Close

Cybersecurity Education, Research & Outreach Center

2018 Publications

  • J. Shelley*, H. Mohammed*, L. Zink*, S. R. Hasan, O. Elkeelany, "Covert Communication Channel Detection in Low-Power Battery Operated IoT Devices: Leveraging Power Profiles", in IEEE South East Conference, 2018
  • E. Oriero*, S. R. Hasan, "All Digital Low Power Aging Sensor for Counterfeit Detection in Integrated Circuits", in IEEE International MidWest Symposium on Circuits and Systems, 2018
  • H. Mohammed*, J. Howell*, S. R. Hasan, N. Guo, O. Elkeelany, " Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup" , in IEEE International MidWest Symposium on Circuits and Systems, 2018
  • S. R. Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, "A Novel Framework to Introduce Hardware Trojan Monitors Using Model Checking Based Counterexamples: Inspired by Game Theory" in IEEE International MidWest Symposium on Circuits and Systems, 2018
  • M. T. Hailesellasie*, S. R. Hasan, "Intrusion Detection in PLC Based Industrial Controls Systems Using Formal Model of the System in Conjunction with Graphs", Journal of Hardware and Systems Security, Vol. 2, Issue 1, pp. 1-14, March, 2018 https://link.springer.com/article/10.1007/s41635-017-0017-y)
  • F. Khalid*, S. R. Hasan, O. Hasan, F. Awwad, "Runtime Hardware Trojan Monitors Though Modeling Burst Mode Communication using Formal Verification", Integration, The VLSI Journal, Vol. 61, pp. 62-76, March 2018, https://doi.org/10.1016/j.vlsi.2017.11.003 
  • Lenin Mookiah, William Eberle, and M. Mondal, “Personalized News Recommendation using Graph-Based Approach”, Intelligent Data Analysis, an International Journal, Volume 22 (2018) 881–909.
  • Ramesh Paudel, William Eberle, and Lawrence Holder, “Anomaly Detection of Elderly Patient Activities in Smart Homes using a Graph-Based Approach,” International Conference on Data Science (ICDATA), July 2018.
  • Sheikh Rabiul Islam, William Eberle, and Sheikh Ghafoor, “Credit Default Mining Using Combined Machine Learning and Heuristic Approach,” International Conference on Data Science (ICDATA), July 2018.
  • Rina Singh, Jeffrey Graves, Douglas Talbert, and William Eberle, “Prefix and Suffix Sequential Pattern Mining”, Conference on Machine Learning and Data Mining (MLDM), July, 2018.
  • Ramesh Paudel, Kimberlyn Dunn, William Eberle, and Danielle Chaung, “Cognitive Health Prediction on the Elderly Using Sensor Data in Smart Homes,” International Conference of the Florida AI Research Society (FLAIRS), May 2018.
  • Enahoro Oriero and Mohammad Ashiqur Rahman, Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks, the 37th International Conference for Military Communications (MILCOM), Los Angeles, USA, October 2018.
  • Anshu Bhattarai, Ambareen Siraj, “Increasing Accuracy of Hand-Motion Based Continuous Authentication Systems”, Proceedings: to 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)  to be held in New York, NY, November 8-10, 2018.
  • Vitaly Ford, Daniel Taylor, Ambareen Siraj, “AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation”, Proceedings: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET ‘18)  held in Baltimore, MD, August, 2018.
  • A H M Jakaria and Mohammad Ashiqur Rahman, Formal Analysis of k-Resiliency for Collaborative UAVs, The 42nd IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Tokyo, Japan, July 2018.
  • MGM Mehedi Hasan, Amarjit Datta, Mohammad A. Rahman, and Hossain Shahriar, Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services, 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA) in conjunction with the 42th IEEE COMPSAC, Tokyo, Japan, July 2018.
  • Madhukrishna Priyadarsini, Padmalochan Bera, and Mohammad A. Rahman, A New Approach for Energy Efficiency in Software Defined Network, Fifth International Conference on Software Defined Systems (SDS), Barcelona, Spain, Apr 2018.
  • Bahman Rashidi, Carol Fung, and Mohammad A. Rahman, A Scalable and Flexible DDoS Mitigation System Using Network Function Virtualization, IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies in association with IEEE/IFIP NOMS, Taipei, Taiwan, Apr 2018.
  • Mohammad Ashiqur Rahman and Amarjit Datta, Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis, IEEE Transactions on Dependable and Secure Computing (TDSC), February 2018 (Online).
  • Islam, S., Eberle, W., & Ghafoor, S. (2018). Credit Default Mining Using Combined Machine Learning and Heuristic Approach.
  • Khalid, Faiq & Nanjiani, Sunil & Hasan, Syed Rafay & Hasan, Osman & Shafique, Muhammad & Awwad, Falah. (2018). Low Power Digital Clock Multipliers for Battery-Operated Internet of Things (IoT) Devices. 10.1109/ISCAS.2018.8351102.
  • Mohammed, Hawzhin & Rafay Hasan, Syed & Ashiqur Rahman, Mohammad. (2018). Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks.
  • Khalid, Faiq & Hasan, Syed Rafay & Hasan, Osman & Awwad, Falah. (2018). Runtime Hardware Trojan Monitors Through Modeling Burst Mode Communication Using Formal Verification. Integration the VLSI Journal. 61. 62-76. 10.1016/j.vlsi.2017.11.003.
  • Hailesellasie, Muluken & Hasan, Syed Rafay & Khalid, Faiq & Awwad, Falah & Shafique, Muhammad. (2018). FPGA-Based Convolutional Neural Network Architecture with Reduced Parameter Requirements. 10.1109/ISCAS.2018.8351283.
  • Fulum Mossa, Siraj & Hasan, Syed Rafay & Elkeelany, Omar. (2017). Hardware trojans in 3-D ICs due to NBTI effects and countermeasure. Integration, the VLSI Journal. 59. 10.1016/j.vlsi.2017.03.009.
  • F. Khalid*, S. R. Hasan, O. Hasan, F. Awwad, "Runtime Hardware Trojan Monitors Though Modeling Burst Mode Communication using Formal Verification", Integration, The VLSI Journal, Vol. 61, pp. 62-76, March 2018, https://doi.org/10.1016/j.vlsi.2017.11.003 
  • M. Nabil, M. Ismail, M. Mahmoud, M. Shahin, K. Qaraqe, and E. Serpedin, “Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks,” in Deep Learning Applications for Cyber Security, Advanced Sciences and Technologies for Security Applications Series. Springer, 2018.
  • M. Pazos-Revilla, A. Alsharif, S. Gunukula, N. Guo, M. Mohamed, and X. Shen, “Privacy-preserving physical-layer-assisted charging authorization scheme for EV dynamic charging system,” IEEE Transactions on Vehicular Technology, vol. 67, no. 4, pp. 3304–3318, April 2018.
  • Vitaly Ford, Daniel Taylor, Ambareen Siraj, “AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation”, Proceedings: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET ‘18) held in Baltimore, MD, August, 2018.
  • Enahoro Oriero and Mohammad Ashiqur Rahman, Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks, the 37th International Conference for Military Communications (MILCOM), Los Angeles, USA, October 2018.
  • A H M Jakaria and Mohammad Ashiqur Rahman, Formal Analysis of k-Resiliency for Collaborative UAVs, The 42nd IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Tokyo, Japan, July 2018.
  • MGM Mehedi Hasan, Amarjit Datta, Mohammad A. Rahman, and Hossain Shahriar, Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services, 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA) in conjunction with the 42th IEEE COMPSAC, Tokyo, Japan, July 2018.
  • Mohammed, Hawzhin, Syed Rafay Hasan, and Mohammad Ashiqur Rahman. "Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks." arXiv preprint arXiv:1807.11565 (2018).
  • Jakaria, A. H. M., Md Mosharaf Hossain, and Mohammad Ashiqur Rahman. "Smart Weather Forecasting Using Machine Learning: A Case Study in Tennessee." (2018).
  • Oriero, Enahoro, and Mohammad Ashiqur Rahman. "Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks." MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM). IEEE, 2018.
  • Hasan, Syed Rafay, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. "A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 853-856. IEEE, 2018.
  • Islam, Sheikh Rabiul, Sheikh Khaled Ghafoor, and William Eberle. "Mining Illegal Insider Trading of Stocks: A Proactive Approach." In 2018 IEEE International Conference on Big Data (Big Data), pp. 1397-1406. IEEE, 2018.
  • Baza, Mohamed, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, and Mohammad Rahman. "Blockchain-based privacy-preserving charging coordination mechanism for energy storage units." arXiv preprint arXiv:1811.02001 (2018).
  • M. Nabil, A. Alsharif, A. Sherif, M. Mahmoud and M. Younis, "Efficient Multi-Keyword Ranked Search over Encrypted Data for Multi-Data-Owner Settings," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, 2018, pp. 1-6.
  • M. Nabil, M. Ismail, M. Mahmoud, M. Shahin, K. Qaraqe and E. Serpedin, "Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters," 2018 24th International Conference on Pattern Recognition (ICPR), Beijing, 2018, pp. 740-745.
  • Hossain, Md Mosharaf, Thomas M. Hines, Sheikh K. Ghafoor, Ryan J. Marshall, Muzakhir S. Amanzholov, and Ramakrishnan Kannan. "Performance Issues of SYRK Implementations in Shared Memory Environments for Edge Cases." In 2018 21st International Conference of Computer and Information Technology (ICCIT), pp. 1-7. IEEE, 2018.
  • Mohammed, Hawzhin, Jimmy Howell, Syed Rafay Hasan, Nan Guo, Faiq Khalid, and Omar Elkeelany. "Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 972-975. IEEE, 2018.
  • Oriero, Enahoro, and Syed Rafay Hasan. "All Digital Low Power Aging Sensor for Counterfeit Detection in Integrated Circuits." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 33-36. IEEE, 2018.
  • Baza, Mohamed, Mahmoud Nabil, Noureddine Lasla, Kemal Fidan, Mohamed Mahmoud, and Mohamed Abdallah. "Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles." arXiv preprint arXiv:1811.05905(2018).
  • Alsharif, Ahmad, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, and Kemal Akkaya. "EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks." IEEE Internet of Things Journal (2018).
  • David W. Brown, Sheikh K. Ghafoor, and Stephen Canfield. 2018. Instruction of introductory programming course using multiple contexts. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018). ACM, New York, NY, USA, 147-152. DOI: https://doi.org/10.1145/3197091.3197105 
  • Sherif, Ahmed, Muhammad Ismail, Marbin Pazos-Revilla, Mohamed Mahmoud, Kemal Akkaya, Erchin Serpedin, and Khalid Qaraqe. "Privacy preserving power charging coordination scheme in the smart grid." Transportation and Power Grid in Smart Cities: Communication Networks and Services (2018): 555-576.
  • Sherifl, A. Alsharif, M. Mahmoud, M. Abdallah and M. Song, "Efficient Privacy-Preserving Aggregation Scheme for Data Sets," 2018 25th International Conference on Telecommunications (ICT), St. Malo, 2018, pp. 191-195.
  • T. Guo and M. Mahmoud, "Performance Analysis of Physical-Layer-Based Authentication for Electric Vehicle Dynamic Charging," 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 2018, pp. 1-7.
  • Ford, Vitaly, Daniel Tyler, and Ambareen Siraj. "AMIsim: application-layer advanced metering infrastructure simulation framework for secure communication protocol performance evaluation." In 11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18). 2018.
  • Anshu Bhattarai, Ambareen Siraj, “Increasing Accuracy of Hand-Motion Based Continuous Authentication Systems”, Proceedings: 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) held in New York, NY, November 8-10, 2018.
  • Gustavo Angeles, Terry Guo, and Ambareen Siraj, “An Exploratory IoT Testbed for Cyber-Physical Systems Security Research”, Proceedings: ACM Mid-Southeast Conference, held in Gatlinburg, TN, November, 2018.
  • “A Machine Learning Recommender System to Tailor Preference Assessments to Enhance Person Centered Care among Nursing Home Residents”, Gerald C. Gannod, Katherine M. Abbott, Kimberly Van Haitsma, Nathan Martindale and Alexandra Heppner, The Gerontologist (special issue on Technology and Aging), Oxford University Press, 2018. Impact Factor: 3.505, doi:10.1093/geront/gny056
  • “Delivering Person Centered Care: Important Preferences for Recipients of Long-Term Services and Supports”, Katherine M. Abbott, Rachel
 Kendall A. Leser, PhD, Jane Straker, Gerald C. Gannod, Kimberly Van Haitsma, Journal of the American Medical Directors Association (JAMDA), 2018.
  • “Establishing an Agile Mindset and Culture for Workforce Preparedness: A Baseline Study”, Gerald C. Gannod, William Eberle, Douglas Talbert, Robert A. Cooke, Kathy Hagler, Kathy Opp, and Jasmin Baniya, to appear in the Proceedings of the IEEE Frontiers in Education (FIE18) Conference, October 2018.
  • “Using Machine Learning to Facilitate the Delivery of Person Centered Care in Nursing Homes”, Gerald C. Gannod, Katherine M. Abbott, Kimberly Van Haitsma, Nathan Martindale, Rachel A. Kaczka Jennings, and Chelsey Long”, accepted to appear in the Proceedings of the 31st Florida Artificial Intelligence Research Society (FLAIRS) Conference, AAAI, May 2018.
  • Lenin Mookiah, William Eberle, and M. Mondal, “Personalized News Recommendation using Graph-Based Approach”, Intelligent Data Analysis, an International Journal, Volume 22 (2018) 881–909.

Experience Tech For Yourself

Visit us to see what sets us apart.

Schedule Your Visit