Research Areas

Security Principles

This area includes topics such as domains and domain separation, resources and resource isolation, privileges and least privilege, layering, application of principles to function, component and system-level and compositions.

Key Faculty

  • Richard Baskerville
  • Gengsheng Qin

Refereed Journal Articles

  • Siponen, M., Baskerville, R., & Heikka, J. (2006). A Design Theory for Secure Information   Systems Design Methods. Journal of the Association for Information Systems, 7 (11) 725-  770.
  • Baskerville, R. (1993) “Information Systems Security Design Methods: Implications for Information Systems Development,” Computing Surveys, 25 (4), 375-414.
  • Zhou, X.H. and Qin, G.S. (2005). Improved confidence intervals for the sensitivity at a fixed level of specificity of a continuous-scale diagnostic test. Statistics in Medicine, 24:465-477.
  • Qin, G.S., and Zhou, X.H. (2006). Empirical likelihood inference for the area under the ROC curve. Biometrics, 62:613-622.
  • Qin, G.S., Hsu, Y.-S., and Zhou, X.H. (2006). New confidence intervals for the difference between two sensitivities at a fixed level of specificity. Statistics in Medicine, 25:3487-3502.
  • Qin, G.S.  and Hotilovac, L. (2008). Comparison of non-parametric confidence intervals for the area under the ROC curve of a continuous-scale diagnostic test. Statistical Methods in Medical Research, 17:207-221.
  • Qin, G.S., Davis, A.E., and Jing, B.-Y.  (2011). Empirical likelihood-based confidence intervals for the sensitivity of a continuous-scale diagnostic test at a fixed level of specificity. Statistical Methods in Medical Research, 20:217- 231.  Published online: August 4, 2009.
  • Huang, X., Qin, G.S. and Fang, Y. (2011). Optimal combinations of diagnostic tests based on AUC. Biometrics, 67:568–576. Article first published online: Jun 16, 2010.
  • Qin, G.S., Jin, X. P. and Zhou, X. H. (2011). Nonparametric interval estimation for the partial area under the ROC curve. The Canadian Journal of Statistics, 39:17-33.
  • Yang, B.Y., Qin, G.S. (2012). Empirical Likelihood-based Inferences for the Area under the ROC Curve with Covariates. SCIENCE CHINA Mathematics (Science in China Series A), 55:1553–1564.
  • Huang, X., Qin, G.S., Yuan, Y. and Zhou, X.H. (2012). Confidence intervals for the difference between two partial AUCs.  Australian and New Zealand Journal of Statistics 54:63–79.
  • Wang, B.H and Qin, G.S. (2012). Imputation-based Empirical Likelihood Inference for the Area under the ROC Curve with Missing Data. Statistics and Its Interface 5:319–329.
  • Zhou, H.C. and Qin, G.S. (2013). Confidence intervals for the difference in paired Youden indices. Pharmaceutical Statistics 12:17-27.
  • Wang, B. and Qin, G.S. (2013). Empirical likelihood confidence regions for the evaluation of continuous-scale diagnostic test in the presence of verification bias. The Canadian Journal of Statistics 41:398–420.
  • Wang, B.H and Qin, G.S. (2014). Empirical likelihood-based confidence intervals for the sensitivity of a continuous-scale diagnostic test with missing data. Communications in Statistics – Theory and Methods 43: 3248–3268.
  • Zhou, H.C. and Qin, G.S.  (2015). Nonparametric Covariate Adjustment for the Youden Index.  Applied Statistics in Biomedicine and Clinical Trials Design, Springer. Chapter 7: 109-132.
  •  Wang, B.H and Qin, G.S. (2016). Jackknife Empirical Likelihood Confidence Regions for the Evaluation of Continuous- Scale Diagnostic Tests with Verification Bias. Statistical Methods in Medical Research 25: 2120-2137.
  • Yang, B.Y., Huang X. and Qin, G.S. (2017). Variable Selection in ROC Curve Analysis with Focused Information Criteria.  Statistics and Its Interface 10: 229–238.

Books and Book Chapters

  • Baskerville, R. (1988) Designing Information Systems Security, J. Wiley, Chichester.
  • Baskerville, R. (1989) “Logical controls specification: An approach to information systems security.,” Systems development for human progress, H. Klein and K. Kumar, eds., North-Holland., Amsterdam, 241-255.

Conference Proceedings

  • Baskerville, R. & Lee, A. (2013). Individual – Organizational Bindpoints: A Design Theory for Bring-Your-Own-System. Paper presented at the Pacific Asia Conference on Information Systems 2013 (PACIS 2013), Jeju Island, Korea.
  • Baskerville, R. (2009). Information Security Control Decision Theory. In A. Vance (Ed.), Proceedings of the IFIP TC8 International Workshop on Information Systems Security Research (pp. 179-193). Cape Town, South Africa.

Presentations

  • Baskerville, R. (2001). Information Systems Security Design Methods. Stockholm, Sweden:   Stockholm University/Royal Institute of Technology.
  • Baskerville, R. (1987) “Applying an Expert System to Design Computer Security,” Proceedings of The First Conference on Microcomputers and Artificial Intelligence in Communications Technologies, Chattanooga, Tennessee, October, 1987.

Security Mechanisms

This field includes cryptography, identification, and authentication, authorization, and access, controls, OS/DBMS/network mechanisms, trusted processes, virtualization, biometrics, audit, monitoring, anomaly detection, DLP, wireless, link and signal security.

Key Faculty

  • Ashwin Ashok
  • Anu Bourgeois
  • Xiaojun Cao
  • Robert Harrison
  • Yi Pan
  • Dmitry Zhdanov

Refereed Journal Articles

  • Jung, M. Valero, A. Bourgeois and R. Beyah, “Attacking and Securing Beacon-Enabled 802.15. Networks,” Springer Journal of Mobile Communication, Computation and Information (Wireless Networks),21(5):1517-1535 (2015).
  • Cai, S. Ji, J. He, L. Wei and A. G. Bourgeois, “Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration,” IEEE Transactions on Parallel and Distributed Systems, 25(8): 2020-2029 (2014).
  • Fajardo Delgado, D., J. A. Fernandez Zepeda and A. G. Bourgeois, “The bodyguard allocation problem,”IEEE Transactions on Parallel and Distributed Systems, 24(7), pp. 1465-1478, (2013).
  • Marco Valero, Sang Shin Jung, Anu G. Bourgeois, and Raheem A. Beyah, “An incrementally deployable energy efficient 802.15.4 MAC protocol (DEEP),” Ad Hoc Networks, 10(7), pp. 1238-1252, (2012).
  • D. Fajardo-Delgado, J.A. Fernández-Zepeda, and A. G. Bourgeois, “Randomized Self-Stabilizing Leader Election in Preference-Based Anonymous Trees,” International Journal of Foundations of Computer Science, 23(4), (2012), pp. 853-876.
  • F. Hu*, Q.  Hao,  Q.  Sun, X.  Cao, R. Ma, T. Zhang, Y. Patil and J. Lu, “Cyber-Physical System with  Virtual Reality for Intelligent Motion Recognition and Training”, IEEE Transactions on System, Man and Cybernetics, Vol. 47, No. 2, pp. 347-363, Feb.2017
  • Z. Ye*, X. Cao,  J.  Wang,  H.  Yu and C. Qiao, “Joint Topology Design and Mapping of Service   Function   Chains for   Efficient,   Scalable and   Reliable   Network   Function Virtualization,” IEEE Network, Vol. 30, No. 3, pp. 81-87, May20164.
  • Yang  Wang,  Qian  Hu  and X.  Cao, “A Branch-and-Price  Framework  for  Optimal  Virtual Network Embedding,” Elsevier Computer Networks, Vol 13, No. 39, Nov. 2015
  • X. Gao*, Z. Ye, J. Fan, W. Zhong, Y. Zhao, X. Cao, H. Yu and C. Qiao, “Virtual Network Mapping for Reliable   Multicast   Services with   Max-Min   Fairness of   Reliability,”  IEEE/OSA  Journal of  Optical  Communications and  Networking  (JOCN),  Vol.  7,  No.  9, pp. 942-951, Sep. 2015
  • C. Wang, C. Lan, S. Niu, X. Cao and M. Gong, “An ID-Based Certified E-mail Protocol with STTP Suitable for Wireless Mobile Environments,” Journal of Computers, Vol. 8, No. 1, pp. 3 -9, 2013
  • Q. Hu, Yang Wang and X. Cao, “Survivable Network Virtualization for a Single Facility Node Failure: A Network   Flow   Perspective,” Elsevier Optical   Switching and Networking(OSN), Vol. 10, No. 4, pp. 406-415,2013
  • T. E. Calhoun, Jr., X. Cao, Y. Li, and R. Beyah, “An 802.11 MAC Layer Covert Channel,” Wireless Communications and Mobile Computing (WCMC), Vol. 12, No. 5, Apr. 2012
  • L. Pan*, X. Cao, and H. Wu, “Design and Modeling a Distributed and Fair Access MAC Protocol (DFA)for Multi-hop  Wireless  Networks,”IEEE  Transactions  on  Wireless Communications, VOL. 8, NO. 5, pp.2434-2442, May 2009
  • F. Hu*, W. Siddiqui and X. Cao, “SPECTRA: Secure Power-Efficient Clustered-Topology Routing Algorithm in Large-scale Wireless micro-Sensor Networks,”International Journal of Information Technology, Vol. 11, No.2, pp. 95-118, 2005
  • C. Ni, H. Liu, Y. Pan, and A. G. Bourgeois, “An Enhanced Approach to Determine Connected Dominating Sets for Routing in Mobile Ad Hoc Networks,” International Journal of Mobile Communications, vol. 3, issue 3, (2005), pp. 287-302.
  • Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan: b-SPECS+: Batch Veri cation for Secure Pseudonymous Authentication in VANET. IEEE Transactions on Information Forensics and Security 8(11): 1860-1875 (2013).
  • Xue Bai, Ram Gopal, Manuel Nunez and Dmitry Zhdanov. “A Decision Methodology for Managing Operational Efficiency and Information Disclosure Risk in Healthcare Processes.” Decision Support Systems, 2014, 57, pp. 406-416.

Books and Book Chapters

  • F. Hu and X. Cao, “Wireless  Sensor  Networks:  Principles  and  Practice  (Hardcover),”Auerbach  Publications;  1stedition, 531pagesISBN-10:  1420092154,  ISBN-13:  978-1420092158, May 2010
  • F. Hu, X.  Cao,  K.  Wilhelm,  M.  Łukowiak  and  S. Radziszowski, “NTRU-Based Confidential Data  Transmission  In  Telemedicine  Sensor  Networks,” in “Security  in  Ad-hoc  and  Sensor  Networks,”R.  Beyah,  J.  McNair  and  C.  Corbett Eds, World  Scientific Publishing Co., 2009, ISBN: 978-981-4271-08-0

Conference Proceedings

  • Battery-Free Identification Token for Touch Sensing Devices Phuc Nguyen, Ufuk Muncuk, Ashwin Ashok, Kaushik Chowdhury, Marco Gruteser, Tam Vu ACM Conference on Embedded Networked Sensor Systems (SenSys), 2016
  • Whose Move is it Anyway? Authenticating Smart Wearable Devices Using Unique Head Movement Patterns Sugang Li, Ashwin Ashok, Yanyong Zhang, Chenren Xu, Janne Lindqvist, Marco Gruteser Accepted to IEEE Conference on Pervasive Computing and Communications (PerCom), 2016.
  • Chaoyang Li, Andrew Rosen, Caroline Johnson, Anu G. Bourgeois, “Full-view Coverage Holes Detection and Healing Solutions”, in Proc. Of 2ndInternational Conference on Computer and Communications, (ICCC 2016), Oct. 2016.
  • Chaoyang Li, Andrew Rosen, Anu G. Bourgeois, “On Camera Sensor Density Minimization Problem for Triangular Lattice Based Deployment in Full-view Covered Camera Sensor Networks”, in Proc. Of 2ndInternational Conference on Computer and Communications, (ICCC 2016), Oct. 2016.
  • Chaoyang Li, Andrew Rosen, Anu G. Bourgeois, “On k-Full-view Coverage Algorithms in Camera Sensor Networks”, in Proc. Of 2ndInternational Conference on Computer and Communications, (ICCC 2016), Oct. 2016.
  • Maryam Jalalitabar, Marco Valero, and Anu Bourgeois. “Demonstrating the Threat of Hardware Trojans in Wireless Sensor Networks,” Proc. of the Computer Communication and Networks (ICCCN), August 2015.
  • Brendan Benshoof, Andrew Rosen, Anu G. Bourgeois, Robert W. Harrison,  “A Distributed Greedy Heuristic for Computing Voronoi Tessellations With Applications Towards Peer-to-Peer Network,” Proc. of  Dependable, Parallel, Distributed and Network-Centric Systems Workshop, in conjunction with the 29thIEEE/ACM International Parallel and Distributed Processing Symposium, April 2015.
  • Brendan Benshoof, Andrew Rosen, Anu G. Bourgeois, and Robert W. Harrison, “Vhash: Spatial DHT Based on Voronoi Tesselations,” 2ndInternational IBM Cloud Academy Conference, 2013.
  • S.S. Jung, M. Valero, A. G. Bourgeois, and R. Beyah, “Attacking Beacon-Enabled 802.15.4 Networks,” Proc. of International Conference on Security and Privacy in Communication Networks (SecureComm), September 2010, pp. 253-271.
  • M. Valero, R. A. Beyah, and A. G. Bourgeois, "DEEP: A Deployable Energy Efficient 802.15.4 MAC Protocol for Sensor Networks," Proc. of IEEE International Communications Conference (ICC), May 2010.
  • D. Fajardo-Delgado, J.A. Fernández-Zepeda, and A. G. Bourgeois, “Randomized Self-Stabilizing Leader Election in Preference-Based Anonymous Trees,” Proc. of Advances in Parallel and Distributed Computing Models Workshop, in conjunction withthe24thIEEE/ACM International Parallel and Distributed Processing Symposium, April 2010
  • L. Cheng, A. G. Bourgeois, and X. Zhang, “A Performance Comparison Study of GTS Allocation Schemes in IEEE 802.15.4,” Proc. International Workshop on Wireless Ad Hoc, Mesh, and Sensor Networks, in conjunction with International Conference on Future Generation Communication and Networking, vol. 2, (Jeju Island, Korea, December 6 –8, 2007), pp. 356 -361.
  • L. Cheng, A. G. Bourgeois, and X. Zhang, “A New GTS Allocation Scheme for IEEE 802.15.4 Networks with Improved Bandwidth Utilization,” Proc. 7thInternational Symposium on Communications and Information Technologies, (Sydney, Australia, October 16 –19, 2007), pp. 1143-1148.
  • L. Chengand, A. G. Bourgeois, “Energy Efficiency of Different Data Transmission Methods in IEEE 802.15.4: Study and Improvement,” Proc. International Symposium on Wireless Pervasive Computing (ISWPC), 2007.
  • Q. Cheng, Y.-Q. Zhang, N. Hundewale, X.L. Hu, A. Bourgeois andA. Zelikovsky, “Routing Using Messengers in Sparse and Disconnected Mobile Sensor Networks,” Proc. of AWIC2006, (Beer-Sheva, June 5-7, 2006)
  • N. Hundewale, Q. Cheng, X. Hu, A. G. Bourgeois, and A. Zelikovsky, “Autonomous Messenger Based Routing in Disjoint Clusters of Mobile Sensor Networks,” Proc. Of Agent Directed Simulation, (Huntsville, Alabama, April 2-6, 2006).
  • Zhipeng Cai, Shouling Ji, JingHe, and Anu G. Bourgeois, “Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks,” Proc. of International Conference on Distributed Computing Systems (ICDCS),2012, pp. 245-254.
  • C.  Kong,  G.  Luo,  L.  Tian  and X.  Cao, “Optimizing Social Connections for Efficient Information  Acquirement,”  to  appear  in  Proc.  of  IEEE  GlobalCommunications Conference (GLOBECOM), Dec. 2016
  • Z. Ye, X. Cao, C. Qiao, “Joint Topology Design and Mapping of Service Function Chains in Network Function Virtualization,” to appear in Proc. of IEEE Global Communications Conference (GLOBECOM), Dec. 2016
  • Q.Hu, Yang Wang and X. Cao, “Towards Survivable Network Virtualization,” in Proc. of IEEE International Conference on Communications (ICC), Budapest, Hungary 2013
  • Q. Hu, Yang  Wang and X.  Cao, “Resolve the  Virtual  Network  Embedding  Problem:  a Column Generation Approach,” inProc. ofIEEE International Conference on Computer Communications (INFOCOM) Mini-conference, Turin, Italy2013
  • A. Rea*, X. Cao; A. Gupta and N. Shenoy, “A Secure Cloud Internetwork Model with Economic and Social Incentives (SCIMES),”in 18th Americas Conference on Information Systems (AMCIS), Washington Jul.2012
  • Q.Hu,   Yang   Wang   and X. Cao,  “Location-constrained   Survivable   Network Virtualization,” in Proc. of IEEE Sarnoff Symposium, Princeton,NJMay2012
  • C.  Wang,  X.  Yang,  C.  Lan,  and X.  Cao, “An  Efficient  Identity-based  Certified  E-mail Protocol,”in Proc. of Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), Kyoto, Japan, 2009
  • C. Xin*and X. Cao, “A Cognitive Radio Network Architecture Without Control Channel,”in Proc. of IEEE Global Communications Conference (GLOBECOM), Honolulu, Hawaii, Dec. 2009
  • E. Golen, N. Shenoy, and X. Cao, “A Low Latency Scheme for Bulk RFID Tag Reading,” in Proc. of IEEEWireless  Communications  &  Networking  Conference  (WCNC),  Las Vegas, Mar.2008, pp. 1565-1569
  • X. Cao, S.  Liu,  L.  Pan,  and  H.  Wu, “Enhanced  Synchronized  Medium  Access  Control Protocol for Wireless Ad Hoc Networks,” in Proc. of IEEEInternational Conference on Computer  Communications and  Networks  (ICCCN),  Honolulu,  HI,  Aug.2007,  pp.  278-283
  • F. Hu*, C. May, and X. Cao, “Data Aggregation in Distributed Sensor Networks: Towards An Adaptive Timing Control,”in Proc. of ITNG 2006, pp. 256-261
  • F. Hu*, X. Cao and  S.  Kumar, “Trustworthiness in  Wireless  Sensor and  Actuator Networks:  Towards  Low-complexity  Reliability and  Security,” in  Proc. of  IEEE  Global Communications Conference (GLOBECOM), St. Louis, Dec. 2005, pp. 1696-1700
  • C. Xin*, X. Cao, J. Li and B. Wang, “A Route Segment Technique for Blocking Analysis of Dynamic  Traffic Grooming,” in Proc. of 2ndIEEE/Create-Net International Workshop on Traffic Grooming, Co-located with IEEE/Create-Net BroadNets, Boston, Oct. 2005
  • F. Hu*and X. Cao, “Security in Wireless Actor & Sensor Networks (WASN): TowardsA Hierarchical Re-Keying Design,”in  Proc.  of International  Conference  on  Information Technology Coding and Computing (ITCC), Las Vegas, NV, Apr. 2005. pp. 528-533
  • Andrew Rosen, Brendan Benshoof, Robert W. Harrison and Anu G. Bourgeois, “MapReduce on a Chord Distributed Hash Table,” 2ndInternational IBM Cloud Academy Conference, 2013.
  • Na'el Abu-halaweh, Robert Harrison. Practical fuzzy decision trees. CIDM 2009a: 211-216.
  • Harrison RW and Harrison WL. Quantitative Analysis of Error Injection Covert Channels. Quantitative Approaches to Security Assurance (QASA’13)
  • Brannock E., Weeks, M., and Harrison R. “The Effect of Wavelet Families on Watermarking” Journal of Computers, 2009 6 554-566.
  • Na'el Abu-halaweh, Robert Harrison. Rule Set Reduction in Fuzzy Decision Trees. North American Fuzzy Information Processing Society Meeting (NAFIPS) 2009b.

Presentations

  • Xue Bai, Ram Gopal, Manuel Nunez and Dmitry Zhdanov. “Design of Security Constrained Workflows”, INFORMS Annual Meeting, Washington, DC, October 2008

Dissertations and Theses

  • Balaji, Janani, "Distributed Graph Storage And Querying System." Dissertation, Georgia State University, 2016.
    http://scholarworks.gsu.edu/cs_diss/110
  • Cheng, Liang, "IEEE 802.15.4 MAC Protocol Study and Improvement." Dissertation, Georgia State University, 2007.
    http://scholarworks.gsu.edu/cs_diss/25
  • Valero, Marco, "DI-SEC: Distributed Security Framework for Heterogeneous Wireless Sensor Networks." Dissertation, Georgia State University, 2012.
    http://scholarworks.gsu.edu/cs_diss/66
  • Hema Nair, Ph.D. candidate, “Security and Automated Load Balancing for DHT Distributed Computing,” (in progress)
  • Chaoyang Li, Ph. D. candidate, “Full-View Coverage for Camera Sensor Networks,” (in progress)
  • Dongqing Yaun, M.S. Thesis, “Non - Bypassing Misbehaving Nodes in Ad Hoc Wireless Networks by Using a Time Domain approach,” (July 16, 2003).
  • Bo Yu, M.S. Thesis, “Power Aware Adaptive Routing in Ad - Hoc Wireless Networks,” (November 24, 2003).
  • Venkata Tamminiedi, M.S. Thesis, “Space-Domain Fault - Resilient Routing in Ad - Hoc Wireless Networks,” (November 25, 2003).
  • Holloway, Russell, "Covert DCF - A DCF-Based Covert Timing Channel In 802.11 Networks." Thesis, Georgia State University, 2010.
    http://scholarworks.gsu.edu/cs_theses/70
  • Alam, Md Monjur, "FPGA Based Binary Heap Implementation: With an Application to Web Based Anomaly Prioritization." Thesis, Georgia State University, 2015.
    http://scholarworks.gsu.edu/cs_theses/80

Architectures

This area includes network models, OS/DBMS/network architectures, OS/DBMS/network subjects and objects (active entities and data containers), cloud, grid, distributed computing, custom/specialized architectures (e.g., ad-hoc networks, SCADA), interconnectivity and routing, privilege and separation issues, components vs. solutions vs. systems and critical infrastructure security.

Key Faculty

  • Ashwin Ashok
  • Richard Baskerville
  • Anu Bourgeois
  • Zhipeng Cai
  • Robert Harrison
  • Wei Li
  • Yi Pan
  • Rajshekhar Sunderraman

Grants

  • Microsoft Azure for Reseach: IoT (sole PI funded: $5000) Jan 2017– Jan 2018 AzzurInSight: Augmented Vision for the Visually Impaired through Cognitive Cloud Computing

Patents

  • Richard Baskerville, Michelle Bellard, David Bloomquist, Martin Grace, Robert Sainsbury, Detmar Straub, Carl Stucke, Vijay Vaishnavi, Tony Vance, Art  Vandenburg, Guangzhi Zheng, Daneile Bertolotti, Saravanaraj Duraisamy (Co-Inventors) Trusted Query Network Systems and Methods, United States Patent  8,775,402, July 8, 2014, European Patent Application 10800603.2, Australian Patent Application No. 2010273279.
  • Richard Baskerville, Art Vandenberg, Daniele Bertolotti, and Saravanaraj Duraisamy.  U.S. Utility Patent Application Trusted Query Systems and Methods Serial No. 13/384,065 (March 30, 2012)

Refereed Journal Articles

  • Chunqiang Hu, Wei Li, Xiuzhen Cheng, and Jiguo Yu, “A Secure and Verifiable Secret Sharing Scheme for Big Data Storage”, to appear IEEE Transactions on Big Data.
  • Wei Li, Xiuzhen Cheng, Rongfang Bie, and Feng Zhao, “An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets”, IEEE Transactions on Cognitive Communications and Networking, Vol. 2, No. 4, pp. 427-441, Oct. 2016.
  • Wei Li, Maya Larson, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, and Rongfang Bie, “Secure Multi-Unit Sealed First-Price Auction Mechanisms”, Security and Communication Networks, SI on cyber security, crime, and forensics of wireless networks and applications, Vol. 9, No. 16, pp. 3833-3843, Jul. 2016.
  • Wei Li, Xiuzhen Cheng, Rongfang Bie, and Feng Zhao, “An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets”, IEEE Transactions on Cognitive Communications and Networking, Vol. 2, No. 4, pp. 427-441, Oct. 2016.
  • Y. Dai, Y. Xiang, and Y. Pan, "Bionic Autonomic Nervous Systems for Self-Defense against DoS, Spyware, Malware, Virus and Fishing," Special Issue on Adaptive Security Systems for ACM Transactions on Autonomous and Adaptive Systems, Vol. 9, No. 1, March 2014.
  • Naixue Xiong, Fan Yang, Hongyan Li, Jong Hyuk Park, Yuan-Shun Dai, Yi Pan, "Security Analysis and Improvements of IEEE Standard 802.16 in Next Generation Wireless Metropolitan Access Network," Wireless Communications and Mobile Computing, Vol. 11, No. 2, pp. 163-175, 2011.
  • Yang Xiao, Chaitanya Bandela, Xiaojiang Du, Yi Pan, and Edilbert Kamal Dass, Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs," International Journal of Wireless and Mobile Computing, Vol. 1, No. 3/4, pp. 276-288, 2006.
  • Badrinath Jayakumar and Rajshekhar Sunderraman, Quasi-Classical reasoning in Paraconsistent Databases, Annals of Mathematics and Artificial Intelligence, doi:10.1007/s10472-017-9536-z, 2017.
  • Sanghoon Lee, Mohamed Masoud, Janani Balaji, Saeid Belkasim, Rajshekhar Sunderraman, and Seung-Jin Moon, A Survey of Tag-Based Information Retrieval, International Journal of Multimedia Information Retrieval, doi:10.1007/s13735-016-0115-6, 2016
  • Tushar M. Dave, YanqingZhang, Scott Owen and Rajshekhar Sunderraman, “Intelligent Web Agents for 3-D Virtual Community”, International Journal for Infonomics, Issue 1, Pages 38-49, January 2005

Books and Book Chapters

  • Baskerville, R. (1990) “Desktop systems: more power, less safety,” Desktop Information Technology: Organizational Worklife in the 1990's, K. Kaiser and H. Oppelland, eds., North-Holland, Amsterdam, 311-329
  • Brendan Benshoof, Andrew Rosen, Anu G. Bourgeois, Robert W. Harrison, “Distributed Decentralized Domain Name Service”, Proc. of Dependable, Parallel, Distributed and Network-Centric Systems Workshop, in conjunction with the 30thIEEE/ACM International Parallel and Distributed Processing Symposium, 1279-1287, April 2016.
  • A. Estrella-Balderrama, J.A. Fernández-Zepeda, A. G. Bourgeois, “Fault-Tolerance and Scalability of the Reconfigurable Mesh,” Proc. Advances in Parallel and Distributed Computing Models Workshop, in conjunction withthe18thIEEE/ACM International Parallel and Distributed Processing Symposium,(Santa Fe, New Mexico, April 26-30, 2004).
  • A. G. Bourgeois and J. A. Fernández-Zepeda, “Scalable Algorithms for Faulty R-Meshes,” Proc. 14thIASTED International Conference on Parallel and Distributed Computing and Systems, (Cambridge, Massachusetts, November 4-6, 2002), pp. 542-547.
  • A. G. Bourgeois and J. L. Trahan, “Fault Tolerant Algorithms for a Linear Array with a Reconfigurable Pipelined Optical Bus System,” Proc. Workshop on Optics and Computer Science, in conjunction withthe14thIEEE/ACM International Parallel and Distributed Processing Symposium,(Cancun, Mexico, May 1-5, 2000), pp. 1044-1052
  • Zhen Jiang and Yi Pan, eds., From Problem to Solution: Wireless Sensor Networks Security, Nova Science Publishers, 2009.
  • Yang Xiao and Yi Pan, eds., Security in Distributed and Networking Systems, Book Series on Computer and Network Security, World Scienti c Publishing Co., 2007.
  • Rajshekhar Sunderraman, Oracle10gProgramming: A Primer, Addison-Wesley, 2008 (534 Pages).

Conference Proceedings

  • Adaptive Cloud Offloading for Vehicular Applications Ashwin Ashok, Peter Steenkiste, Fan Bai IEEE Vehicular Networking Conference (VNC), 2016
  • High–Rate Flicker-Free Screen-Camera Communication with Spatially Adaptive Embedding Viet Nguyen, Yaqin Tang, Ashwin Ashok, Marco Gruteser, Kristin Dana, Wenjun Hu, Eric Wengrowski, Narayan Mandayam Accepted to IEEE Conference on Computer Communications (INFOCOM), 2016
  • Do Not Share! Invisible Light Beacons for Signaling Preferences to Privacy-Respecting Cameras Ashwin Ashok, Viet Nguyen, Marco Gruteser, Narayan Mandayam, Wenjia Yuan, Kristin Dana ACM Visible Light Communication Systems (VLCS) Workshop, MobiCom, 2014
  • Dynamic and Invisible Messaging for Visual MIMO Wenjia Yuan, Kristin Dana, Ashwin Ashok, Marco Gruteser, Narayan Mandayam IEEE Workshop on Applications In Computer Vision (WACV), 2012
  • Benshoof, B., Rosen, A. Bourgeois, A.G. and Harrison, R.W. A Distributed Greedy Heuristic for Computing Voronoi Tessellations With Applications Towards Peer-to-Peer Networks Parallel and Distributed Processing Symposium Workshop (IPDPSW), 2015 IEEE International p1089-1096
  • B. Benshoof, A. Rosen, A. G. Bourgeois and R. W. Harrison, "Distributed Decentralized Domain Name Service," 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Chicago, IL, USA, 2016, pp. 1279-1287.
  • Zhipeng Cai*, Zaobo He, Xin Guan and Yingshu Li. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks. IEEE Transactions on Dependable and Secure Computing. In Press.
  • Zaobo He, Zhipeng Cai*, Jiguo Yu, Xiaoming Wang, Yunchuan Sun and Yingshu Li. Cost-ecient Strategies for Restraining Rumor Spreading in Mobile Social Networks. IEEE Transactions on Vehicular Technology. In Press.
  • Zaobo He, Zhipeng Cai*, Yunchuan Sun, Yingshu Li and Xiuzhen Cheng. Customized Privacy Preserving for Inherent-data and Latent-data. Personal and Ubiquitous Computing. In Press.
  • Xu Zheng, Zhipeng Cai*, Jianzhong Li and Hong Gao. Location-Privacy-Aware Review Publication Mechanism for Local Business Service Systems The 36th Annual IEEE International Conference on Computer Communications (INFOCOM 2017). May 1-4, 2017, Atlanta, GA, USA.
  • Durham, Erin-Elizabeth A.; Rosen, Andrew; Harrison, Robert W., "A model architecture for Big Data applications using relational databases," Big Data (Big Data), 2014 IEEE International Conference on, vol., no., pp.9,16, 27-30 Oct. 2014
  • Durham, Erin-Elizabeth A.; Yu, Xiaxia; Harrison, Robert W., "FDT 2.0: Improving scalability of the fuzzy decision tree induction tool - integrating database storage," Computational Intelligence in Healthcare and e-health (CICARE), 2014 IEEE Symposium on, vol., no., pp.187,190, 9-12 Dec. 2014
  • Durham, Erin-Elizabeth A.; Rosen, Andrew; Harrison, Robert W., "Optimization of relational database usage involving Big Data a model architecture for Big Data applications," Computational Intelligence and Data Mining (CIDM), 2014 IEEE Symposium on, vol., no., pp.454,462, 9-12 Dec. 2014
  • Zhuojun Duan, Wei Li, and Zhipeng Cai, “Distributed Auctions for Task Assignment and Scheduling in Mobile Crowdsensing Systems”, accepted by IEEE ICDCS, Atlanta, USA, Jun. 2017.
  • Chunqiang Hu, Ruinian Li, Wei Li, Jiguo Yu, and Xiuzhen Cheng, “Efficient Privacy-Preserving Dot-Product Computation in Mobile Computing”, ACMWorkshop on Privacy-Aware Mobile Computing (PAMCO), Paderborn, Germany, Jul. 2016, pp. 51-59. (Best Paper Award)
  • Maya Larson, Wei Li, Chunqiang Hu, Ruinian Li, Xiuzhen Cheng, and Rongfang Bie, “A Secure Multi-Unit Sealed First-Price Auction Mechanism”, 10th Int. Conference WASA, Qufu, China, Aug. 2015, pp. 295-304.
  • Maya Larson, Ruinian Li, Chunqiang Hu, Wei Li, Xiuzhen Cheng, and Rongfang Bie, “A Bidder-Oriented Privacy-Preserving VCG Auction Scheme”, 10th Int. Conference WASA, Qufu, China, Aug. 2015, pp. 284-294.
  • Maya Larson, Chunqiang Hu, Ruinian Li, Wei Li, and Xiuzhen Cheng, “Secure Auctions without an Auctioneer via Verifiable Secret Sharing”, ACM Workshop on Privacy-Aware Mobile Computing, Hangzhou, China, Jun. 2015, pp. 1-6.
  • Wei Li, Xiuzhen Cheng, Rongfang Bie, and Feng Zhao, “An Extensible and Flexible Truthful Auction Framework for Heterogeneous Spectrum Markets”, ACM MobiHoc, Philadelphia, USA, Aug. 2014, pp. 175-184.
  • Wei Li, ShenglingWang, and Xiuzhen Cheng, “Truthful Multi-Attribute Auction with Discriminatory Pricing in Cognitive Radio Networks”, ACM MobiCom Workshop CRAB, Miami, USA, Oct. 2013, pp. 21-30. (Best Paper Award)
  • Y. Xiao, C. Bendela, and Y. Pan, "Vulnerabilities and Security Enhancements for the IEEE 802.11 WLANs," Globecom 2005 - Computer & Network Security Symposium, St. Louis, MO, Nov. 28 - Dec. 2, 2005.
  • Janani Balajiand, Rajshekhar Sunderraman (2016). Distributed Graph Path Queries using Spark, Proceedings of the 3rdIEEE International Workshop on Big Data Management for the Internet of Things (BIOT), Atlanta, Georgia 2016.
  • Janani Balajiand, Rajshekhar Sunderraman. (2016). Graph Topology Abstraction for Distributed Path Queries. InProceedings of the ACM Workshop on High Performance Graph Processing(HPGP '16). ACM, New York, NY, USA, 27-34. DOI=http://dx.doi.org/10.1145/2915516.2915520
  • Jayakumar, B., Sunderraman, R. (2015). Construction of P-Minimal Models Using Paraconsistent Relational Model. Multi-disciplinary Trends in Artificial Intelligence -9th InternationalWorkshop, MIWAI 2015, Fuzhou, China, November 13-15, 2015, Proceedings. (pp. 16–28).
  • Jayakumar, B., Sunderraman, R. (2015). Description Logic Programs: A Paraconsistent Relational Model Approach. Advances in Artificial Intelligence and Soft Computing -14th MexicanInternational Conference on Artificial Intelligence, MICAI 2015, Cuernavaca, Morelos, Mexico, October 25-31, 2015, Proceedings, PartI. (pp. 139–157).
  • Jayakumar, B., Sunderraman, R. (2015). Handling Inconsistent Closed Predicates: A Paraconsistent Approach. Proceedings of the 2015 International Workshop on Knowledge Management of Web Social Media (KMWSM '15).
  • Balaji, J., Sunderraman, R. (2015). Scalable storage structure for pattern matching on big graph data. 2015 IEEE International Conference on Big Data, Big Data 2015, SantaClara, CA, USA, October 29 -November 1, 2015. (pp. 1848–1855). http://dx.doi.org/10.1109/BigData.2015.7363958
  • Janani Krishnamani, Yanjun Zhao, and Rajshekhar Sunderraman, Forum Summarization using Topic Models and Content/Metadata Sensitive Clustering, IEEE/ACM/WI International Workshop on Natural Language Processing and Ontology Engineering (NLPOE 2013),2013, pp. 195-198.
  • Praveen Madiraju and Rajshekhar Sunderraman, “A Mobile Agent Approach for Global Database Constraint Checking”, Proceedings of the 19thAnnual ACM Symposium on Applied Computing, March 14-17 2004, Nicosia, Cyprus.

Presentations

  • Baskerville, R. (1987) “Information Security Models,” International Federation for Information Processing (IFIP) Working Group 11.2 Workshop on Security in Office Automation, London, England, March, 1987

Dissertations and Theses

  • Tan, Song, "On Cyber-Physical Security of Smart Grid: Data Integrity Attacks and Experiment Platform." Dissertation, Georgia State University, 2016.
    http://scholarworks.gsu.edu/cs_diss/103
  • Manandhar, Kebina, "Enhanching Security in the Future Cyber Physical Systems." Dissertation, Georgia State University, 2015.
    http://scholarworks.gsu.edu/cs_diss/96
  • Rosen, Andrew, "Towards a Framework for DHT Distributed Computing." Dissertation, Georgia State University, 2016.
    http://scholarworks.gsu.edu/cs_diss/107
  • Hu, Qian, "Towards a Virtualized Next Generation Internet." Dissertation, Georgia State University, 2015.
    http://scholarworks.gsu.edu/cs_diss/95
  • Fang, Ming, "Maintaining Integrity Constraints in Semantic Web." Dissertation, Georgia State University, 2013.
    http://scholarworks.gsu.edu/cs_diss/73
  • Viswanath, Navin, "Inconsistency and Incompleteness in Relational Databases and Logic Programs." Dissertation, Georgia State University, 2009.
    http://scholarworks.gsu.edu/cs_diss/38
  • Khabya, Komal, "A Novel Stable Model Computation Approach for General Dedcutive Databases." Thesis, Georgia State University, 2010.
    http://scholarworks.gsu.edu/cs_theses/68
  • "A Face Recognition Application to Enhance Mobile Security on Android Smartphones," Zhangqi Gong, completed Spring 2015.
  • "Mobile Security System," Zhongli Ding, co-advisor with YanqingZhang, completed in Fall 2014.
  • Improving WEP Security in 802.11 Wireless Networks," Chaitanya Bandela, completed in November 2002.

Assurance

This section includes software, hardware, testing (functional, penetration, black box, white box, measurement, etc.), modeling and formal methods (must focus on feasibility, applicability, strengths/weaknesses).

Key Faculty

  • Richard Baskerville

Refereed Journal Articles

  • Baskerville, R., Spagnoletti, P., & Kim, J. (2014). Incident-Centered Information Security: Managing a Strategic Balance between Prevention and Response. Information & Management, 51(1), 138-151.

Dissertations and Theses

Operations

This domain includes configuration, security automation, and intrusion detection/analysis/remediation.

Key Faculty

  • Richard Baskerville
  • Anu Bourgeois
  • Xiaojun Cao
  • Yi Pan

Grants

  • National Science Foundation (NSF), "Capacity Building: Collaborative Research: Integrated Learning Environment for Cyber Security of Smart Grid," NSF Award Number DUE-1303359, PI at GSU, $518,269 (GSU's portion $153,028.00), Sept. 15, 2013 - Aug. 31, 2017

Refereed Journal Articles

  • J. A. Fernández-Zepeda, A. Estrella-Balderrama, and A. G. Bourgeois, “Designing Fault Tolerant Algorithms for Reconfigurable Meshes,” International Journal of Foundations of Computer Science, vol. 16, no. 1, (2005), pp. 71-89.
  • A. G. Bourgeois and J. L. Trahan, “Fault Tolerant Algorithms for a Linear Array with a Reconfigurable Pipelined Optical Bus System,” Parallel Algorithms and Applications, vol. 18, no. 3, (2003), pp. 139-153.
  • K. Manandhar, X. Cao, F. Hu and Y. Liu, “Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter,” IEEE Transactions on Control of Network Systems, Vol. 1, No. 4, pp. 370 –379, Dec. 2014
  • S. J. Horng, P. Fang, Y. P. Chou, Y. C. Chang and Y. Pan, "A Feasible Intrusion Detector for Recognizing IIS attacks based on Neural Networks," Computers & Security, Vol. 27, No. 3-4, pp. 84-100, 2008.
  • A. G. Bourgeois, Y. Pan, and S. K. Prasad, “Constant Time Fault Tolerant Algorithms for a Linear Array with a Reconfigurable Pipelined Bus System,” Journal of Parallel and Distributed Computing, vol. 65, no. 3, (2005), pp. 374-381.

Books and Book Chapters

  • Baskerville, R., and Pries-Heje, J. (1998) “Packaging Information Security Safeguards,” Global IT Security, G. Papp and R. Posch, eds., Austrian Computer Society, Vienna, 549-553.
  • K. Manandhar, X. Cao and F. Hu,  “A Framework for Detecting Attacks on Sensors of Water System,” in “Intelligent Sensor Networks: Across Sensing, Signal Processing, and Machine Learning,” F. Hu and Q. Hao Eds, CRC Press, 2012, ISBN: 978-1-4398-9281-7
  • Xukai Zou, Yuan-Shun Dai and Yi Pan, Trust and Security in Collaborative Computing, World Scienti c Publishing Co., Hackensack, NJ, U.S.A., 2008.

Conference Proceedings

  • K. Manandhar and X. Cao, “Optimizing Load Schedule for Building Energy Management in Smart Grids,” in Proc. ofInternational Conference on Computer Communications and Networks (ICCCN), Aug. 2015
  • K. Manandhar and X. Cao, “Attacks/Faults Detection and Isolation in the Smart Grid using Kalman Filter,” in Proc. of International  Conference  on  Computer  Communications  and Networks(ICCCN), Aug. 2014
  • K. Manandhar, B.  Adcock  and X.  Cao, “Preserving the Anonymity  in MobilityFirst Networks,” in  Proc.  of International  Conference  on  Computer  Communications  and Networks (ICCCN), Aug. 2014
  • K. Manandhar, X. Cao, F.  Hu and  Y.  Liu,“Combating  False  Data  Injection  Attacks  in Smart  Grid  Using  Kalman  Filter,” in  Proc.  of  International  Conference  on  Computing, Networking and Communications(ICNC), Honolulu, Hawaii, Feb. 2014
  • K.  Manandhar, X.  Cao,  and  F.  Hu,“Attack Detection in Water Supply Systems using Kalman Filter Estimator,” in Proc. of IEEE Sarnoff Symposium, Princeton, NJ, May 2012

Presentations

  • Baskerville, R. (2001). Managing Security for Internet Speed Software. Oulu, Finland: Oulu University.
  • Baskerville, R. (1986) “Security Problems in Office Automation Design,” Fourth Annual Conference of the Office Automation Society International, Chicago, Illinois, September, 1986.
  • Baskerville, R. (1981) “The Navy-Europe Management Information Display System”, Staff Briefing, Chief of Naval Operations, Washington, D.C., January 1981

Dissertations and Theses

Analysis

This area includes cryptanalysis, malware analysis, forensics, data mining, process, audit and certification and accreditation.

Key Faculty

  • Richard Baskerville
  • Curtis Carver
  • Awad Mussa
  • Yi Pan
  • William Robinson
  • Rajshekhar Sunderraman

Grants

  • National Science Foundation (NSF), "Collaborative Research: Real World Relevant Security Labware for Mobile Threat Analysis and Protection Experience," NSF Award Number DUE-1244665, PI at GSU, $200,000.00 (GSU's portion $60,000.00), Sept. 15, 2013 - 31, 2017

Refereed Journal Articles

  • Im, G., & Baskerville, R. (2005). A Longitudinal Study Of Information System Threat Categories: The Enduring Problem Of Human Error. The Database for Advances in Information Systems, 36 (4), pp. 68-79.
  • Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. “CVSS Base Score:An Empirical Quantitative Evaluation”, Computers and Security Journal, 2017, Under review.
  • Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. “Assessing vulnerability exploitability risk using software properties”, SoftwareQuality Journal: 1-44, Mar 2015.

Books and Book Chapters

  • Jarke, M., Loucopoulos, P., Lyytinen, K., Mylopoulos, J., and Robinson, W. "The Brave New World of Design Requirements: Four Key Principles," in: Advanced Information Systems Engineering, B. Pernici (ed.), Springer Berlin Heidelberg, 2010, pp. 470-482.

Conference Proceedings

  • Kim, J., Baskerville, R., & Ding, Y. (2015). The ethics of online social network forensics. In V. Sugumaran, V. Yoon & M. J. Shaw (Eds.), 14th Workshop on E-Business, WeB2015 (Lecture Notes on Computer Science). Springer.
  • Baskerville, R., Ding, Y., & Kim, J. W. (2009). The Ethics of Online Social Network Forensics. Paper presented at the IFIP 8.2 Organizations and Society in Information Systems (OASIS) 2009 Workshop, Phoenix, Ariz 15 December
  • Curtis A. Carver Jr., John M.D. Hill, and Udo W. Pooch, "Limiting Uncertainty in Intrusion Response" IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY. June 6-7, 2001. 142-147
  • Daniel F. Ragsdale, Curtis A. Carver Jr., Jeffrey W. Humphries, and Udo W. Pooch. "Adaptation Techniques for Intrusion Detection and Intrusion Response Systems" IEEE International Conference on Systems, Man, and Cybernetics. Nashville, TN. October 8-11, 2000. 2344-2349.
  • Jeffrey W. Humphries, Curtis A. Carver Jr., and Udo W. Pooch. "Secure Mobile Agents for Network Vulnerability Scanning" IEEE Systems, Man, andCybernetics Information Assurance and Security Workshop. West Point, NY. June 6-7, 2000.
  • Curtis A. Carver Jr. and Udo W. Pooch. "An Intrusion Response Taxonomy and its Role in Automatic Intrusion Response" IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop. West Point, NY. June 6-7, 2000.
  • Curtis A. Carver Jr., John M.D. Hill, John R. Surdu, and Udo W. Pooch. "A Methodology for Using Intelligent Agents to provide Automated Intrusion Response" IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop. West Point, NY. June 6-7, 2000
  • Awad A Younis, Minwoo Lee, Yashwant K. Malaiya, and Indrajit Ray. “Measuring and Analyzing Time-To-Vulnerability Disclosure”. The 7TH ACM Conference on Data and Application Security and Privacy (CODASPY), 2017, under review.
  • Awad A Younis, Yashwant K. Malaiya, and Indrajit Ray. “Evaluating CVSS Base Score Using Vulnerability Rewards Programs”. In the proceedings of the 31st International Conference on Systems Security and Privacy Protection(IFIP SEC),2016, pp. 62-75.
  • Awad A Younis, Yashwant K. Malaiya, Charles Anderson, and Indrajit Ray. “To Fear or Not to Fear That is the Question: Code Characteristics of a VulnerableFunction with an Existing Exploit”.  The 6TH ACM Conference on Data and Application Security and Privacy (CODASPY), 2016, pp. 97-104.
  • Awad A. Younis and Yashwant K. Malaiya. “Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System”. The 2015 IEEE International Conference on Software Quality, Reliability and Security, 2015, pp. 252-261.
  • Awad A. Younis and Yashwant K. Malaiya. “Using Software Structure to Predict Vulnerability Exploitation Potential”. The 8th IEEE International Conference on Software Security and Reliability, 2014, pp. 13-18.
  • Awad A. Younis, Yashwant K. Malaiya, and Indrajit Ray. “Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software VulnerabilityExploitability", IEEE High AssuranceSystems EngineeringSymposium (HASE'14), 2014, pp.1-8.
  • Awad A. Younis and Yashwant K. Malaiya. “Relationship between Attack Surface and Vulnerability Density: A Case Study on Apache HTTP Server", The 2012 InternationalConferenceonInternet Computing (ICOMP'12), 2012, pp. 197-203.
  • A. A. Younis, H. Joh, and Y. K. Malaiya."Modeling Learningless Vulnerability Discovery using a Folded Distribution", The 2011 International Conference on Security and Management (SAM'11), 2011, pp. 617-623
  • Robinson, W.N., Syed, A.R., Akhlaghi, A., and Deng, T. "Pattern Discovery of User Interface Sequencing by Rehabilitation Clients with Cognitive Impairments," Hawaii International Conference on Software Systems, IEEE, HI, USA, 2012.
  • Robinson, W.N., Akhlaghi, A., Deng, T., and Syed, A. "Automated Differential Diagnosis of Behavioral Transitions in Stream Mining with Decision Trees," Hawaii International Conference on Software Systems, IEEE, HI, USA, 2011a.
  • Bismita Srichandanand Rajshekhar Sunderraman(2011). OO-FSG: An Object-Oriented Approach to Mine Frequent Subgraphs. In Proc. Australasian Data Mining Conference (AusDM 11), Ballarat, Australia. CRPIT, 121. Vamplew, P., Stranieri, A., Ong, K.-L., Christen, P. and Kennedy, P. J. Eds., ACS. 221-228

Presentations

  • Baskerville, R. (2012, Jan 13) “Graduate Forensic Curricula”, Research Lecture, Workshop: Putting the Science into Forensics Science, Georgia Tech Research Institute
  • Baskerville, R. (1991) “Malicious Code”, Plenary Lecture, Governor's School for The Sciences, University of Tennessee, Knoxville, Tennessee, July 1991

Dissertations and Theses

Non-Technical CD Issues

This field includes legal issues, policy issues, privacy, business case/economics awareness and supply chain.

Key Faculty

  • Richard Baskerville
  • Curtis Carver
  • Christopher C. Henrich
  • John G. Horgan
  • Yi Pan
  • Murthy V. Rallapalli
  • Balasubramaniam Ramesh
  • William Robinson
  • Volkan Topalli
  • Richard Wright
  • Ling Xue
  • Dmitry Zhdanov

Grants

  • 2012 HCC: Small: Collaborative Research: Cognitive Approaches to Distributed Software Requirements Engineering, National Science Foundation, IIS 1217552, 2012 – 2015, $326,606
  • 2007 SoD-TEAM: Monitoring in Support of Design Science Principles, National Science Foundation, CCF 0613698, 2006 – 2010, $39,998
  • 2006 SoD-TEAM: Monitoring in Support of Design Science Principles, National Science Foundation, CCF 0613698, 2006 – 2010, $246,498

Patents

  • “System and method for enterprise privacy information compliance”(Filed as Docket END920080200US1 in US, Co-inventors: Currier, M. J. Joshi, S.  Schenkewitz, L.  Tu, D.

Refereed Journal Articles

  • Rowe, F., Wolff, F.-C., & Baskerville, R. (2017). Integration of Information Systems and Cybersecurity Countermeasures: An Exposure to Risk Perspective. The DATA BASE for Advances in Information Systems, (forthcoming).
  • Kim, Jonathan, Park, Eunhee, & Baskerville, Richard. (2016). A Model of Emotion and Computer Abuse. Information & Management, 53(1), 91-108.
  • Baskerville, R., Park, E., & Kim, J. (2014). An Emote Opportunity Model of Computer Abuse. Information Technology & People, 27(2), 155-181 (Winner of the 2015 Literati Club Highly Commended Award.)
  • Pries-Heje, J., Venable, J., & Baskerville, R. (2014). RMF4DSR: A Risk Management Framework for Design Science Research. Scandinavian Journal of Information Systems, 26(1), 57-82.
  • Raymond, B., & Baskerville, R. (2014). Generative Control Theory for Information Security. Journal of Information System Security 10(1) 41-77.
  • Mellis, W., Loebbecke, C., & Baskerville, R. (2013). Requirements Uncertainty in Contract Software Development Projects. Journal of Computer Information Systems, 53(3), pp. 97-108.
  • Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., & Baskerville, R. (2013). Future Directions for Behavioral Information Security Research.  Computers & Security, 32(1), 90-101.
  • Dulipovici, A., & Baskerville, R. (2007). Conflicts between privacy and property: The discourse in personal and organizational knowledge. Journal of Strategic Information Systems, 16 (2) 187-213.
  • Baskerville, R. (2006). Hacker Wars: E-Collaboration By Vandals and Warriors. International Journal of e-Collaboration, 2(1), 1-16 (Winner of the 2006 IJeC Best Article Award).
  • Pries-Heje, J., Baskerville, R., & Hansen, G. I. (2005). Strategy Models for Enabling Offshore Outsourcing: Russian Short-Cycle-Time Software Development. Journal of IT for Development, 11(1), 5-30.
  • Baskerville, R. (2005). Warfare: A Comparative Framework for Business Information Security. Journal of Information Systems Security, 1(1), 23-50.
  • Baskerville, R., & Portougal, V. (2003). A Possibility Theory Framework for Security Evaluation in National Infrastructure Protection. Journal of Database Management, 14(2), 1-13.
  • Baskerville, R., & Siponen, M. (2002). An Information Security Meta-policy for Emergent Organizations. Journal of Logistics Information Management, 15(5/6), 337-346. (Winner of the 2003 Literati Club Highly Commended Award.)
  • Baskerville, R., and Pries-Heje, J. (1998) “Information Technology Diffusion: Building Positive Barriers,” European Journal of Information Systems, 7, 17-28
  • Baskerville, R., and Stage, J. (1996) “Controlling Prototype Development through Risk Analysis,” MIS Quarterly, 20 (4), 481-504.
  • Baskerville, R. (1994) “Research Notes: Research directions in information systems security,” International Journal of Information Management, 14 (5), 385-387.
  • Baskerville, R. (1992) “The developmental duality of information systems security,” The Journal of Management Systems, 4 (1), 1-12.
  • Baskerville, R. (1991) “Risk analysis as a source of professional knowledge,” Computers & Security, 10 (8), 749-764.
  • Baskerville, R. (1991) “Risk analysis: an interpretive feasibility tool in justifying information systems security,” European Journal of Information Systems, 1 (2), 121-130.
  • Baskerville, R. (2005). Best Practices in IT Risk Management: Buying Safeguards, Designing Security Architecture, or Managing Information Risk? Cutter Benchmark Review, 5(12), 5-12.
  • Baskerville, R. (1993) “Information Systems Security:  Adapting To Survive,,” Information Systems Security, 2 (1), 40-47.
  • Lichen Zhang, Zhipeng Cai*, and Xiaoming Wang. FakeIt: Privately Releasing User Context Streams for Personalized Mobile Applications. IEEE Transactions on Network and Service Management. In Press
  • Yingjie Wang, Zhipeng Cai, Guisheng Ying and Yuxin Dong. An Incentive Mechanism with Privacy Protection in Mobile Crowdsourcing Systems. Computer Network. 102: 157-171 (2016).
  • Curtis A. Carver Jr. "Educating students on information assurance through immersion and operational leadership" Journal of Computers in Education. (April-June 2008).
  • Ronald C Dodge Jr., Curtis A. Carver Jr., and Aaron J Ferguson. “Phishing for User Security Awareness”. Computers and Security. 2006 (Vol: 26 No: 1-8). pp 73-80.
  • Joseph Hughes Schafer, Daniel Joseph Ragsdale, John R. Surdu, and Curtis Arthur Carver Jr. "The IWAR Range: A Laboratory for Undergraduate Information Assurance Education" The Journal of Computing in Colleges, 16, no. 4 (May 2001) 223-232
  • Curtis A. Carver Jr. "Information Warfare: Task Force XXI or Task Force Smith?" Military Review. Vol. LXXVIII (5) (September-October 1998).
  • Shahar, G., & Henrich, C. C. (2016). Perceived family social support buffers against the effects of exposure to rocket attacks on adolescent depression, aggression, and severe violence. Journal of Family Psychology, 30, 163-168.
  • Henrich, C. C., & Shahar, G. (2013). Effects of exposure to rocket attacks on adolescent distress and violence: a 4-year longitudinal study. Journal of the American Academy of Child & Adolescent Psychiatry, 52, 619-627.
  • Barile, J. J., Grogan, K. E., Henrich, C. C., Brookmeyer, K. A., Shahar, G. (2012) Symptoms of depression in Israeli adolescents following a suicide bombing: The role of gender. Journal of Early Adolescence, 32, 502-515.
  • Brookmeyer, K. A., Henrich, C. C., Cohen, G., & Shahar, G. (2011). Israeli adolescents exposed to community and terror violence: The protective role of social support. Journal of Early Adolescence, 31, 577-603.
  • Shahar, G., Cohen, G., Grogan, K., Barile, J., & Henrich, C.C. (2009). Terrorism-related perceived stress, adolescent depression, and social support from friends. Pediatrics, 124, e235-e240.
  • Varjas, K., Henrich, C. & Meyers, J. (2009). Urban middle school students’ perceptions of bullying, cyberbullying and school safety. Journal of School Violence, 8, 159-176.
  • Henrich, C. C., & Shahar, G. (2008). Social support buffers the effects of terrorism on adolescent depression: Findings from Sderot, Israel. Journal of the American Academy of Child and Adolescent Psychiatry, 47, 1073-1076.
  • Horgan, J. (2017). Psychology and Terrorism: Introduction to the Special Issue. American Psychologist.
  • Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (in press). Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns & Processes. Criminology and Public Policy16 (1).
  • Horgan, J.(2016). A Call to Arms: The Need for More Psychological Research on Terrorism. Social Psychological Review 18 (Spring): 25-28.
  • Manrique, P., Cao, Z., Gabriel, A., Horgan, J., Gill, P., Qi, H., Restrepo, E.M., Johnson, D., Wuchty, S., Song, C., and Johnson, N. (2016). Women’s Connectivity in Extreme Networks. Science Advances, June, 2 (6).
  • Gill, P., Horgan, J., Corner, E., & Silver, J. (2016). Indicators of Lone Actor Violent Events: The Problems of Low Base Rates and Long Observational Periods. Journal of Threat Assessment and Management (3-4), 165-173.
  • Johnson,N.F., Medina,P., Zhao, G., Messinger, D.S., Horgan, J., Gill, P., Camilo Bohorquez, J., Mattson, W., Gangi, D., Qi, H., Manrique, P., Velasquez, N., Morgenstern, A., Restrepo, E., Johnson, N., Spagat, M.,and Zarama, R.(2013) ‘Simple Mathematical Law Benchmarks Human Confrontations’, Nature: Scientific Reports 3: 3643, DOI: 10.1038/srep03463.
  • Gill, P., Horgan, J., Cushenbery, L., and Hunter, S.(2013). ‘Malevolent Creativity in Terrorist Organizations’.Journal of Creative Behavior 47(2) 125-151.
  • Kenney, M., Horgan, J., Horne, C., Vining, P., Carley, K.M., Bigrigg, M., Bloom, M., Braddock, K. (2013). ‘Organisational Adaptation in an Activist Network: Social Networks, Leadership, and Change in al-Muhajiroun.’Applied Ergonomics 44(5) 739-747.
  • Weiss, L., Briscoe, E., Whitaker, E., Trewhitt, E., Hayes, H, and Horgan, J.(2012). ‘A Systems-Level Understanding of Adversarial Behavior.’ International Journal of Intelligent Defense Support Systems 5(1)4-23.
  • Horne, C. and Horgan, J. (2012). ‘Research Note: Triangulation in the Study of Terrorist Networks’. Studies in Conflict and Terrorism 35(2) 182-192
  • Roberts, K. and Horgan, J. (2008). ‘Risk Assessment and the Terrorist’, Perspectives on Terrorism, 2(6), 3-9.
  • Taylor, M. and Horgan, J. (2006). ‘A Conceptual Framework for Addressing Psychological Process in the Development of the Terrorist.’ Terrorism and Political Violence, 18(4), 585-601.
  • Horgan, J., Hammond, S. and O’Sullivan, D. (2003). ‘Offender Profiling: A Critical Perspective.’ Irish Journal of Psychology, 24 (1-2), 1-21
  • E. Park, B. Ramesh and L. Cao, “Emotions in IT Investment Decision Making with Real Options Perspective: Intertwining of Cognition and Regret”, Journal of Management Information Systems, Vol. 33, No. 3, 2016. Pp. 652-683
  • J. Kim, K. Mohan and B. Ramesh, “Functional and Non-Functional Quality in Cloud-Based Collaborative Writing: An Empirical Investigation”, IEEE Transactions on Professional Communication, vol.57, no.3, pp.182-203, Sept. 2014.
  • L. Cao, K. Mohan, P. Xu and B. Ramesh, “A Framework for Adapting Agile Development Methodologies”, European Journal of Information Systems, Volume 18,Number 4, August 2009 , pp. 332-343.
  • Robinson, W.N., et al., Discovery and Diagnosis of Behavioral Transitions in Rehabilitation Patient Event-Streams. ACM Transactions on Management Information Systems (TMIS), 2012.
  • Jarke, M., Loucopoulos, P., Lyytinen, K., Mylopoulos, J., and Robinson, W., The brave new world of design requirements. Information Systems, 2011. 36(7): p. 992-1008 (most downloaded, 2011).
  • Robinson, W.N. and S. Purao, Monitoring service systems from a language-action perspective. Services Computing, IEEE Transactions on, 2011. 4(1): p. 17-30.
  • Robinson, W.N., A Roadmap for Comprehensive Requirements Monitoring. IEEE Computer, 2010. 43(5): p. 64-72.
  • Jarke, M., Loucopoulos, P., Lyytinen, K., Mylopoulos, J., and Robinson, W., Manifesto - High-impact requirements for software-intensive systems. Informatik Spektrum, 2009. 32(4): p. 352-353.
  • Robinson, W.N., Seeking Quality through User-Goal Monitoring. IEEE Software, 2009. 26(5): p. 58-65.
  • Robinson, W.N. and S. Purao, Specifying and Monitoring Interactions and Commitments in Open Business Processes. IEEE Software, 2009. 26(2): p. 72-79.
  • Robinson, W.N., Extended OCL for goal monitoring. Electronic Communications of the EASST, 2008. 9: p. 1-12.
  • Robinson, W.N., A requirements monitoring framework for enterprise systems. Requirements Engineering Journal, 2006. 11(1): p. 17-41.
  • Robinson, W.N., S. Pawlowski, and V. Volkov, Requirements Interaction Management. ACM Computing Surveys (CSUR), 2003. 35(2): p. 132 - 190.
  • Robinson, W., N. and S. Pawlowski, D., Managing requirements inconsistency with development goal monitors. IEEE Transactions on Software Engineering, 1999. 25(6): p. 816-835.
  • Topalli, V, Higgins, G, & Copes, JH. (2014). A causal model of neutralization acceptance and delinquency: Making the case for an individual difference model, Criminal Justice & Behavior, 41: 553-573.
  • Brezina, T & Topalli, V. (2012). Criminal self-efficacy: Exploring the correlates and consequences of a “successful criminal” identity. Criminal Justice & Behavior, 39: 1042-1062.
  • Topalli, V. (2005). Criminal expertise and offender decision-making: An experimental analysis of how offenders and non-offenders differentially perceive social stimuli. The British Journal of Criminology, 45: 269-295.
  • Brezina, T & Topalli, V. (2012). Criminal self-efficacy: Exploring the correlates and consequences of a “successful criminal” identity. Criminal Justice & Behavior, 39: 1042-1062
  • Topalli, V. (2005). Criminal expertise and offender decision-making: An experimental analysis of how offenders and non-offenders differentially perceive social stimuli. The British Journal of Criminology, 45: 269-295.
  • Xue, Ling; Zhang, Cheng; Ling, Hong; and Zhao, Xia. “Risk-Mitigation in Supply Chain Digitization: A Study of System Modularity and IT Governance,” Journal  of  Management  Information Systems30(1), 2013,325-352
  • Zhao,  Xia; Xue,  Ling;  and  Whinston,  Andrew  B.“Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling Arrangements,” Journal of Management Information Systems 30(1), 2013, 123-152
  • Zhao, Xia; and Xue, Ling. “A Framework of Using Captive Insurance to Streamline IT Control and Compliance Management,” Journal of Information Privacy and Security5(3),2009, 27-44
  • Ram Gopal, Hooman Hidaji, Raymond Patterson, Erik Rolland and Dmitry Zhdanov. “How Much to Share with Third-Parties?  Users’ Privacy Concerns and Website’s Dilemma.” MIS Quarterly, accepted August 10, 2016, forthcoming.
  • Alok Gupta and Dmitry Zhdanov. “Growth and Sustainability of Managed Security Service Provider Networks: an Economic Perspective.” MIS Quarterly, 2012, 36(4), pp. 1109-1130.
  • Ram Gopal, Raymond Patterson, Erik Rolland and Dmitry Zhdanov. “Social Network Meets Sherlock Holmes: Investigating the Missing Links of Fraud.” Computer Fraud and Security, 2012, 7, pp. 12-18.
  • Xin Luo and Dmitry Zhdanov. “Special Issue Introduction: A Comprehensive Perspective on Information Systems Security – Technical Advances and Behavioral Issues,” Decision Support Systems, 2016, vol. 92, pp.1-2.
  • Kai-Lung Hui, Anthony Vance and Dmitry Zhdanov. “Securing Digital Assets: Research Curation.” In MIS Quarterly Research Curations, Ashley Bush, ed., May 27, 2016.

Books and Book Chapters

  • Straub, D. W., Goodman, S., & Baskerville, R. (Eds.). (2008 ). Information Security Policy, Processes, and Practices. Armonk, New York: M.E. Sharpe.
  • Dulipovici, A., & Baskerville, R. (2009). Privacy, Property and Ethics -- Conflicts between privacy and property: The discourse in personal and organizational knowledge. In R. D. Galliers & D. E. Leidner (Eds.), Strategic Information Management: Challenges and Strategies in Managing Information Systems (4th ed., pp. 393-421). New York: Routledge.
  • Baskerville, R. (2008). Hacker wars: Cyber warfare previews. E-Collaboration in Modern Organizations: Initiating and Managing Distributed Projects. N. Kock. Hershey, Pennsylvania, Idea Group Publishing: 162-175.
  • Baskerville, R. (2008). Strategic Information Security Risk Management In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 112-122). Armonk, New York: M.E. Sharpe.
  • Baskerville, R., & Dhillon, G. (2008). Information Systems Security Strategy: A Process View. In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 15-45). Armonk, New York: M.E. Sharpe.
  • Straub, D. W., Goodman, S., & Baskerville, R. (2008). Framing the Information Security Process in Modern Society. In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 5-12). Armonk, New York: M.E. Sharpe.
  • Straub, D. W., Goodman, S., & Baskerville, R. (2008). Directions for Future Work in Information Security Policies and Practices. In D. W. Straub, S. Goodman & R. Baskerville (Eds.), Information Security Policy, Processes, and Practices (pp. 253-270). Armonk, New York: M.E. Sharpe.
  • Baskerville, R. (1996) “Structural Artifacts in Method Engineering:  The Security Imperative,” Method Engineering, S. Brinkkemper, K. Lyttinen, and R. Welke, eds., Chapman & Hall, London, 8-28.
  • Baskerville, R. (1996) “A Taxonomy for Analyzing Hazards to Information Systems,” Information Systems Security:  Facing The Information Society of The 21st Century, S. Katsikas and D. Gritzalis, eds., Chapman-Hall, London, 167-176.
  • Baskerville, R., and Pries-Heje, J. (1996) “Information Technology Diffusion:  Building Positive Barriers,” Proceedings of the 4th European Conference on Information Systems, J. Coelho, T. Jelassi, W. König, H. Krcmar, R. O'Callaghan, and M. Saaksjarvi, eds., AIS, Lisbon, 401-416
  • Baskerville, R. (1995) “The Second Order Security Dilemma,” Information Technology and Changes in Organizational Work, W. Orlikowski, G. Walsham, M. Jones, and J. DeGross, eds., Chapman & Hall, London, 239-249.
  • Siponen, M., Baskerville, R., & Kuivalainen, T. (2007). Extending Security In Agile Software Development Methods. In H. Mouratidis & P. Giorgini (Eds.), Integrating Security and Software Engineering: Advances and Future Vision (pp. 168-190). Hershey, Penn.: Idea Group.
  • Snow, A. P., Straub, D., Stucke, C., & Baskerville, R. (2006). The survivability principle: IT-enable dispersal of organizational capital. In M. Warkentin & R. B. Vaughn (Eds.), Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues (pp. 150-166). Hershey: Idea Group.
  • Baskerville, R. (1999) “Security and IT/S (Reprinted from Security and Information Systems),” The IEBM Handbook of IT in Business, M. Zeleny, ed., International Thompson Business Press, London
  • Baskerville, R. (1996) “Security and Information Systems,” International Encyclopedia of Business and Management, M. Warner and J. Kotter, eds., International Thompson Business Press, London, 4419-4424.
  • Baskerville, R. (1994) “New Approaches to Information Systems Security,” Handbook of IS Management 1994-95 Yearbook, R. Umbaugh, ed., Auerbach, New York, S257-S265.
  • Baskerville, R. (1989) “Security of Decision Support Systems,” Knowledge Based Management Support Systems, G. Doukidis, F. Land, and G. Miller, eds., Ellis Horwood, Chichester, 225-235.
  • Horgan, J. (2014). The Psychology of Terrorism –2nd Edition. New York: Routledge(Political Violence Series)
  • Gupta, D., Horgan, J., and Schmid,A. (2010). ‘A Marriage Made in Hell? Terrorism and Organized Crime’. In D.C. Canter (ed.). The Faces of Terrorism: Cross-Disciplinary Investigations(pp.123-136). London: Wiley-Blackwell.
  • Horgan, J. (2008). ‘Looking to the Future: Practical Alternatives to Predicting Tomorrow’s Terrorists’, in B. Bowden and M. T. Davis (Eds.) Terror: From Tyrannicide to Terrorism (pp.282-297). Brisbane: University of Queensland
  • Wright, R. and Decker, S. (1997), Armed Robbers in Action: Stickups and Street Culture, Boston: Northeastern University Press. [Reprinted 2002 and 2004.]
  • Wright, R. and Decker, S. (1994), Burglars on the Job: Streetlife and Residential Break-Ins, Boston: Northeastern University Press. [Reprinted 1998 and 2002.]
  • Bennett, T. and Wright, R. (1984), Burglars on Burglary: Prevention and the Offender, Aldershot: Gower. [Reprinted 1986 and 1992.]
  • Wright, R., Tekin, E., Topalli, V., McClellan, C., Dickinson, T. and Rosenfeld, R. (2014), Less Cash, Less Crime: Evidence from the Electronic Benefit Transfer Program, National Bureau of Economic Research Working Paper Series.
  • Wright, R. and Topalli, V. (2013), Choosing Street Crime. In Cullen, F. and Wilcox, P., Oxford Handbook of Criminological Theory, New York: Oxford University Press.
  • Jacobs, B. and Wright, R. (1999), Stick-up, Street Culture, and Offender Motivation, CRIMINOLOGY, Vol. 37, No. 1, 149-173.  Reprinted in Dabney, D. (2003) Crime Types: A Text Reader, Belmont, CA: Wadsworth; Pogrebin, M. (2004), About Criminals: A View of the Offender’s World, Newbury Park, CA: Sage and; Cromwell, P. (2006), In Their Own Words (Fourth Edition), Los Angeles: Roxbury Publishing Co.
  • Wright, R. and Decker, S. (1996), Choosing the Target.  In Cromwell, P., In Their Own Words, Los Angeles: Roxbury Publishing Co., 34-46.  Reprinted from Wright, R. and Decker, S. (1994), Burglars on the Job: Streetlife and Residential Break-Ins, Boston: Northeastern University Press.
  • Wright, R., Logie, R. and Decker, S. (1995), Criminal Expertise and Offender Decision-Making: An Experimental Study of the Target Selection Process in Residential Burglary, Journal of Research in Crime and Delinquency, Vol. 32, No. 1, 39-53.
  • Logie, R., Wright, R. and Decker, S. (1992), Recognition Memory Performance and Residential Burglary, Applied Cognitive Psychology, Vol. 6, May/June, 109-123. Reprinted in Hobbs, R. (1995), Professional Criminals, Aldershot: Dartmouth Publishing.
  • Wright, R. and Bennett, T. (1990), Exploring the Offender's Perspective:  Observing and Interviewing Criminals.  In Kempf, K., Measurement Issues in Criminology, New York: Springer-Verlag, 138-151.
  • Topalli, V. and Wright, R. (2013), Emotion and the Dynamic Foreground of Predatory Street Crime: Desperation, Anger, and Fear. In Van Gelder, J.L., Elffers, H., Nagin, D. and Reynald, D., Affect and Cognition in Criminal Decision-Making, New York: Routledge
  • Murray, AJ & Topalli, V (2014). Delinquency & Drift Theory, in M Miller (ed) The Encyclopedia of Theoretical Criminology. New York: Wiley-Blackwell.
  • Topalli, V (2012). Offender decision-making and motivation, in R Wright (ed) The Oxford Bibliographies in Criminology. Oxford University Press.
  • Murray, AJ & Topalli, V (2014). Delinquency & Drift Theory, in M Miller (ed) The Encyclopedia of Theoretical Criminology. New York: Wiley-Blackwell.
  • Topalli, V (2012). Offender decision-making and motivation, in R Wright (ed) The Oxford Bibliographies in Criminology. Oxford University Press.

Conference Proceedings

  • Anderson, C., Baskerville, R., & Kaul, M. (2017). A Framework for Evaluating the Tension between Sharing and Protecting Health Information. In 50th Hawaii International Conference on Systems Science (pp. 3638-3647). Hawaii: AIS. (Nominated for best paper)
  • Alashoore, T., Baskerville, R., & Zhu, R. (2016). Privacy and Identity Theft Recovery Planning: An Onion Skin Model. 49th Hawaii International Conference on Systems Science, IEEE, Kauai, Hawaii, pp. 3696-3705.
  • Alashoor, T., & Baskerville, R. (2015). The Privacy Paradox: The Role of Cognitive Absorption in the Social Networking Activity. Thirty Sixth International Conference on Information Systems, Ft. Worth.
  • Baskerville, R., Kim, J., Stucke, C., & Sainsbury, R. (2013). The Information Security Risk Estimation Engine: A Tool for Possibility Based Risk Assessment. Paper presented at the IFIP WG8.11/11.13 Dewald Roode Information Security Workshop.
  • Rowe, F., Baskerville, R., & Wolff, F. C. (2012). Functionality vs. Security in IS: Tradeoff or Equilibrium? 2012 International Conference on Information Systems (ICIS). Orlando, Fla.  AIS. Security Paper 11, pp. 1-20.
  • Kim, J., Park, E., & Baskerville, R. (2012). Vengeance is Mine: A Model of Emotional Appraisal and Computer Abuse. In J. D'Arcy & G. Moody (Eds.), Proceedings of the IFIP WG 8.11/11.13 2012 Dewald Roode Information Security Workshop (pp. Paper 6, 1-16). Provo, Utah: IFIP
  • Baskerville, R. (2011). Transferring Information Security Risk to an Opponent:  New Principles for Non-Financial Risk Transfer Treatments In A. Vance (Ed.), Proceedings of the IFIP WG 8.11/11.13 2011 Dewald Roode Information Security Workshop (pp. Paper 6, 1-16). Blacksburg, Virgina: IFIP
  • Katzke, S., Baskerville, R., Mosleh, A., and Bodeau, D. (1993) “The Risk Analysis Blindspot:  Threats in Security (Panel),” Proceedings of 16th National Computer Security Conference, Information Systems Security:  User Choices, Baltimore, September, 1993, 457
  • Pries-Heje, J., Baskerville, R., & Venable, J. (2011). A Risk Management Framework for Design Science Research. In Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS-44) (pp. 1-10). Koloa, Kauai, Hawaii: IEEE Computer Society.
  • Baskerville, R. (2009). Hacker Wars: E-Collaboration by Vandals and Warriors In N. Kock (Ed.), E-Collaboration: Concepts, Methodologies, Tools, and Applications (Vol. 3, pp. 1575-1587). Hershey: IGI.  (Reprint)
  • Siponen, M., Willison, R., & Baskerville, R. (2008). Power and Practice in Information Systems Security Research. In R. Boland, M. Limayem & B. Pentland (Eds.), Proceedings of the International Conference On Information Systems (ICIS) (pp. 26.21-26.13). Paris: Association for Information Systems.
  • Pries-Heje, J., Baskerville, R., & Venable, J. (2008). A Risk Management Framework for Design Science Research. In A. Asproth, K. Axelsson, S. Holmberg, C. Ihlström & B. Sundgren (Eds.), Proceedings of the 31st Information Systems Research Seminar in Scandinavia, Public systems in the future - possibilities, challenges and pitfalls (IRIS 31) (pp. 1-18). Mid Sweden University.
  • Baskerville, R., Pries-Heje, J., & Venable, J. (2008). Evaluation Risks in Design Science Research: A Framework In V. Vaishnavi & R. Baskerville (Eds.), Proceedings of the Third International Conference on Design Science Research in Information Systems and Technology (DESRIST 2008) (pp. 329-334). Atlanta: Georgia State University.
  • Sainsbury, R., & Baskerville, R. (2007). Possible Risks Analysis Engine: A Prototype Tool for Managing IT Security Safeguards Acquisition.  In L. Armistead (Ed.), Proceedings of ICIW 2007: International Conference on Information Warfare and Security. Reading: Academic Conferences International, pp. 13-22.
  • Baskerville, R., & Sainsbury, R. (2006). Analyzing Risk of Improbable Events: Managing Business Continuity and Information Warfare. In L. Armistead (Ed.), Proceedings of ICIW 2006: International Conference on Information Warfare and Security (pp. 13-22). Reading: Academic Conferences International.
  • Baskerville, R., & Sainsbury, R. (2006). Distrusting Online: Social Deviance in Virtual Teamwork. In R. H. Sprague (Ed.), Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS-39) (pp. 121, CD-ROM 121-129). Los Alamitos, Calif: IEEE Computer Society.
  • Baskerville, R., & Dulipovici, A. (2006). The ethics of knowledge transfers and conversions: property or privacy rights? In R. H. Sprague (Ed.), Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS-39) (p. 144, CD-ROM 1-9). Los Alamitos, Calif: IEEE Computer Society.
  • Baskerville, R., & Sainsbury, R. (2006). Analyzing Risk of Improbable Events: Managing Business Continuity and Information Warfare. In L. Armistead (Ed.), Proceedings of ICIW 2006: International Conference on Information Warfare and Security (pp. 13-22). Reading: Academic Conferences International.
  • Baskerville, R., & Sainsbury, R. (2005, 11-12 July). Securing Against the Possibility of an Improbable Event: Concepts for Managing Predictable Threats and Normal Compromises. Paper presented at the European Conference on Information Warfare and Security, Glamorgan University, UK, 29-38.
  • Siponen, M., Baskerville, R., & Kuivalainen, T. (2005). Integrating Security into Agile Development Methods. In R. H. Sprague (Ed.), Proceedings of the 38 th Annual Hawaii International Conference on System Sciences (pp. 1-7). Los Alamitos, California: IEEE Computer Society.
  • Baskerville, R., & Portougal, V. (2005). Possibility Theory in Protecting National Information Infrastructure. In K. Siau (Ed.), Advanced Topics in Database Research (Vol. 4, pp. 325-340). Hershey, Penn.: Idea Group.
  • Baskerville, R. (2004). Information Warfare Action Plans for e-Business. In A. Jones (Ed.), The 3rd European Conference on Information Warfare and Security (pp. 15-20). Royal Holloway, University of London, UK,: Academic Conferences International.
  • Baskerville, R. (2004). Agile security for information warfare: A call for research. In T. Leino & T. Saarinen & S. Klein (Eds.), Proceedings of the 12 th European Conference on Information Systems (pp. 1-10). Turku, Finland: Turku School of Economics and Business Administration.
  • Baskerville, R. (2003). Four complexions of information security risk analysis. In B. Hutchinson (Ed.), Second European Conference on Information Warfare and Security (pp. 19-29). Reading, UK: University of Reading.
  • Siponen, M., & Baskerville, R. (2001). A New Paradigm for Adding Security into Is Development Methods. In J. H. P. Eloff & L. Labuschagne & R. v. Solms & G. Dhillon (Eds.), Advances in Information Security Management & Small Systems Security (pp. 99-111). Boston: Kluwer.
  • Nanhakumar, J., & Baskerville, R. (2001). Trusting Online: Nurturing Trust in Virtual Teams. In S. Smithson & J. Gricar & M. Podlogar & S. Avgerinou (Eds.), Global Co-Operation in the New Millennium: Proceedings of the 9th European Conference on Information Systems (pp. 188-194). Bled: University of Maribor.
  • Baskerville, R. and D. Straub. (1999) “Internet Groupware Use in A Policy-Oriented Computer Security Course.” in L. Yngström and S. Fischer-Hübner, (eds.) WISE 1 Proceedings of the IFIP TC11 WG 11.8 First World Conference on Information Security Education, Kista, Sweden: Department of Computer and Systems Sciences, Stockholm University and Royal Institute of Technology, pp. 171-196
  • Baskerville, R. (1997) “New Forms for Information Security Organizations,” Information Security in Research and Business, L. Yngström and J. Carlsen, eds., Chapman and Hall, London, 296-307.
  • Baskerville, R. (1996) “Socially self-destructing systems,” Proceedings of the 19th Information Systems Research Seminar in Scandinavia, B. Dahlbom, F. Ljungberg, U. Nulden, K. Simon, C. Soerensen, and J. Stage, eds., Gothenburg Studies in Informatics, Gothenburg, Sweden, 187-904.
  • Curtis A. Carver Jr. "Educating students on information assurance through immersion and operational leadership" American Society of Educating Engineers 2007 Annual Conference. Honolulu, HI. June 24-27, 2007.
  • John M. D. Hill, John R. Surdu, Scott Lathrop, Greg Conti, Curtis A. Carver Jr., "MAADNET: Toward a Web-Distributed Tool for Teaching Networking and Information Assurance" Educational Multimedia, Hypermedia and Telecommunications (ED-MEDIA 2003), Honolulu, Hawaii. June 23-28, 2003.
  • John R. Surdu, John M. D. Hill, Ron Dodge, Scott Lathrop, and Curtis A. Carver Jr. "Military Academy Attack/Defense Network Simulation" Advanced Simulation Technology Conference: Symposium on Military, Government, and Aerospace Simulation (MGA 2003), Orlando, Florida. March 30 -April 3, 2003.
  • John M. D. Hill, John R. Surdu, Scott Lathrop, GregoryConti, and Curtis A. Carver Jr. "MAADNET NetBuilder: A Service/Demand Focused Network Simulator" Communication Networks and Distributed Systems Conference. Orlando, FL. January 19-24, 2003.
  • Curtis A. Carver Jr., John R. Surdu, John M.D. Hill, Daniel Ragsdale, Scott D. Lathrop, and Timothy Presby, "Military Academy Attack/Defense Network" IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop. West Point, NY. June 17-19, 2002
  • Joseph Hughes Schafer, Daniel J. Ragsdale, John R. Surdu, and Curtis Arthur Carver Jr. "The IWAR Range: A Laboratory for Undergraduate Information Assurance Education" Consortium for Computing in Small Colleges Sixth Annual Northeastern Conference. Middlebury, VT. 20-21 April 2001.
  • John Hill, Curtis A. Carver Jr., Jeff Humphries, and Udo W. Pooch. "Using an Isolated Network Laboratory to Teach Advanced Networks and Security" ACM Conference on Computer Science Education. Charlotte, NC. February 21-25, 2001. 36-41.
  • Jeffrey Humphries, Daniel Ragsdale, John M.D. Hill, Curtis A. Carver Jr., and Udo W. Pooch. "No Silver Bullet: Inherent Limitations of Computer Security Technologies" Fourth World Multiconference on Systemics, Cybernetics and Informatics (SCI'2000). Orlando, USA, July 23-26, 2000.
  • Zhongli Ding, Michael Weeks, Yanqing Zhang, and Yi Pan, "Integrating Security Education into a CS Curriculum - practices and experience," The 2016 ASEE Annual Conference, June 26-29, 2016, New Orleans, LA, USA (poster presentation).
  • M. Weeks, Yi Pan, and Y. Zhang, "Increasing Security Awareness in Undergraduate Courses with Labware," Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE '16), Feb. 2016, Memphis, TN, pp. 687-687.
  • E. Park, M. Keil and B. Ramesh, “Exploring the Role of Attribution and Emotion in Whisleblowing”, Academy of Management Best Paper Proceedings, 2012, Boston, MA.August 3-7, 2012.
  • Robinson, W.N., Akhlaghi, A., and Deng, T. "Transition Discovery of Sequential Behaviors in Email Application Usage Using Hidden Markov Models," Hawaii International Conference on Software Systems, IEEE, HI, USA, 2013, p. (best paper nominee). http://dx.doi.org.ezproxy.gsu.edu/10.1109/HICSS.2013.574
  • Robinson, W.N. "Understanding Software System Evolution through Requirements Monitoring " in: Dagstuhl Seminar: Requirements Management – Novel Perspectives and Challenges, Schloss Dagstuhl, Germany, 2012.
  • Souza, V.E.S., Lapouchnian, A., Robinson, W.N., and Mylopoulos, J. "Awareness Requirements for Adaptive Systems," in: 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS ’11), Waikiki, Honolulu, HI, USA, 2011.
  • Jarke, M., Loucopoulos, P., Lyytinen, K., Mylopoulos, J., and Robinson, W. "The brave new world of design requirements: four key principles," in: Proceedings of the 22nd international conference on Advanced information systems engineering, Springer-Verlag, Hammamet, Tunisia, 2010, pp. 470-482.
  • Robinson, W.N., and Akhlaghi, A. "Monitoring Behavioral Transitions in Cognitive Rehabilitation with Multi-Model, Multi-Window Stream Mining," Hawaii International Conference on Software Systems, IEEE, Kauai, HI, USA, 2010.
  • Jarke, M., Loucopoulos, P., Mylopoulos, J., and Robinson, W.R. "High-Impact Requirements for Software-Intensive Systems: A Manifesto," Dagstuhl Seminar Perspectives Workshop: Science of Design: High-Impact Requirements for Software-Intensive Systems, Dagstuhl, Germany, 2009.
  • Robinson, W.N., and Purao, S. "Development Support for Specifying and Monitoring Goals of Open Business Processes," 4th International Workshop on Service-Oriented Computing Consequences for Engineering Requirements (SOCCER'08), IEEE, Barcelona (Spain), 2008b, pp. 53 - 64
  • Robinson, W.N. "Extended OCL for goal monitoring," Ocl4All: Modelling Systems with OCL Workshop, ACM/IEEE, ACM/IEEE 10th International MoDELS 2007, Nashville, TN, 2007a.
  • Robinson, W.N. "Implementing Rule-based Monitors within a Framework for Continuous Requirements Monitoring," Hawaii International Conference On System Sciences (HICSS'05), IEEE, Big Island, Hawaii, USA, 2005, best paper nominee. http://eeat.cis.gsu.edu:8080/tunnel-web/secure/webdav/liferay.com/william-robinson/document_library/publications/05-HICSS.pdf
  • Robinson, W.N. "Monitoring Web Service Interactions," Workshop on Requirements Engineering in Open Systems (REOS'03), In conjunction with 11th IEEE International Requirements Engineering Conference (RE03). Monterey Bay, CA, 2003a, pp. 12-14. http://eeat.cis.gsu.edu:8080/tunnel-web/secure/webdav/liferay.com/william-robinson/document_library/publications/03-REOS-Workshop.pdf
  • Robinson, W.N. "Monitoring Web Service Requirements," 11 IEEE International Conference on Requirements Engineering, IEEE Computer Society, Monterey Bay, CA, 2003b, pp. 65-74. http://eeat.cis.gsu.edu:8080/tunnel-web/secure/webdav/liferay.com/william-robinson/document_library/publications/03-RE.pdf
  • Robinson, W.N., and Woo, H.G. "SCENASST: a Tool Support for Reuse of Scenario Specification," Proceedings of the 13th Annual Workshop on Information Technologies and Systems (WITS 2003), Seattle, WA, 2003.
  • Robinson, W.N. "Monitoring Software Requirements using Instrumented Code," IEEE Proceedings of The 35th Annual Hawaii International Conference on Systems Sciences, Hawaii, 2002. http://bx422cm1.bus.oregonstate.edu/wnr/Portals/0/Publications/HICSS-02.pdf
  • Robinson, W.N. "Monitoring Software Requirements using Instrumented Code," The First Symposium on Requirements Engineering for Information Security, Indianapolis, IN, 2001. http://eeat.cis.gsu.edu:8080/tunnel-web/secure/webdav/liferay.com/william-robinson/document_library/publications/01-SREIS.pdf
  • Robinson, W.N., "Open Hub: Data mining open source developments”, IFIP WG 2.9 Requirements Engineering, Stellenbosch, South Africa, February 13 – 18, 2017.
  • Robinson, W.N., Creating process models: RE challenges for modeling and monitoring, Keynote Speaker, First International Workshop on Conceptual Modeling in Requirements and Business Analysis, Co-located with International Conference on Conceptual Modeling (ER 2014), 2014.
  • Robinson, W.N., "Event Engineering and Analysis Toolkit: An Introduction”, IFIP WG 2.9 Requirements Engineering, San Diego, CA, USA, February 10 – 12, 2010.
  • Robinson, W.N., Monitor-Based Feedback for Software Evolution, Perspectives Workshop: Science of Design – High-Impact Requirements for Software-Intensive Systems, Seminar 08412, Schloss Dagsthul, Germany, http://www.dagstuhl.de/08412, October 10, 2008.
  • Robinson, W.N., Monitoring in Support of Design Science Principles, Science of Design Meeting, National Science Foundation, February 28 – March 2, 2007.
  • Robinson, W.N., ReqMon: event stream property monitoring, Eleventh Annual Meeting of the Software Requirements Engineering IFIP WG2.9, Los Suenos Marriott, Costa Rica, February 19-22, 2006.
  • Robinson, W.N., Illustrations of Continuous Requirements Monitoring, 10th Annual Meeting of the Software Requirements Engineering IFIP WG2.9, Workshop, Duck Key, FL, February 19-23, 2005.
  • Robinson, W.N., Requirements Monitoring Research Program Supporting policy-activity alignment in collaborative governmental, scientific, and business systems, Sixth Annual Meeting of the Software Requirements Engineering IFIP WG2.9, Workshop, Cancun Mexico, February 19-21, 2004.
  • Robinson, W.N., Providing Requirement Assurances for Services in Electronic Marketplaces, Information Technology Group, Georgia State University, Robinson College of Business, September 14, 2001.
  • Robinson, W.N., Monitoring Software Requirements using Instrumented Code, Sixth Annual Meeting of the Software Requirements Engineering IFIP 2.9, Duck Key, FL, February 18-22, 2001.
  • Robinson, W.N., Requirements Interaction Management, Fifth Annual Meeting of the Software Requirements Engineering IFIP 2.9, Flims, Switzerland, February. 5-9, 2000.
  • Zhao,  Xia;  Xue,  Ling; and  Whinston,  Andrew  B. “Managing Interdependent Information Security Risks: A Study of Cyberinsurance, Managed Security Service and Risk Pooling,” Proceedings of the 30th International Conference on Information Systems (ICIS), Phoenix, Arizona, 2009
  • Dmitry Zhdanov. “Drivers, Metrics and Best Practices for Information Security”, Proceedings of the 12th Americas Conference on Information Systems (AMCIS), Acapulco, Mexico, August 4-6, 2006.
  • Dmitry Zhdanov. “Next Generation Research Challenges in Information Security and Privacy”. Policy, Awareness, Sustainability and Systems Workshop, Minneapolis, MN, September 24, 2016
  • Ram Gopal, Hooman Hidaji, Raymond Patterson, Erik Rolland and Dmitry Zhdanov. “Self-Regulation and the Invisible Hand of User Privacy Concerns”, WITS-2015, Dallas, TX, December 12-13, 2015
  • Ram Gopal, Raymond Patterson, Erik Rolland and Dmitry Zhdanov. “Algorithmic Approaches to Fraud Prevention and Investigation”, INFORMS Annual Meeting, Phoenix, AZ, October 14-17, 2012
  • Alok Gupta and Dmitry Zhdanov. “Fairness and Insider Compliance with Information Security Policies”, University of Alberta Conference on Information Security, Edmonton, AB, May 29, 2010
  • Alok Gupta and Dmitry Zhdanov. “The Role of Fairness in Insider Compliance with Information Security Policies”, Workshop on Information Systems Economics (WISE-2007), Montreal, Canada, December 8-9, 2007
  • Alok Gupta and Dmitry Zhdanov. “Growth and Sustainability of MSSP Networks”, Workshop on Economics of Information Security (WEIS-2007), Pittsburgh, PA, June 7-8, 2007
  • Alok Gupta and Dmitry Zhdanov. “The Role of Performance Incentives in Compliance with Information Security Policies”, CIST-2006, Pittsburgh, PA, November 4-5, 2006
  • Alok Gupta and Dmitry Zhdanov. “Trust and Fairness as Incentives for Compliance with Information Security Policies”, WITS-2006, Milwaukee, WI, December 9-10, 2006

Presentations

  • Baskerville, R. (2013, Dec 5-6) Information Systems Security Privacy (International Business Masters Short Course), Paris Dauphine University
  • Baskerville, R and Straub, D (2010, March 9) Information Systems Security (Research Lecture) Strasbourg Business School, Strasbourg France.
  • Baskerville, R (2009, June 29 - July 2) Possible Risks Analysis Engine: A Prototype Tool for Managing IT Security Safeguards Acquisition, (Research Lecture) Information Security Seminar, Laurea University, Mikili, Finland.
  • Baskerville, R (2009, June 29 - July 2) Information Security Control Decision Theory:  Management Reasoning in Threes (Research Lecture) Information Security Seminar, Laurea University, Mikili, Finland.
  • Baskerville, R. (2007, Nov 20) Information Warfare (Research Lecture). Copenhagen Business School, Copenhagen Denmark.
  • Baskerville, R. (2007, Feb 9) Possible Risks Analysis Engine: A Prototype Tool for Managing IT Security Safeguards Acquisition (Research Lecture).  University of Houston.
  • Baskerville, R. (2004). Information Warfare for Business (Graduate Lecture and Colloquium). Gothenburg, Sweden: Gothenburg University, and Atlanta Georgia: Georgia State University.
  • Baskerville, R. (2003). Information Warfare for Electronic Commerce (Short Course). Pretoria, South Africa: Pretoria University.
  • Siponen, M., & Baskerville, R. (2002, April 4-5). A new paradigm for extending security in I/S development methods. Paper presented at the ISOneWorld, Las Vegas.
  • Barns, R., and Baskerville, R. (1994) “Exploring conflict in IS Security,” Proceedings of 6th Annual Canadian Computer Security Symposium, Ottawa Congress Center, Canada, 17th-20 May 1994.
  • Baskerville, R. (1991) “Information systems security”, PhD Reseach Seminar, University of Salford, Salford, England, May 16, 1991.
  • Baskerville, R. (1987) “The Role of Computer Security,” ACM Mid-Southeast Conference, Gatlinburgh, Tennessee, October, 1987.
  • Baskerville, R. (1985) “Survey of Computer Security Design Methodologies,” ACM Mid-Southeast Conference, Gatlinburgh, Tennessee, October, 1985
  • Baskerville, R. (2009, May 28) “Generative Controls for Information Systems Security” (Research Lecture) Computer Society of South Africa, Cape Town, May 28, 2009
  • Baskerville, R. (2008, 21 May). A Controls Analysis of Security Standards: Behavioral and Generative Safeguards. Paper presented at the Danish Computer Society Meeting, University of Copenhagen, Copenhagen, Denmark.
  • Baskerville, R. (2006, 8 September). Intractable Problems in IT Risk Management & Possibility Theory. Paper presented at the Australian Computer Society Western Australia Branch Conference, Perth, Australia.
  • Baskerville, R., (1999) “Information Systems Security”, Practitioner Lecture, Georgia Association of Electric Cooperatives, Macon, Georgia October 25, 1999.
  • Kim, J., Stucke, C., & Baskerville, R. (2013). Possibility based Risk Assessment Engine (PRAE) (Poster). Paper presented at the 23rd Workshop Information Technology and Systems.
  • Baskerville, R., Kuehl, D. T., & Ryan, J. (2005, June 6-9). Relevance of Information Warfare to Business. Panel presented at the Colloquium for Information Systems Security Education, Atlanta, Georgia.
  • Baskerville, R., Dhillon, G., Pernul, G., & Soares, F. (2005, May 26-28). Information Systems Security Standards: The Solution or the Problem? Panel presented at the European Conference on Information Systems, Regensburg, Germany.
  • Ding, M. Weeks, Y. Zhang, and Yi Pan, "New Mobile Security Labware based on Voice Recognition and Cloud Servers," 19th Colloquium for Information Systems Security education, June 15-17, 2015, Las Vegas, USA (Round table presentation).
  • Wang, C. Wang, L. Xie, W. Song and Yi Pan, "Security Education for Smart Grid: Materials, Experiments, and Evaluation," 19th Colloquium for Information Systems Security education, June 15-17, 2015, Las Vegas, USA (Oral Presentation).
  • Topalli, V. (2017) Invited speaker, Harry Frank Guggenheim Foundation, “Justice in the Trump Era” CUNY (John Jay U), NY (2/16).

Dissertations and Theses