Recent Publications

91制片廠合集

D. Horne “Hash Chain”, In:Encyclopedia of Cryptography, Security and Privacy, Jajodia S., Samarati P., Yung M. (eds). Springer, Berlin, Heidelberg, March 2021. 

 

N. Alzaben and D. W. Engels, "End-to-End Routing in SDN Controllers Using Max-Flow Min-Cut Route Selection Algorithm," 2021 23rd International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea (South), 2021, pp. 461-467.

 

S. Chakrabarty, D. W. Engels and L. Wood, “Smart City Mobile IoT Management with DLTs," 2021 IEEE 39th International Conference on Consumer Electronics (ICCE), Las Vegas, Nevada, USA, 2021, pp. 1-6.

 

S. Chakrabarty and D. W. Engels, “The Social and Ethical Implications of Smart Environments in the Age of Big Data," 2021 3rd International Conference on Smart Systems: Innovations in Computing (SSIC 2021), Jaipur, India, 2021, pp. 1-6.

 

D. Horne “Zero Trust Architecture”, In: Encyclopedia of Cryptography, Security and Privacy, Jajodia S., Samarati P., Yung M. (eds). Springer, Berlin, Heidelberg, January 2021.

 

M. Zaber and S. Nair, "A framework for automated evaluation of security metrics," ARES '20: Proceedings of the 15th International Conference on Availability, Reliability and

Security, August 2020 Article No.: 89 Pages 1–11

 

D. Horne "The Prom Problem: Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes" (2020).Computer Science and Engineering Theses and Dissertations. 13.

 

D. Horne and S. Nair, “Toward a Quantum Resistant SecretMatch™ Privacy Enhanced Technology - A Case Study,” In Proceedings of the 2019 International Conference on Security & Management, SAM’19, Las Vegas, NV, USA, July 29 – August 01, 2019, pp. 147-153.

 

D. Horne and S. Nair, "A New Privacy-Enhanced Technology for Fair Matchmaking With Identity Linked Wishes," IEEE Systems Journal, 14 March 2019. 

 

D. Horne and S. Nair, “A feasibility evaluation of fair and privacy-enhanced matchmaking with identity linked wishes,” in Proc. 22nd Australasian Conference on Information Security and Privacy (ACISP), LNCS 10343, July 2017, pp. 422-434.

 

D. Horne and S. Nair, “Privacy-enhanced and fair matchmaking system – Applications and analysis of protocol, architecture, and performance,” in Proc. 16th International Conference on Security and Management (SAM), July 2017, pp. 161-167.

 

S. Abraham and S. Nair, “Comparative Analysis and Patch Optimization using Cyber Security Analytics Framework", Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, May. 2017.

 

D. Horne and S. Nair, “The Prom Problem: Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes”, 2016 IEEE International Carnahan Conference on Security Technology (ICCST), Oct. 2016.

 

S. Abraham and S. Nair, “Estimating Mean Time to Compromise using non-homogenous continuous-time Markov models", 40th IEEE Annual Computer Software and Applications Conference (COMPSAC 2016), Jun. 2016.

 

S. Rafiqi, C. Wangwiwattana, S. Nair, E. Larson, E. Fernandez, " PupilWare-M: Cognitive Load Estimation Using Unmodified Smartphone Cameras", First International Workshop on Social Sensing (SocialSens 2015), Oct. 2015.

 

S. Abraham and S. Nair, “A Novel Architecture for Predictive CyberSecurity using non-homogenous Markov Models”, IEEE International Symposium on Recent Advances of Trust, Security, and Privacy in Computing and Communications, (In Conjunction with IEEE TrustCom-15), Helsinki, Finland, Aug. 2015.

 

S. Rafiqi, S. Nair, C. Wangwiwattana, E. Fernandez, E. Larson, J. Kim "PupilWare: Towards Pervasive Cognitive Load Measurement using Commodity Devices", ACM Proceedings of the 7th International Conference on Pervasive Technologies Related to Assistive Environments, Petra 2015, Corfu, Greece, Jul. 1-3, 2015

 

S. Abraham and S. Nair, “Exploitability analysis using predictive cyber security framework”, 2nd IEEE International Conference on Cybernetics (CYBCONF), Jun. 2015.

 

S. Abraham and S. Nair, "A Predictive Framework for Cyber Security Analytics using Attack Graphs", International Journal of Computer Networks & Communications (IJCNC), Vol.7, No.1, January 2015

 

S. Abraham, S. Nair, “Cyber Security Analytics: A stochastic model for Security Quantification using Absorbing Markov Chains”, Journal of Communications, Vol. 9, No. 12, Dec. 2014

 

S. Abraham, S. Nair, “Predictive Cyber Security Analytics Framework: A non-homogenous Markov Model for Security Quantification”, 2nd International Conference of Security, Privacy and Trust Management (SPTM 2014), Dec. 2014.

 

S. Abraham, S. Nair, “Cyber Security Analytics: A stochastic model for Security Quantification using Absorbing Markov Chains”, 5th International Conference on Networking and Information Technology (ICNIT 2014), Nov. 2014

 

M. Malaika, S. Nair, F. Coyle, “N-Version Architectural Framework for Application Security Automation (NVASA)”, CrossTalk, The Journal of Defense Software Engineering (DoD), Sep. 2014, 30-34

 

Eshmawi, S. Nair, “Semi-Synthetic Data for Enhanced SMS Spam Detection”, ACM International Conference on Management of Emergent Digital Eco Systems (MEDES), Sept. 2014

 

S. Rafiqi, S. Nair, E. Fernandez, “Affective and Cognitive UI for Enhanced Usability”, 5th International Conference on Applied Human Factors and Ergonomics, AHFE 2014 Krakow, Poland, July 2014

 

Eshmawi, S. Nair, “Privacy of Smartphone Applications”, IADIS International Conference on Applied Computing, Oct. 2013

 

S. Rafiqi, S. Nair, E. Fernandez, “Markup Language for Cognitive and Context-Aware Adaptable User Interface”, IADIS International Conference on Applied Computing, Oct. 2013

 

O. Al Ibrahim, S. Nair, "State Machine-Based Security Fusion for Resource-Constrained Environments", IEEE Systems Journal - Special Issue on Security and Privacy in Complex Systems, Sept. 2013, pp. 430-441

 

Eshmawi, S. Nair, “Feature Reduction for Optimum SMS Spam Filtering Using Domain Knowledge”, 2013 International Conference on Security and Management (SAM’13), Jul. 2013

 

R. Al-Awadhi, S. Nair, A Crypto-System with Embedded Error Control for Secure and Reliable Communication, International Journal of Computer Science and Security, Jun., 2013, pp. 48-61

 

Eshmawi, S. Nair, "Smartphone Applications: Survey of New Vectors and Solutions", In Proceedings of The IEEE International Conference on Computer Systems and Applications, May, 2013

 

R. Al-Awadhi, S. Nair, “A joint scheme for secure and reliable communication in wireless sensor networks”, IEEE ACS 2013: International Conference on Computer Systems and Applications ({AICCSA), May 2013

 

W. Casper, S. Papa, S. Nair, Security Fusion Implementation and Optimization in SCADA Systems, IEEE International Conference on Technologies for Homeland Security (IEEE HST), Waltham, MA, USA, November 2012, IEEE, 620-625

 

S. Papa, W. Casper, S. Nair, A Transfer Function based Intrusion Detection System for SCADA Systems, IEEE International Conference on Technologies for Homeland Security (IEEE HST), Waltham, MA, USA, November 2012, IEEE, 93-98

 

E. Cankaya, S. Nair, C. Cankaya, “Applying Error Correction Codes to Achieve Security and Dependability”, Journal of Computers Standards and Interfaces, July 2012

 

S. Papa, W. Casper, S. Nair, Availability Based Risk Analysis for SCADA Embedded Computer Systems, Proceedings of the 2011 International Conference on Security and Management, Worldcomp’11, July 2011,CSREA Press, 541-547

 

O. Al Ibrahim, S. Nair, “Security Fusion Based On State Machine Compositions”, IEEE Symposium on Computational Intelligence in Cyber Security (IEEE CISC-SSCI), Paris, France, 2011

 

O. Al Ibrahim, S. Nair, “Cyber-Physical Security Using System-Level PUFs” , in IEEE proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Istanbul, Turkey, 2011

 

S. Nair, S. Abraham, O. Al Ibrahim, “Security Architecture For Infrastructure Protection”, in IEEE proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IEEE IWCMC), Istanbul, Turkey, 2011

 

T. Manikas, L. Spenner, P. Krier, M. Thornton, S. Nair, and S. Szygenda, “An axiomatic analysis approach for large-scale disaster-tolerant systems modeling,” Journal of Systemics, Cybernetics and Informatics, 2011

 

S. Nair, S. Abraham, O. Al-Ibrahim, “Security Fusion: A New Security Architecture for Resource-Constrained Environments”, Proceedings of the 6th USENIX conference on Hot topics in security, HotSec’11, 2011

 

P. Krier, S. Seshabhattar, J. Pereira, D. Engels, and S. Nair, “Lightweight key agreement with key chaining,” in Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on. IEEE, 2010, pp. 594–599

 

M. Malaika, S. Nair, F. Coyle, “Application Security Automation for Cloud Computing”, , 2nd International ICST Conference on Cloud Computing, Barcelona, Spain October, 2010

 

S. Rafiqi, S. Nair, Complete Healthcare Information Delivery System (C-HIDS), SDPS-2010, Jun. 2010

 

S. Papa, W. Casper and S. Nair, “Placement of Trust Anchors in Embedded Computer Systems” IEEE Int. Symposium on Hardware-Oriented Security and Trust, Jun. 2011, pp. 111-116

 

B. Alqudah, S. Nair, "Toward Multi-Service Electronic Medical Records Structure", SDPS-2010, Jun. 2010

 

T. Manikas, L. Spenner, P. Krier, M. Thornton, S. Nair, and S. Szygenda, “An axiomatic analysis approach for large-scale disaster-tolerant systems modeling,” in Int. Multi-Conf on Complexity, Informatics, and Cybernetics (IMCIC’10), 2010

 

S. N. P. Seshabhattar, P. N. Yenigalla, P. Krier, and D. W. Engels, “Hummingbird key establishment protocol for low-power zigbee,” in 8th Annual IEEE Consumer Communications and Networking Conference IEEE CCNC 2011, 2011

 

P. Krier, S. N. P. Seshabhattar, D. W. Engels, and S. Nair, “Cloaking rfid tags,” in 8th Annual IEEE Consumer Communications and Networking Conference IEEE CCNC 2011, 2011

 

L. Spenner, P. Krier, M. Thornton, S. Nair, S. A. Szygenda, and T. Manikas, An Axiomatic Analysis Approach for Large-Scale Disaster-Tolerant Systems Modeling, Proc. Of the Int. Conf. on Computing, Communications and Control Technologies, April 6-9, 2010

 

P. Ongkasorn, K. Turney, S. Nair, S. M. Thornton, Szygenda, and T. Manikas, Cyber Threat Trees for Large System Threat Cataloging and Analysis, Proc. of IEEE International Systems Conference, April 5-8, 2010

 

L. Spenner, P. Krier, M. Thornton, S. Nair, S. A. Szygenda, and T. Manikas, Large System Decomposition and Simulation Methodology Using Axiomatic Analysis, Proc. of IEEE International Systems Conference, April 5-8, 2010