPIE, 108030A. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 10803).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2017

    QuaSim: A virtual quantum cryptography educator

    Parakh, A., Subramaniam, M. & Ostler, E., Sep 27 2017, 2017 IEEE International Conference on Electro Information Technology, EIT 2017. IEEE Computer Society, p. 600-605 6 p. 8053434. (IEEE International Conference on Electro Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2016

    Assessing pairing and data exchange mechanism security in the wearable internet of things

    Lotfy, K. & Hale, M. L., Dec 16 2016, Proceedings - 2016 IEEE International Conference on Mobile Services, MS 2016. Institute of Electrical and Electronics Engineers Inc., p. 25-32 8 p. 7787031. (Proceedings - 2016 IEEE International Conference on Mobile Services, MS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Cheating resistant implicit security

    Parakh, A., Jan 4 2016, Proceedings - 2015 IEEE 14th International Symposium on Network Computing and Applications, NCA 2015. Avresky, D. R., Avresky, D. R. & Busnel, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 57-62 6 p. 7371703. (Proceedings - 2015 IEEE 14th International Symposium on Network Computing and Applications, NCA 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Comparing the effectiveness of commercial obfuscators against MATE attacks

    Manikyam, R., McDonald, J. T., Mahoney, W. R., Andel, T. R. & Russ, S. H., Dec 5 2016, Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop 2016, SSPREW 2016. Association for Computing Machinery, a8. (ACM International Conference Proceeding Series; vol. 05-06-December-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Correcting rotational errors in three stage QKD

    Parakh, A. & Van Brandwijk, J., Jun 27 2016, 2016 23rd International Conference on Telecommunications, ICT 2016. Institute of Electrical and Electronics Engineers Inc., 7500409. (2016 23rd International Conference on Telecommunications, ICT 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Imposing security awareness on wearables

    Walter, C., Hale, M. L. & Gamble, R. F., May 14 2016, Proceedings - 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, SEsCPS 2016. Association for Computing Machinery, Inc, p. 29-35 7 p. (Proceedings - 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, SEsCPS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Linear cryptanalysis of quasigroup block cipher

    Gerlock, L. & Parakh, A., Apr 5 2016, Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016. Association for Computing Machinery, Inc, 2897818. (Proceedings of the 11th Annual Cyber and Information Security Research Conference, CISRC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • New protocol for quantum public key cryptography

    Parakh, A., Feb 18 2016, ANTS 2015 - IEEE International Conference on Advanced Networks and Telecommuncations Systems. IEEE Computer Society, 7413667. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS; vol. 2016-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Outcomes of emotional content from Agile team forum posts

    Marshall, A., Gamble, R. F. & Hale, M. L., May 14 2016, Proceedings - 1st International Workshop on Emotion Awareness in Software Engineering, SEmotion 2016. Association for Computing Machinery, Inc, p. 6-11 6 p. (Proceedings - 1st International Workshop on Emotion Awareness in Software Engineering, SEmotion 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Quantifying the security of a QKD protocol

    Parakh, A., Feb 18 2016, ANTS 2015 - IEEE International Conference on Advanced Networks and Telecommuncations Systems. IEEE Computer Society, 7413637. (International Symposium on Advanced Networks and Telecommunication Systems, ANTS; vol. 2016-February).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    A quantum Diffie-Hellman protocol

    Subramaniam, P. & Parakh, A., Feb 6 2015, Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc., p. 523-524 2 p. 7035733. (Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • A Testbed and Process for Analyzing Attack Vectors and Vulnerabilities in Hybrid Mobile Apps Connected to Restful Web Services

    Hale, M. L. & Hanson, S., Aug 13 2015, Proceedings - 2015 IEEE World Congress on Services, SERVICES 2015. Bahsoon, R. & Zhang, L-J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 181-188 8 p. 7196523. (Proceedings - 2015 IEEE World Congress on Services, SERVICES 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Authentication bypass and remote escalated I/O command attacks

    Grandgenett, R., Mahoney, W. & Gandhi, R., Apr 7 2015, Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015. Association for Computing Machinery, 2. (ACM International Conference Proceeding Series; vol. 06-08-April-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Implementing Diffie-Hellman key exchange using quantum EPR pairs

    Mandal, S. & Parakh, A., 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950006. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Measuring the Potential for Victimization in Malicious Content

    Hale, M. L., Gamble, R., Hale, J., Haney, M., Lin, J. & Walter, C., Aug 13 2015, Proceedings - 2015 IEEE International Conference on Web Services, ICWS 2015. Miller, J. A. & Zhu, H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 305-312 8 p. 7195583. (Proceedings - 2015 IEEE International Conference on Web Services, ICWS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Quantum teleportation for keyless cryptography

    Parakh, A., 2015, Quantum Information and Computation XIII. Hayduk, M., Pirich, A. R. & Donkor, E. (eds.). SPIE, 950005. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9500).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Secu Wear: An Open Source, Multi-component Hardware/Software Platform for Exploring Wearable Security

    Hale, M. L., Ellis, D., Gamble, R., Waler, C. & Lin, J., Aug 26 2015, Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015. Zhang, J. & Altintas, O. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 97-104 8 p. 7226677. (Proceedings - 2015 IEEE 3rd International Conference on Mobile Services, MS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security

    Mandal, S., Gandhi, R. & Siy, H., Nov 16 2015, 8th International Workshop on Requirements Engineering and Law, RELAW 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. 7330205. (8th International Workshop on Requirements Engineering and Law, RELAW 2015 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Towards a new quasigroup block cipher for a single-chip FPGA implementation

    Mahoney, W. & Parakh, A., Oct 2 2015, 24th International Conference on Computer Communications and Networks, ICCCN 2015. Institute of Electrical and Electronics Engineers Inc., 7288479. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2014

    A quantum Diffie-Hellman protocol using commuting transformations

    Subramaniam, P. & Parakh, A., 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057257. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Cryptanalysis of the quasigroup block cipher

    Battey, M. & Parakh, A., Mar 28 2014, Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014. Association for Computing Machinery, Inc, 2737600. (Proceedings of the 2014 ACM Southeast Regional Conference, ACM SE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Exploitation of Allen Bradley's implementation of etherNet/IP for denial of service against industrial control systems

    Grandgenett, R., Gandhi, R. & Mahoney, W., 2014, 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014. Liles, S. (ed.). Academic Conferences Limited, p. 58-65 8 p. (9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Hardware implementation of quasigroup encryption for SCADA networks

    Mahoney, W., Parakh, A. & Battey, M., Oct 14 2014, Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 301-305 5 p. 6924243. (Proceedings - 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Improving the efficiency of entanglement based quantum key exchange

    Parakh, A. & Verma, P., Sep 25 2014, 2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings. Institute of Electrical and Electronics Engineers Inc., 6911853. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Limits on detecting eavesdropper in QKD protocols

    Subramaniam, P. & Parakh, A., 2014, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 7057239. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • My PLC makes an excellent web server

    Mahoney, W., 2014, 9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014. Liles, S. (ed.). Academic Conferences Limited, p. 149-157 9 p. (9th International Conference on Cyber Warfare and Security 2014, ICCWS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Toward increasing awareness of suspicious content through game play

    Hale, M. & Gamble, R., Sep 18 2014, Proceedings - 2014 IEEE 10th World Congress on Services, SERVICES 2014. Zhang, L-J. & Bahsoon, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 113-120 8 p. 6903253. (Proceedings - 2014 IEEE 10th World Congress on Services, SERVICES 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2013

    A design and verification framework for service composition in the cloud

    Hale, M. L., Gamble, M. T. & Gamble, R. F., 2013, Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013. p. 317-324 8 p. 6655716. (Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • A quantum oblivious transfer protocol

    Parakh, A., 2013, The Nature of Light: What are Photons? V. SPIE, 883204. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 8832).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations