Refereed Papers

2023-2024

  1. Montero-Moguel, L., Mejia, J.A., & Carmona, G. Leveraging mathematical modeling to expand measurement process opportunities for engineering students. 2024 American Society for Engineering Education (ASEE) Annual Conference. Portland, Oregon, United States. June 23-26
  2. P. Chhetri, S. Bhatt, P. Bhatt, M. Nur Nobi, J.Benson and R. Krishnan. Environment Aware Deep Learning Based Access Control Model. ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, June 21, 2024.
  3. Montero-Moguel, L., Mejia, J.A., & Carmona, G. Enhancing decision-making in engineering education: Utilizing Appropriate Technology to integrate technical and social considerations. American Educational Research Association 2024 Annual Meeting. Philadelphia, Pennsylvania, USA. April 11-14, 2024
  4. Galarza-Tohen, B. & Carmona, G. Epistemic Network Analysis to explore women’s engagement solving a modeling task to elicit computational thinking. American Educational Research Association 2024 Annual Meeting. Philadelphia, Pennsylvania, USA. April 11-14, 2024
  5. G. Morales, P. K. C, S. Jahan, M. B. Hosseini and R. Slavin. "A Large Language Model Approach to Code and Privacy Policy Alignment," 2024 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), Rovaniemi, Finland, 2024, pp. 79-90
    DOI: 10.1109/SANER60148.2024.00016.
  6. Wang, Zhiwei & Xu, Jingye & Zhang, Jianqiu & Slavin, Rocky & Zhu, Dakai. (2024). An intelligent assistive driving solution based on smartphone for power wheelchair mobility. Journal of Systems Architecture. 149.
    DOI:  10.1016/j.sysarc.2024.103105
  7. Schroeder, Rebecca & Niu, Jianwei & Malshe, Ashwin & Hum, Sue & Flemming, Siobhan & Thacker, Ian. (2024). Enabling Widespread Engagement in DS and AI: The Generation AI Curriculum Initiative for Community Colleges. 1938-1938.
    DOI:  10.1145/3626253.3635343
  8. Morales, G.; Romit, F.; Bienek-Parrish, A.; Jenkins, P. and Slavin, R. (2024). IoT Device Classification Using Link-Level Features for Traditional Machine Learning and Large Language Models. In Proceedings of the 10th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-683-5; ISSN 2184-4356, SciTePress, pages 297-308.
    DOI: 10.5220/0012365700003648
  9. Wael Issa, Nour Moustafa, Benjamin Turnbull, Kim-Kwang Raymond Choo. RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks. IEEE Transactions on Information Forensics and Security 19: 3773-3787 (2024).
    DOI:  10.1109/TIFS.2024.3368879
  10. Vargas-Alejo, V., Montero-Moguel, L. & Carmona, G. Interpretaciones de un docente durante un curso basado en la modelación. Perspectivas actuales de la Educación Matemática. SOMIDEM Editorial. (pp. 411-420).
  11. Rodriguez, David & Krishnan, Ram. (2023). A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks. 178-196.
    DOI: 10.1007/978-3-031-49099-6_11
  12. Rodriguez, David & Krishnan, Ram. (2023). Learnable Image Transformations for Privacy Enhanced Deep Neural Networks. 64-73.
    DOI: 10.1109/TPS-ISA58951.2023.00018
  13. Montero-Moguel, L., Vargas-Alejo, V., Carmona, G. & Méndez-Huerta, D. Model eliciting activities as a powerful tool to expand collaborative work opportunities for undergraduate students. (2023). In T. Lamberg, & D. Moss, (Eds.) Proceedings of the forty-fifth annual meeting of the North American Chapter of the International Group for the Psychology of Mathematics Education (Vol. 2), (pp. 168-177). University of Nevada, Reno. Oct 1 - 4, 2023.
  14. Wang, Xiaoyin & Rafi, Tahmid & Meng, Na. (2023). VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage. 951-962.
    DOI: 10.1109/ASE56229.2023.00197
  15. Rasheed, Amar & Baza, Mohamed & Badr, Mahmoud & Alshahrani, Hani & Choo, Kim-Kwang. (2023). Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network. IEEE Transactions on Network Science and Engineering. PP. 1-17.
    DOI: 10.1109/TNSE.2023.3312545
Back to Top

2022-2023

  1. Rodriguez, David & Krishnan, Ram. (2023). An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning.
    DOI:  10.1007/978-3-031-37586-6_18
  2. Richard Alvarez, Paras Bhatt, Đorđe Klisura, and Kim-Kwang Raymond Choo 2024. Predicting Game Cheating Behavior Through the Social Network. In Proceedings of The 15th Dewald Roode Workshop on Information Systems Security Research (DRW 2023), 22-23 June 2023, Glasgow, Scotland.
  3. Foyzul Hassan, Na Meng, and Xiaoyin Wang. 2023.  UniLoc: Unified Fault Localization of Continuous Integration Failures . ACM Trans. Softw. Eng. Methodol, May 2023.
    DOI:  https://doi.org/10.1145/3593799
  4. Sunzhou Huang and Xiaoyin WangPExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports, International Conference on Software Engineering, pp. 184—195, May 2023.
    DOI: https://doi.org/10.48550/arXiv.2305.06669
  5. Safwa Ameer, Ram Krishnan, Ravi Sandhu and Maanak Gupta. Utilizing the DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems (poster). ACM Conference on Data and Application Security and Privacy (CODASPY 2023), Charlotte, North Carolina, USA, April 24-26, 2023.
    DOI: https://doi.org/10.1145/3577923.3585046
  6. Randy Klepetko and Ram Krishnan MiCAM: Visualizing Feature Extraction of Nonnatural Data. International Conference on Machine Learning and Soft Computing (MLSC 2023), Copenhagen, Denmark, January 28-29, 2023.
    DOI: https://doi.org/10.5121/csit.2023.130201
  7. Gabriel A. Morales, Jingye Xu, Dakai Zhu, and Rocky Slavin. Lightweight Collaborative Inferencing for Real-Time Intrusion Detection in IoT Networks, 19th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC'22), Haikou, China, December 2022.
    DOI:  10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00076
  8. Zhiwei Wang, Kevin Liu, Jingye Xu, Jingjing Chen, Yufang Jin, and Rocky Slavin. A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for Smartphones, 18th IEEE International Conference on Embedded Software Systems (ICESS'22), Chengdu, China, December 2022.
    DOI:  https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00295
  9. Long J, Cvitić I, Zhang X, Peraković D and Choo K-K R. Badoo Android and iOS dating application analysis. Mobile Networks and Applications [In press], November 2022.
    DOI:  https://doi.org/10.1007/s11036-022-02048-9
  10. S. Ameer, J. Benson and R. SandhuHybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT in IEEE Transactions on Dependable and Secure Computing, 2022.
    DOI: 10.1109/TDSC.2022.3216297
  11. Xueling Zhang, John Heaps, Rocky Slavin, Jianwei Niu, Travis Breaux, and Xiaoyin WangDAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data", ACM Transactions on Software Engineering and Methodology (TOSEM), 32 pages, October 2022.
    DOI:  https://dl.acm.org/doi/10.1145/3569936
  12. Aagaard P, Dinyarian B, Abduljabbar O and Choo K-K RFamily locating sharing app forensics: Life360 as a case study. Forensic Science International: Digital Investigation 44: Article no. 301478, 14 pages, October 2022.
    DOI:  https://doi.org/10.1016/j.fsidi.2022.301478
  13. Akello P, Vemprala N, Beebe N and Choo K-K R. Blockchain Use-Case in Ballistics and Crime Gun Tracing and Intelligence: Towards Overcoming Gun Violence. ACM Transactions on Management Information Systems [In press], October 2022.
    DOI:  https://doi.org/10.1145/3571290
  14. Tahmid Rafi, Xueling Zhang, and Xiaoyin Wang. PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing. In 37th IEEE/ACM International Conference on Automated Software Engineering (ASE22). ACM, Article 77, 1- 13, October 2022.
    DOI:  https://doi.org/10.1145/3551349.3561160
  15. Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi Sandhu. Administration of Machine Learning Based Access Control. European Symposium on Research in Computer Security (ESORICS) 2022, Copenhagen, Denmark, September 26-30, 2022.
    DOI: https://doi.org/10.1007/978-3-031-17146-8_10
  16. Mohammad Nur Nobi, Ram Krishnan and Ravi Sandhu. Adversarial Attacks in Machine Learning Based Access Control. Italian Conference on Big Data and Data Science (ITADATA2022), Milan, Italy, September 20-21, 2022.
    DOI: TBA
  17. Klepetko, R., Krishnan, R. Visualizing Convolutional Neural Network Models’ Sensitivity to Nonnatural Data Order.  Inf Syst Front 25, 613-638, Sept 2022.
    DOI:  https://doi.org/10.1007/s10796-022-10330-0
Back to Top

2021-2022

  1. Rodriguez, D., Nayak, T., Chen, Y. Krishnan, R. and Yuang, Y. On the role of deep learning model complexity in adversarial robustness for medical images. BMC Med Inform Decis Mak   22 (Suppl 2), 160 (2022).
    DOI:  https://doi.org/10.1186/s12911-022-01891-w
  2. Safwa Ameer, Maanak Gupta, Smriti Bhatt and Ravi SandhuBlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems. In Proceedings of the 27th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 8-10, 2022, 10 pages.
    DOI:  10.1145/3532105.3535020
  3. Tanjila Mawla, Maanak Gupta and Ravi SandhuBlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems. In Proceedings of the 27th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 8-10, 2022, 10 pages.
    DOI:  10.1145/3532105.3535017
  4. Mehrnoosh Shakarami, James Benson and Ravi SandhuBlockchain-Based Administration of Access in Smart Home IoT. In Proceedings of the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 27, 2022, Baltimore, MD, pages 57-66.
    DOI:  10.1145/3510547.3517921
  5. Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, and Ravi SandhuToward Deep Learning Based Access Control. In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy (CODASPY '22). Association for Computing Machinery, New York, NY, USA, 143–154. April 2022.
    DOI: 3508398.3511497
  6. Lawal S., Krishnan R.,   Attribute-Based Access Control Policy Review in Permissioned Blockchain. In: Krishnan R., Rao H.R., Sahay S.K., Samtani S., Zhao Z. (eds) Secure Knowledge Management In The Artificial Intelligence Era. SKM 2022. Communications in Computer and Information Science, vol 1549. Springer, Cham. Feb 2022.
    DOI: 978-3-030-97532-6_6
  7. Klepetko, R., Krishnan, R. (2022).  Analyzing CNN Models’ Sensitivity to the Ordering of Non-natural Data. In: Krishnan R., Rao H.R., Sahay S.K., Samtani S., Zhao Z. (eds) Secure Knowledge Management In The Artificial Intelligence Era. SKM 2022. Communications in Computer and Information Science, vol 1549. Springer, Cham. Feb 2022.
    DOI: 978-3-030-97532-6_8
  8. Aguilar D L, Perez M A M, Loyola-Gonzalez O, Choo K-K R and Bucheli-SusarreyTowards an interpretable autoencoder: A decision tree-based autoencoder and its application in anomaly detection.  IEEE Transactions on Dependable and Secure Computing [Early Access], Feb 2022.
    DOI: TDSC.2022.3148331
  9. Maanak Gupta, Ravi Sandhu, Tanjila Mawla and James BensonReachability Analysis for Attributes in ABAC with Group Hierarchy. IEEE Transactions on Dependable and Secure Computing, Early Access, Jan 2022, pages 17.
    DOI:  10.1109/TDSC.2022.3145358
  10. S. He, E. Ficke, M. Pritom, H. Chen, Q. Tang, Q. Chen, M. Pendleton, L. Njilla, and S. Xu. Blockchain-Based Automated and Robust Cyber Security Management, Journal of Parallel and Distributed Computing (JPDC), Jan 2022.
    DOI:  j.jpdc.2022.01.002
  11. Safwa Ameer, James Benson and Ravi SandhuAn Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach. Information, Volume 13, Number 2, January 2022.
    DOI:  10.3390/info13020060
  12. Zou J, He D, Zeadally S, Kumar N, Wang H Choo K-K R 2022Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Computing Surveys 54(8): Article No.: 160 (36 pages).
    DOI: 10.1145/3456628
  13. Glen Cathey, James Benson, Maanak Gupta and Ravi SandhuEdge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems. In Proceedings Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Virtual Event, Dec. 13-15, 2021.
    DOI: 10.1109/TPSISA52974.2021.00008
  14. Carmona, G., Galarza-Tohen, B., Martinez-Medina, GExploring Interactions Between Computational and Critical Thinking in Model-Eliciting Activities Through Epistemic Network Analysis. In: Wasson, B., Zörgő, S. (eds) Advances in Quantitative Ethnography. ICQE 2021. Communications in Computer and Information Science, vol 1522., Nov 2021. Springer, Cham.
    DOI: 978-3-030-93859-8_23
  15. Jaehong Park, Ravi Sandhu, Maanak Gupta and Smriti BhattActivity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems. IEEE Access, Volume 9, November 2021.
    DOI:  10.1109/ACCESS.2021.3126201
  16. Grover H, Alladi T, Chamola V, Singh D and Choo K-K REdge Computing and Deep Learning Enabled Secure Multi-Tier Network for Internet of Vehicles. IEEE Internet of Things Journal, Volume 8, Issue: 19, Oct. 2021.
    DOI: JIOT.2021.3071362
  17. Mitra Bokaei Hosseini, John Heaps, Rocky Slavin, Jianwei Niu, and Travis D. BreauxAmbiguity and Generality in Natural Language Privacy Policies", Proceedings of the 29th IEEE International Requirements Engineering Conference, pages 70--81, Sept 2021.
    DOI: 10.1109/RE51729.2021.00014.
  18. Jahromi A N, Karimipour H, Dehghantanha A and Choo K-K RToward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber–Physical Systems. IEEE Internet of Things Journal 8(17): 13712–13722, Sept 2021.
    DOI: 10.1109/JIOT.2021.3067667
Back to Top

2020-2021

  1. S. Lawal and R. Krishnan, "  Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain," 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Aug 2021, pp. 1-6.
    DOI:  10.1109/COINS51742.2021.9524248.
  2. Smriti Bhatt, Thanh Kim Pham, Maanak Gupta, James Benson, Jaehong Park and Ravi SandhuAttribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future. IEEE Access, Volume 9, July 2021, pages 24
    DOI: 10.1109/ACCESS.2021.3101218
  3. John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi SandhuAccess Control Policy Generation from User Stories Using Machine Learning. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 2021.
    DOI:  10.1007/978-3-030-81242-3_10
  4. Shuvra Chakraborty and Ravi SandhuOn Feasibility of Attribute-Aware Relationship-Based Access Control Policy Mining. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 2021, 12 pages.
    DOI:  10.1007/978-3-030-81242-3_23
  5. Na Shi, Bo Tang, Ravi Sandhu and Qi LiDUCE: Distributed Usage Control Enforcement for Private Data Sharing in Internet of Things. 33rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Virtual Event, July 2021, 12 pages.
    DOI:  10.1007/978-3-030-81242-3_16
  6. Xu X, Yao L, Bilal M, Wan S, Dai F and Choo K-K RService migration across edge devices in 6G-enabled Internet of Vehicles networks. IEEE Internet of Things Journal, June 2021 (Early Access).
    DOI:  10.1109/JIOT.2021.3089204
  7. Maanak Gupta and Ravi SandhuTowards Activity-Centric Access Control for Smart Collaborative Ecosystems. 26th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 2021, 10 pages.
    DOI:  10.1145/3450569.3463559
  8. J. C. Kimmel, A. D. Mcdole, M. Abdelsalam, M. Gupta and R. Sandhu, "  Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure," in IEEE Access, vol. 9, pp. 68066-68080, May 2021 (Final).
    DOI:  10.1109/ACCESS.2021.3077498.
  9. Van Trieu-Do, Richard Garcia-Lebron, Maochao Xu, Shouhuai Xu, and Yusheng Feng.  Characterizing and Leveraging Granger Causality in Cybersecurity: Framework and Case Study. SESA - EAI Endorsed Transactions on Security and Safety, May 2021.
    DOI:  10.4108/eai.11-5-2021.169912
  10. Sherifdeen Lawal and Ram KrishnanEnabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study. 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021.
    DOI:  10.1109/BigDataSecurityHPSCIDS52275.2021.00023
  11. Jacinto Molina, Xue Qin and Xiaoyin WangAutomatic Extraction of Code Dependency in Virtual Reality Software. IEEE/ACM 29th International Conference on Program Comprehension (ICPC), May 2021 pp. 381-385.
    DOI:  10.1109/ICPC52881.2021.00043
  12. Rodney Rodriguez and Xiaoyin WangUnderstanding Execution Environment of File-Manipulation Scripts by Extracting Pre-Conditions. IEEE/ACM 29th International Conference on Program Comprehension (ICPC), May 2021 pp. 406-410.
    DOI:  10.1109/ICPC52881.2021.00048
  13. Xueling Zhang, Xiaoyin Wang, Rocky Slavin, and Jianwei Niu. ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis, IEEE Symposium on Security and Privacy, pages 681-697, May 2021.
    DOI:  10.1109/SP40001.2021.00040
  14. Sun D, Zhang X, Choo KK, Hu L, Wang F. NLP-based digital forensic investigation platform for online communications. Computers & Security, 104, p.102210. May 2021 (Final).
    DOI:  10.1016/j.cose.2021.102210
  15. Mitra Bokaei Hosseini, Travis D. Breaux, Rocky Slavin, Jianwei Niu, and Xiaoyin Wang. Analyzing Privacy Policies through Syntax-Driven Semantic Analysis of Information Types, Journal of Information and Software Technology, 18 pages, May 2021.
    DOI:  10.1016/j.infsof.2021.106608
  16. Shuvra Chakraborty and Ravi SandhuFormal Analysis of ReBAC Policy Mining Feasibility. 11th ACM Conference on Data and Application Security and Privacy (CODASPY), April 2021, Virtual Event, 11 pages.
    DOI:  10.1145/3422337.3447828
  17. Safwa Ameer and Ravi SandhuThe HABAC Model for Smart Home IoT and Comparison to EGRBAC. ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 2021, 10 pages.
    DOI:  10.1145/3445969.3450428
  18. Mehrnoosh Shakarami and Ravi SandhuRole-Based Administration of Role-Based Smart Home IoT. ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SAT-CPS), April 2021, 10 pages.
    DOI:  10.1145/3445969.3450426
  19. Deqing Zou, Yawei Zhu, Shouhuai Xu, Zhen Li, Hai Jin, and Hengkai Ye.Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching," in ACM Transactions on Software Engineering Methodology Vol 30 No2 Article 23, March 2021 (Final), 31 pages.
    DOI:  10.1145/3429444
  20. Chen Y, Wang H, Choo KK, He P, Salcic Z, Kaafar MA, Zhang X.  DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain. IEEE Transactions on Dependable and Secure Computing. Feb 2021 (Early Access).
    DOI:  10.1109/TDSC.2021.3058134
  21. Lin C, Luo M, Huang X, Choo KK, He D. An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof. IEEE Systems Journal. Jan 2021 (Early Access).
    DOI:  10.1109/JSYST.2020.3045076
  22. Z. Fang, M. Xu, S. Xu and T. HuA Framework for Predicting Data Breach Risk: Leveraging Dependence to Cope With Sparsity, in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2186-2201, 2021.
    DOI:  10.1109/TIFS.2021.3051804.
  23. Z. Li, D. Zou, S. Xu, H. Jin, Y. Zhu and Z. ChenSySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities, in IEEE Transactions on Dependable and Secure Computing. Jan 2021.
    DOI:  10.1109/TDSC.2021.3051525.
  24. Lu N, Chang Y, Shi W, Choo KKCoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions. IEEE Transactions on Dependable and Secure Computing. Dec 2020 (Early Access).
    DOI:  10.1109/TDSC.2020.3043366
  25. Smriti Bhatt and Ravi Sandhu. Convergent Access Control to Enable Secure Smart Communities. 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA), Dec 2020, 9 pages.
    DOI:  10.1109/TPS-ISA50397.2020.00029
  26. Al-Alaj, Abdullah, Ram Krishnan, and Ravi Sandhu. ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions. 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC). IEEE, Dec 2020.
    DOI: 10.1109/CIC50333.2020.00022
  27. Sina Sontowski, Maanak Gupta, Sai Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi and Ravi SandhuCyber Attacks on Smart Farming Infrastructure. 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), Dec 2020, 10 pages.
    DOI:  10.1109/CIC50333.2020.00025
  28. Haque, M.F., Krishnan, R. Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence. Information Systems Frontiers, Dec 2020 (Early Access): 1-14.
    DOI: 10.1007/s10796-020-10103-7
  29. Ficke, Eric, and Shouhuai Xu. APIN: Automatic Attack Path Identification in Computer Networks. 2020 IEEE International Conference on Intelligence and Security Informatics (ISI), IEEE, Nov 2020, pp. 1-6.
    DOI:  10.1109/ISI49825.2020.9280547
  30. Al-Alaj, Abdullah, Ravi Sandhu, and Ram Krishnan. A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions. 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, Oct 2020.
    DOI:  10.1109/TPS-ISA50397.2020.00032
  31. Talegaon, Samir, and Ram Krishnan. Role-Based Access Control Models for Android. 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, Oct 2020.
    DOI:  10.1109/TPS-ISA50397.2020.00033
  32. Ali IM, Sallam KM, Moustafa N, Chakraborty R, Ryan MJ, Choo KK. An Automated Task Scheduling Model using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems. IEEE Transactions on Cloud Computing. Oct 2020 (Early Access)
    DOI:  10.1109/TCC.2020.3032386
  33. Zijian Fang, Peng Zhao, Maochao Xu, Shouhuai Xu, Taizhong Hu & Xing Fang (2022)  Statistical modeling of computer malware propagation dynamics in cyberspace, Journal of Applied Statistics, 49:4, 858-883, Oct 2020.
    DOI:  10.1080/02664763.2020.1845621
  34. Liu, Y., He, D., Obaidat, M.S., Kumar, N.,Khan, M.K., Raymond Choo, K.-K. Blockchain-based identity management systems: A review, Journal of Network and Computer Applications, Sept 2020 (Final).
    DOI:  10.1016/j.jnca.2020.102731
  35. Haddadpajouh H, Mohtadi A, Dehghantanaha A, Karimipour H, Lin X, Choo KK. A Multi-Kernel and Meta-heuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer. IEEE Internet of Things Journal. Sept 2020 (Early Access).
    DOI:  10.1109/JIOT.2020.3026660
  36. Talegaon, S., Krishnan, R. A Formal Specification of Access Control in Android with URI Permissions. Inf Syst Front, Sept 2020 (Early Access).
    DOI:  10.1007/s10796-020-10066-9
Back to Top

2019-2020

  1. Samir Talegaon and Ram Krishnan. Administrative Models for Role Based Access Control in Android. In Journal of Internet Services and Information Security, Vol. 10, Issue 3, pp 31-46, August 2020.
    DOI: 10.22667/JISIS.2020.08.31.031
  2. Naiwei Liu, Meng Yu, Wanyu Zang and Ravi Sandhu. On the Cost-Effectiveness of TrustZone Defense on ARM Platform. In Proceedings of 21st World Conference on Information Security Applications (WISA), Virtual Event, August 26-28, 2020, 12 pages.
    DOI:   10.1007/978-3-030-65299-9_16
  3. Safwa Ameer, James Benson and Ravi Sandhu. The EGRBAC Model for Smart Home IoT. In Proceedings of the 21st IEEE Conference on Information Reuse and Integration (IRI), Virtual Event, August 11-13, 2020, 8 pgs.
    DOI:  10.1109/IRI49571.2020.00076.
  4. Bao J, He D, Luo M and Choo K-K R. A Survey of Blockchain Applications in the Energy Sector. IEEE Systems Journal, July 2020.
    DOI:  10.1109/JSYST.2020.2998791
  5. Zhang, Xueling, Xiaoyin Wang, Rocky Slavin, Travis Breaux, and Jianwei Niu. How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?. 42nd ACM/IEEE International Conference on Software Engineering (ICSE), July 2020, 12 pgs.
    DOI:  10.1145/3377811.3380401
  6. Smriti Bhatt and Ravi Sandhu. ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 10-12, 2020, pages 203-212.
    DOI:  10.1145/3381991.3395618
  7. Chen B, He D, Kumar N, Wang H and Choo K-K R. A Blockchain-Based Proxy Re-Encryption with Equality Test for Vehicular Communication Systems. IEEE Transactions on Network Science and Engineering, June 2020.
    DOI:  10.1109/TNSE.2020.2999551
  8. Chen H, Pendleton M, Njilla L, Xu S. A survey on ethereum systems security: Vulnerabilities, attacks and defenses. ACM Computing Surveys:1908.04507. June 2020.
    DOI:  10.1145/3391195
  9. Lin C, He D, Huang X, Kumar N and Choo K-K R. BCPPA: A Blockchain-based Conditional Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Transactions on Intelligent Transportation Systems, June 2020.
    DOI:  10.1109/TITS.2020.3002096
  10. Q. Feng, D. He, Z. Liu, H. Wang and K. R. Choo. SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing, in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3709-3721, May 2020.
    DOI: 10.1109/TIFS.2020.2997134
  11. Lawa, Sherifdeen, and Ram Krishnan. Policy Review in Attribute Based Access Control A Policy Machine Case Study Journal of Internet Services and Information Security (JISIS) 10.2 May 2020: 14 pgs.
    DOI: 10.22667/JISIS.2020.05.31.067
  12. Zhang X, Upton O, Beebe N and Choo K-K R. IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. Forensic Science International: Digital Investigation, April 2020.
    DOI:  10.1016/j.fsidi.2020.300926
  13. Hosseini, Mitra Bokaei, Rocky Slavin, Travis Breaux, Xiaoyin Wang, and Jianwei Niu. Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types. In International Working Conference on Requirements Engineering: Foundation for Software Quality, pp. 97-115. Springer, Cham, March 2020.
    DOI:  0.1007/978-3-030-44429-7_7
  14. Mandal S, Bera B, Sutrala A K, Das A K, Choo K-K R and Park Y. Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Internet of Things Journal 7(4): 3184-3197, Jan 2020.
    DOI:  10.1109/JIOT.2020.2966242
  15. Guo C, Jia J, Jie Y, Liu C Z and Choo K-K R. Enabling Secure Cross-Modal Retrieval over Encrypted Heterogeneous IoT Databases with Collective Matrix Factorization. IEEE Internet of Things Journal 7(4): 3104-3113, Jan 2020.
    DOI:  10.1109/JIOT.2020.2964412
  16. Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu and Weidong Shi. KCRS: A Blockchain-Based Key Compromise Resilient Signature System. In International Conference on Blockchain and Trustworthy Systems.
    Dec 2019, DOI:  10.1007/978-981-15-2777-7_19
  17. Mehrnoosh Shakarami and Ravi Sandhu. Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis. In Proceedings of the 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Los Angeles, California, December 12-14, 2019, 9 pages.
    DOI:  10.1109/TPS-ISA48467.2019.00010
  18. Chakraborty Shuvra, Sandhu Ravi, Krishnan Ram. On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, Dec. 21-22, 2019.
    DOI:  10.1007/978-981-15-3817-9_9
  19. Haque, Md Farhan, and Ram Krishnan. Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence. In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, Dec. 21-22, 2019.
    DOI:  10.1007/978-981-15-3817-9_2
  20. Talegaon, Samir & Krishnan, Ram. A Formal Specification of Access Control in Android. In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, Dec. 21-22, 2019.
    DOI: 10.1007/978-981-15-3817-9_7
  21. Rodriguez, Rodney; Wang, Xiaoyin. Static Analysis of File Manipulation Scripts, IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019.
    DOI:  10.1109/PRDC47002.2019.00039
  22. Zhang, Xueling; Slavin, Rocky; Wang, Xiaoyin; Niu, Jianwei. Privacy Assurance for Android Augmented Reality Apps, IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019.
    DOI:  10.1109/PRDC47002.2019.00037
  23. Gabriel C. Fernandez and Shouhuai Xu. A Case Study on Using Deep Learning for Network Intrusion Detection. IEEE Milcom, Nov 2019
    DOI: 10.1109/MILCOM47813.2019.9020824
  24. Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, and Shouhuai Xu. Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. IEEE Milcom, Nov 2019.
    DOI:  10.1109/MILCOM47813.2019.9020860
  25. Jonathan Shahen, Jianwei Niu, and Mahesh V. Tripunitara. Cree: a Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies. IEEE Transactions on Dependable and Secure Computing, Oct 2019.
    DOI:  10.1109/TDSC.2019.2949410
  26. Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu. SDN-RBAC: An Access Control Model for SDN Controller Applications, In Proceedings of 4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), Rome, Italy, October 10-12, 2019.
    DOI: 10.1109/CCCS.2019.8888031
  27. Randy Klepetko and Ram Krishnan. Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data, In Proceedings of 4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), Rome, Italy, October 10-12, 2019.
    DOI:  10.1109/CCCS.2019.8888041
  28. D. Zou, S. Wang, S. Xu, Z. Li, and H. Jin. muVulDeePecker:  A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Sept. 2019.
    DOI: 10.1109/TDSC.2019.2942930
  29. Shaikh Mostafa, Bridgette Findley, Na Meng, and Xiaoyin Wang. SAIS: Self-Adaptive Identification of Security Bug Reports, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Sept. 2019.
    DOI: 10.1109/TDSC.2019.2939132
Back to Top

2018-2019

  1. Alkadi O S, Moustafa N, Turnbull B and Choo K-K R. An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems. IEEE Transactions on Information Forensics and Security 15: 1164-1174, Aug 2019.
    DOI:  10.1109/TIFS.2019.2936975
  2. Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan. On the Feasibility of Attribute-Based Access Control Policy Mining. In Proceedings of the 20th IEEE Conference on Information Reuse and Integration (IRI), Los Angeles, California, July 30-August 1, 2019, 8 pages.
    DOI: 10.1109/IRI.2019.00047.
  3. Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu. Online Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks. In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Charleston, SC, July 15-17, 2019, 17 pages.
    DOI:  10.1007/978-3-030-22479-0_20
  4. Mehrnoosh Shakarami and Ravi Sandhu. Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. In Proceedings 31st Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Charleston, SC, July 15-17, 2019.
    DOI:  10.1007/978-3-030-22479-0_16
  5. Banerjee S, Odelu V, Das A K, Srinivas J, Kumar N, Chattopadhyay S and Choo K-K R. A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment. IEEE Internet of Things Journal 6(5): 8739-8752, June 17, 2019, 14 pages.
    DOI:  10.1109/JIOT.2019.2923373
  6. John Heaps, Xiaoyin Wang, Travis Breaux, and Jianwei Niu. Toward Detection of Access Control Models from Source Code via Word Embedding. In SACMAT ’19: Proceedings of The 24th ACM Symposium on Access Control Models & Technologies (SACMAT), June 4-6, 2019, Toronto, Canada, 8 pages.
    DOI:  10.1145/3322431.3326329
  7. Joy Rahman and Palden Lama. Predicting the End-to-End Tail Latency of Containerized Microservices in the Cloud. In Proceedings of IEEE International Conference on Cloud Engineering (IC2E), Prague, Czech Republic, June 24-27, 2019, 10 pages>
    DOI:  10.1109/IC2E.2019.00034
  8. Mehrnoosh Shakarami and Ravi Sandhu. Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Systems. In Proceedings National Cyber Summit (NCS), Huntsville, Alabama, June 4-6, 2019.
    DOI:  10.1007/978-3-030-31239-8_19
  9. CohenMiller, A., & Pate, P. E. A model for developing interdisciplinary research theoretical frameworks. The Qualitative Report, 24(6), June 3, 2019
  10. Zongzong Lin, Wenlian Lu, Shouhuai Xu. Unified Preventive and Reactive Cyber Defense Dynamics Is Still Globally Convergent. IEEE/ACM Transactions on Networking, 27(3): 1098-1111, May 2019.
    DOI:  10.1109/TNET.2019.2912847
  11. Marahattaa A, Pirbhulal S, Zhang F, Parizid R M, Choo K-K R and Liu Z. Classification-based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center. IEEE Transactions on Cloud Computing, May 2019.
    DOI:  10.1109/TCC.2019.2918226
  12. Mengsu Chen, Felix Fischer, Na Meng, Xiaoyin Wang, Jens Grossklags. How Reliable is the Crowdsourced Knowledge of Security Implementation? Proceedings of International Conference on Software Engineering (ICSE), Montreal, Canada, May 25-31, 2019, 12 pages.
    DOI:  10.1109/ICSE.2019.00065
  13. Zhang X, Choo K-K R and Beebe N.  How do I share my IoT forensic experience with the broader community? An automated knowledge sharing IoT forensic platform. IEEE Internet of Things Journal 6(4): 6850-6861, April 22, 2019, 12 pages.
  14. Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan. A Formal Access Control Model for SE-Floodlight Controller. In Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFVSecurity), March 25-27, 2019, Richardson, TX, 6 pages.
    DOI:  10.1109/JIOT.2019.2912118
  15. Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu. Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), March 25-27, 2019, Richardson, TX, pages 61-72.
    DOI:  10.1145/3292006.3300048
  16. Hongyu Liu, Sam Silvestro Xiaoyin Wang, Lide Duan, Tongping Liu. CSOD: Context-Sensitive Overflow Detection, Proceedings of International Symposium on Code Generation and Optimization (CGO), Washington DC, Feb. 16-20, 2019, 11 pages.
    DOI:  10.1109/CGO.2019.8661198
  17. R. Garcia-Lebron, D. Myers, S. Xu, and J. Sun. Node Diversification in Complex Networks by Decentralized Coloring. Journal of Complex Networks, Dec 2018 (Early Access).
    DOI:  10.1093/comnet/cny031
  18. John Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu. Measuring Relative Accuracy of Malware Detectors in the Absence of Ground Truth. Proceedings of IEEE MILCOM Oct 2018: 450-455.
    DOI:  10.1109/MILCOM.2018.8599730
  19. Foyzul Hassan, Rodney Rodriguez, Xiaoyin Wang. RUDSEA: recommending updates of Dockerfiles via software environment analysis, Proceedings of ACM/IEEE Conference on Automated Software Engineering (ASE), Montpelier, France, Sept. 3-7, 2018, 6 pages.
    DOI:  10.1145/3238147.3240470
Back to Top

2017-2018

  1. Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang and Ravi SandhuMalware Detection in Cloud Infrastructures using Convolutional Neural Networks. In Proceedings 11th IEEE International Conference on Cloud Computing (CLOUD), San Francisco, CA, July 2-7, 2018, 8 pages.  Presentation(pdf).
    DOI:  https://DOI.org/10.1109/CLOUD.2018.00028
  2. Demir, Mevlut and Wagner, Weslyn and Dandona, Divyaansh and Prevost, John J A Comprehensive Solution for Research-Oriented Cloud Computing, International Conference on Cloud Computing, June 2018.
    DOI:  https://DOI.org/10.1007/978-3-319-94295-7
  3. Guo C, Zhuang R, Jie Y, Choo K-K R and Tang X. Secure Range Search over Encrypted Uncertain IoT Outsourced Data. IEEE Internet of Things Journal 6(2): 1520-1529, June 7, 2018, 10 pages.
    DOI:  https://DOI.org/10.1109/JIOT.2018.2845106
  4. Heaps, John; Slavin, Rocky; Wang, Xiaoyin. Toward A Code Pattern Based Vulnerability Measurement Model, ACM Symposium on Access Control Models & Technologies (SACMAT), June 2018.
    DOI:  https://DOI.org/10.1145/3205977.3208948
  5. Maanak Gupta and Ravi Sandhu. Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things. In Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies (SACMAT), Indianapolis, Indiana, June 13-15, 2018, 12 pages.  Presentation(pptx) (pdf).
    DOI:  https://DOI.org/10.1145/3205977.3205994
  6. Herrera, Joshua and Demir, Mevlut and Prevost, John and Rad, Paul. Distributed Edge Cloud R-CNN for Real Time Object Detection, World Automation Congress proceedings, June 2018.
    DOI:  https://DOI.org/10.23919/WAC.2018.8430385
  7. Janet L. Losser, Paul Caldarella, Sharon J. Black & P. Elizabeth Pate. Factors affecting service learning implementation: a comparison of novice and veteran teachers, Teachers and Teaching, 24:6, 659-672, April 25 2018.
    DOI:  10.1080/13540602.2018.1464906
  8. Vargas, V., Cristóbal, C. & Carmona, G. Competencias matemáticas a través de la implementación de actividades provocadoras de modelos. (Mathematical Competencies through the implementation of Model-eliciting activities). Educación Matemática. Vol. 30(1), p. 213-36, April, 2018.
    DOI: 10.24844/EM3001.08
  9. Maanak Gupta, Farhan Patwa and Ravi Sandhu. An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem. In Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control (ABAC), March 19-21, 2018, Tempe, Arizona.  Presentation(pptx) (pdf).
    DOI:  https://DOI.org/10.1145/3180457.3180463
  10. Asma Alshehri, James Benson, Farhan Patwa and Ravi SandhuAccess Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things, In Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), Tempe, AZ, March 19-21, 2018.  Presentation(pptx) (pdf).
    DOI:  https://DOI.org/10.1145/3176258.3176328
  11. Smriti Bhatt, Farhan Patwa and Ravi Sandhu. An Access Control Framework for Cloud-Enabled Wearable Internet of Things, In Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, October 15-17, 2017, 11 pages.  Presentation(pptx) (pdf).
    DOI:  https://DOI.org/10.1109/CIC.2017.00050
Back to Top

Posters

  1. Safwa Ameer, Ram Krishnan, Ravi Sandhu, and Maanak Gupta. Utilizing the DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems. ACM Conference on Data and Application Security and Privacy (CODASPY 2023), Charlotte, North Carolina, USA, April 24-26, 2023
  2. Rodney Rodriguez and Xiaoyin Wang, Static Analysis of File Manipulation Scripts, 24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), December 2019.
  3. Xueling Zhang, Rocky Slavin, Xiaoyin Wang, and Jianwei Niu, Privacy Assurance for Android Augmented Reality Apps, 24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), December 2019.
  4. P. Akello, A. Oluwafemi, Towards Information Security in Non-Corporate Cloud: Examining the Effect of Cognitive Load, Twenty-fifth Americas Conference on Information Systems, Cancun, Aug. 2019
  5. John Heaps, Xueling Zhang, Xiaoyin Wang, Travis Breaux, and Jianwei Niu. Toward a Reliability Measurement Framework Automated Using Deep Learning (pdf). In Hot Topics in the Science of Security Symposium (HotSoS), April 1-3, 2019, Nashville, TN, USA.
  6. Shuvra Chakraborty, Ram Krishnan, Ravi Sandhu. Attribute-Based Access Control Policy Mining Problem: Thinking Differently (pdf). Poster presented at Women in Cybersecurity, March 2019, Pittsburgh, PA.
  7. Justin Gomez, Juan Guerrero, Don Morrison, Yolanda Smith, TCEA Convention & Exposition, C-SPECC Cybersecurity and Cloud Computing Curriculum, February 2019, San Antonio, TX.
  8. John Heaps, 2019 Emerging Researchers National Conference in STEM, Toward a Pattern-Based Measurement Model for Improving Software Reliability (Presentation), February 2019, Washington DC.
  9. Mehrnoosh Shakarami, 2019 Emerging Researchers National Conference in STEM, First Place Award for Graduate Oral Presentation in Computer Science & Information Management, February 2019, Washington, DC.
  10. Mehrnoosh Shakarami, 2019 Emerging Researchers National Conference in STEM, Safety and Consistency of Subject Attributes for Attribute-Based Pre-Authorization Models (pptx), February 2019, Washington, DC.
  11. Trieu Do Van, 2019 Emerging Researchers National Conference in STEM, Predicting Number of Attacks in IPv4 based on Granger Causality and LSTM Neural Network (Poster) ( Presentation), February 2019, Washington DC.
  12. John Heaps, Rocky Slavin, Xiaoyin Wang. Toward A Code Pattern-Based Vulnerability Measurement Model. In SACMAT '18: The 23rd ACM Symposium on Access Control Models & Technologies (SACMAT), June 13-15, 2018, Indianapolis, IN, USA.
  13. Ravi Sandhu, NSF CREST Center for Security Privacy Enhanced Cloud Computing (C-SPECC) (pptx) (pdf). Poster presented at NSF INCLUDES Summit: Broadening Participation through Center-Scale Research Activities, January 8-10, 2018, Alexandria, VA.
  14. Smriti Bhatt, Farhan Patwa, and Ravi Sandhu, Access Control Models for a Multi-Cloud IoT Architecture (pdf). Poster presented at Grace Hopper Celebration, October 4-6, 2017, Orlando, FL.
Back to Top