COVID-19 Reporting and Information • HEERF I & II

2020 Publications

  • H. Mohammed*, S. R. Hassan, F. Awwad, " FusIon: On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple types of Hardware Trojan Attacks" IEEE Access, 2020 (in press) - https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9003413
  • F. Khalid*, S. R. Hasan, O. Hasan, M. Shafique "SIMCom: Statistical Sniffing of Inter-Module Communications for Runtime Hardware Trojan Detection" accepted for publication in Elsevier's Microelectronics Journal, 2020 - https://doi.org/10.1016/j.micpro.2020.103122
  • Khalid*, S. R. Hasan, S. Zia*, O. Hasan, F. Awwad, M. Shafique, "MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource Constrained IoT Edge Devices", IEEE Transaction on Computer-Aided Design of Integrated Circuis and Systems, 2020 (Early access: 10.1109/TCAD.2020.3012236)
  • Ibrahim Yilmaz, Rahat Masum and Ambareen Siraj: “Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection”, Proceedings: IEEE International Conference on Information Reuse and Integration (IRI’2020), August 11-13, 2020.
  • Md Ahsan Ayub, Andrea Continella and Ambareen Siraj: “An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network”, Proceedings: IEEE International Conference on Information Reuse and Integration (IRI’2020), August 11-13, 2020.
  • Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, and Mike Rogers, Proceedings: “Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response”, AAAI Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice, Mar 23 - 25, 2020 at Palo Alto, CA.
  • Susan Jeziorowski, Muhammad Ismail and Ambareen Siraj: “Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces”, Proceedings: 6th ACM International Workshop on Security and Privacy Analytics IWSPA 2020, New Orleans, LA, March 18, 2020.
  • Md Ahsan Ayub, William A. Johnson, Douglas A. Talbert, and Ambareen Siraj: “Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning”, Proceedings: 54th Annual Conference on Information Sciences and Systems (CISS: Princeton IEEE Information Theory Society), Princeton, NJ, March 18-20, 2020.
  • Awad, Rima Asmar, Juan Lopez Jr, and Mike Rogers. "Volatile Memory Extraction-Based Approach for Level 0-1 CPS Forensics."
  • N. Martindale, M. Ismail, and D. A. Talbert, “Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data,” MDPI-Information, vol. 11, no. 6, June 2020.
  • S. Jeziorowski, M. Ismail, and A. Siraj, “Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces,” The Sixth International Workshop on Security and Privacy Analytics, March 2020.
  • A. Takiddin, M. Ismail, U. Zafar, and E. Serpedin, “Variational Auto-encoder-based Detection of Electricity Stealth Cyber-attacks in AMI Networks,'' European Signal Processing Conference (EUSIPCO), accepted in May 2020, to appear.
  • Gupta, Deepti, Olumide Kayode, Smriti Bhatt, Maanak Gupta, and Ali Saman Tosun. "Learner's Dilemma: IoT Devices Training Strategies in Collaborative Deep Learning." arXiv preprint arXiv:2007.15215 (2020). (Accepted in IEEE WFIOT 2020)
  • Gupta, Deepti, Smriti Bhatt, Maanak Gupta, Olumide Kayode, and Ali Saman Tosun. "Access control model for google cloud iot." In 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp. 198-208. IEEE, 2020.
  • Maanak Gupta, Mahmoud Abdelsalam, and Sudip Mittal. "Enabling and enforcing social distancing measures using smart city and its infrastructures: a COVID-19 Use case." arXiv preprint arXiv:2004.09246 (2020).
  • Chukkapalli, Sai Sree Laya, Aritran Piplai, Sudip Mittal, Maanak Gupta, and Anupam Joshi. "A Smart-Farming Ontology for Attribute Based Access Control." In 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020). 2020.
  • Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo, and Sudip Mittal. "Security and privacy in smart farming: Challenges and opportunities." IEEE Access 8 (2020): 34564-34584.
  • McDole, Andrew, Mahmoud Abdelsalam, Maanak Gupta, and Sudip Mittal. "Analyzing CNN Based Behavioral Malware Detection Techniques on Cloud IaaS." arXiv preprint arXiv:2002.06383 (2020). (Accepted in CLOUD 2020)
  • Maanak Gupta, James Benson, Farhan Patwa, and Ravi Sandhu. "Secure V2V and V2I communication in intelligent transportation using cloudlets." arXiv preprint arXiv:2001.04041 (2020).
  • Awaysheh, Feras M., Mamoun Alazab, Maanak Gupta, Tomás F. Pena, and José C. Cabaleiro. "Next-generation big data federation access control: A reference model." Future Generation Computer Systems (2020).
  • Mithu, M. Rayhan Ahmed, Vadim Kholodilo, Rajesh Manicavasagam, Denis Ulybyshev, and Mike Rogers. "Secure Industrial Control System with Intrusion Detection." In The Thirty-Third International Flairs Conference. 2020. https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS20/paper/viewPaper/18397- published in May, 2020
  • Farzana Ahamed Bhuiyan and Akond Rahman, "Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
  • Farzana Ahamed Bhuiyan, Akond Rahman and Patrick Morrison, "Vulnerability Discovery Strategies Used in Software Projects", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
  • Raunak Shakya and Akond Rahman, "A Preliminary Taxonomy of Techniques Used in Software Fuzzing", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
  • Justin Murphy, Elias Brady, Shazibul Islam Shamim, and Akond Rahman, "A Curated Dataset of Security Defects in Scientific Software Projects", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
  • Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman, "Can We Use Software Bug Reports to Identify Software Vulnerability Strategies?", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
  • Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, and Akond Rahman, "XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices", in the IEEE Secure Development Conference (SecDev) 2020.
  • Akond Rahman, Md. Rayhanur Rahman, Chirs Parnin, and Laurie Williams, "Security Smells in Ansible and Chef Scripts: A Replication Study", in the journal of ACM Transactions on Software Engineering and Methodology (TOSEM).
  • Maanak Gupta, Feras M. Awaysheh, James Benson, Mamoun Alazab, Farhan Patwa and Ravi Sandhu, “An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles”, Accepted in IEEE Transactions on Industrial Informatics, 2020.
  • Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi Sandhu and Karuna Joshi “Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem”, IEEE Access 8 (2020): 164045-164064.
  • Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo and Sudip Mittal, “Security and Privacy in Smart Farming: Challenges and Opportunities.” IEEE Access 8 (2020): 34564-34584.
  • Feras M. Awaysheh, Mamoun Alazab, Maanak Gupta, Tomas F. Pena and Jose Cabaleiro. “Next Generation Big Data Federation Access Control: A Reference Model”. Future Generation Computer Science, 2020.
  • Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, and Ravi Sandhu. "Cyber Attacks on Smart Farming Infrastructure." In Proceedings of the IEEE International Conference on Collaboration and Internet Computing (CIC) 2020.
  • Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI) 2020.
  • Ulybyshev, Denis, Christian Bare, Kristen Bellisario, Vadim Kholodilo, Bradley Northern, Abhijeet Solanki, Timothy O’Donnell. ”Protecting Electronic Health Records in Transit and at Rest.” IEEE 33-rd Intl. Symposium on Computer-Based Medical Systems (CBMS), pp. 449-452, IEEE, 2020.
  • Mithu, M Rayhan Ahmed, Vadim Kholodilo, Rajesh Manicavasagam, Denis Ulybyshev and Michael Rogers, “Secure Industrial Control System with Intrusion Detection”. 33-rd Intl. FLAIRS conf., AAAI, 2020.
  • Yilmaz, Ibrahim, Ambareen Siraj and Denis Ulybyshev, “Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.” To appear in the 4-th Conf. on Information and Communication Technology, IEEE, 2020.
  • W. Al Amiri, M. Baza, M. Mahmoud, W. Alasmary, K. Akkaya, “Towards secure smart parking system using blockchain technology,” Proc. of IEEE Consumer Communications Networking Conference (IEEE CCNC’20), Las Vegas, NV.
  • M. Baza, J. Baxter, N. Lasla, M. Mahmoud, M. Abdallah, and M. Younis, “Incentivized and secure blockchain-based firmware update and dissemination for autonomous vehicles,” in Connected and Autonomous Vehicles in Smart Cities. CRC press, 2020.
  • R. Paudel and W. Eberle, “SNAPSKETCH: Graph Representation Approach for Intrusion Detection in a Streaming Graph,” Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG), August 2020.
  • S. R. Islam, W. Eberle, and S. Ghafoor, “Towards Quantification of Explainability in Explainable Artificial Intelligence Methods,” International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.
  • P. Kandel and W. Eberle, “Node Similarity For Anomaly Detection in Attributed Graphs,” International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.
  • S. R. Islam, W. Eberle, S. Ghafoor, A. Siraj, and M. Rogers, “Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response,” Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice (AAAI-MAKE), March 2020.
  • Piplai, Aritran, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." accepted at IEEE International Conference on Intelligence and Security Informatics (ISI) , 2020.
  • Andrew McDoleMaanak Gupta, Mahmoud Abdelsalam, Sudip Mittal, and Mamoun Alazab,” Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS”, To appear in Malware Analysis using Artificial Intelligence and Deep Learning, Published by Springer, 2020.
  • Andrew McDole, Maanak Gupta, and Mahmoud Abdelsalam, “Comparing Deep Learning Based Malware Detection Techniques in Cloud IaaS”, Research and Creative Inquire Day (2020), Tennessee Tech University.
  • Austin Brown, Kendall Land, Andy Brown, and Maanak Gupta, “Detecting Illegitimate Use of Legitimate Credentials”, Research and Creative Inquire Day (2020), Tennessee Tech University.
  • Mohammad Mehedi Hasan, Farzana Ahamed Bhuiyan, and Akond Rahman, "Testing Practices for Infrastructure as Code", to appear in the Languages and Tools for Next Generation Testing Workshop - LANGETI 2020, co-located with the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). Pre-print
  • Farzana Ahamed Bhuiyan and Akond Rahman, "Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located with the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). Pre-print
  • Akond Rahman and Farzana Ahamed Bhuiyan, "A Vision to Mitigate Bioinformatics Software Development Challenges", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located with the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). Pre-print
  • Akond Rahman, Effat Farhana, and Laurie Williams, "The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code", in the Journal of Empirical Software Engineering (EMSE) 2020. (Journal-first at FSE 2020) Pre-print
  • Akond Rahman, Effat Farhana, Chirs Parnin, and Laurie Williams, "Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts", to appear in the International Conference on Software Engineering (ICSE) 2020. Pre-print
  • Yilmaz, Ibrahim, Ambareen Siraj and Denis Ulybyshev, “Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.” To appear in the 4-th Conf. on Information and Communication Technology, IEEE, 2020.
  • Maanak Gupta, Feras M. Awaysheh, James Benson, Mamoun Alazab, Farhan Patwa and Ravi Sandhu, “An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles”, Accepted in IEEE Transactions on Industrial Informatics, 2020.
  • Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI) 2020. 

Experience Tech For Yourself

Visit us to see what sets us apart.

Schedule Your Visit