Publications
CEROC-affiliated faculty publish in a variety of cybersecurity research areas and venues. See the yearly listings in the navigation bar.
- 2021 Publications
2021 Publications
- Sherif Abdelfattah, Mohammad Baza, M. Mahmoud, and Waleed Alasmary, "CSES: Customized searchable encryption scheme with efficient key management over medical cloud data," Internation Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- Seham Alansari, Mahmoud Badr, M.Mahmoud, and Waleed Alasmary," Efficient and privacy preserving contact tracing system for COVID-19 using blockchain," IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning
- Seham Alansari, Mahmoud Badr, M. Mahmoud, and Waleed Alasmary, "Efficient and privacy preserving contact tracing system for COVID-19 using blockchain," IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning
- Muneera Alotaibi, Mohamed Ibrahem, Waleed Alasmary, Dawood Al-Abri, and M. Mahmoud, "UBLS: User-based location selection scheme for preserving location privacy, " IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning
- Mahmoud Badr, Mohammad Baza, Sherif Abdelfattah, M. Mahmoud and Waleed Alasmary, "Blockchain-based ridesharing scheme with accurate matching and privacy preservation," International Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- M. Badr, M. Ibraheem, M.Baza, M. Mahmoud, and W. Alasmary, "Detecting electricity fraud in the net-metering system using deep learning," International Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- F.A. Bhuiyan, A. Rahman, P. Morrison, "Practitioner perception of vulnerability discovery strategies", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical System (EnCyCris 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- F. A. Bhuiyan, M.B.Sharif, A.Rahman, "Security bug report usage for software vulnerability research: a systematic mapping study", to appear in the Journal of IEEE Access, 2021
- D.B. Bose, A. Rahman, and S.I. Shamim," 'Under-reported' security defects in Kubernetes manifests", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical System (EnCyCris 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- Deepti Gupta, Smriti Bhatt, Paras Bhaat, Maanak Gupta and Ali Saman Tosun. "Game Theory Based privacy Preserving Approach for Collaborative Deep Learning in IOT" Accepted in Deep learning for security and privacy preservation in IoT, Springer
- M. Ibrahem, M. Badr, M. Mahmoud, M. Fouda, and W. Alasmary, "Counting presence privacy attack in efficient AMI Networks using interactive deep-learning," International Symposium on Networks , Computers and Communications (ISNCC, June 2021)
- T.A. Odetola, S.R. Hasan, "SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN)", accepted in IEEE International Symposium on Circuits and Systems, ISCAS' 2021
- A. Rahman and E. Farhana, "An empirical study of bugs in covid-19 software projects", to appear in the Journal of Software Engineering Research and Development (JSRED), 2021
- Ahmed Shafee, Mahmoud Nabil, M. Mahmoud, Waleed Alasmary, and Fathi Amsaad, "Detection of denial of charge (DoC) attacks in smart grid using convolutional neural networks," International Symposium on Networks, Computers and Communications (ISNCC, June 2021)
- Sai Sree Laya Chukkapalli, Shaik Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, and Mahmoud Abdelsalam. "Onotology driven AI and Access Control Systems for Smart Fisheries." Accepted in ACM SaTC-CPS Workshop 2021
- D. Ulybyshev, I. Yilmaz, B. Northern, V. Kholodilo, M. Rogers, Trustworthy data Analysis and sensor data protection in cyber-physical systems, to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021
- I.Yilmaz, K. Kapoor, A.Siraj, M. Abouyoussef, Privacy protection of grid users data with block chain and adversarial machine learning, to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021
- I.Yilmaz and A.Siraj, "A privacy-preserving energy consumption scheme for smart meters with adversarial machine learning, to appear in the Journal of IEEE Access, 2021.
- M.Alsabaan, W.Alasmary, A.Alquniah, M.Mahmoud, and M.Nabil,"A distributed surveillance system with full coverage guarantee using positive orthogonal codes," IEEE Access, 2021
- M.Baza, M.Pazos-Revilla, M.Nabil, A.Sherif, M.Mahmoud, W.Alasmary, "Privacy-preserving and collusion-resistant charging coordination schemes for smart grids," IEEE Transactions on Dependable and Secure Computing, 2021
- M.Baza, R.Amer, A.Rasheed, G.Srivastava, M.Mahmoud, W.Alasmary, "A blockchain-based energy trading scheme for the electric vehicles," in 3rd International Workshop on Security Trust and Privacy for Emerging Cyber Physical Systems (STP-CPS?21), Las Vegas, USA, 2021
- A.Rahman, M.R.Rahman, C.Parnin, L.Williams, "Security smells in Ansible and Chef scripts: a replication study", ACM Transactions on Software Engineering and Methodology (TOSEM), 30(1): 1-31, 2021
- W. A.Johnson, S.Ghafoor, S.Prowell, "Companion assisted software based remote attestation in scada networks," presented at 16th International Conference on Cyber Warfare and Security, TN, USA, Feb 25-26, 2021
- J.Lopez, J.Asiamah, R Borges-Hink, S.Sintowski, "Resilience analysis of real-time automation controllers (rtac) under cyber stress, " presented at 16th International Conference on Cyber Warfare and Security, TN, USA, Feb 25-26, 2021
- D.Ulybyshev, I.Yilmaz, B.Northern, V.Kholodilo, M.Rogers, "Trustworthy data Analysis and sensor data protection in cyber-physical systems," to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021
- F.A.Bhuiyan, M.B.Sharif, A.Rahman, "Security bug report usage for software vulnerability research: a systematic mapping study," to appear in the Journal of IEEE Access, 2021
- I.Yilmaz and A.Siraj, "A privacy-preserving energy consumption scheme for smart meters with adversarial machine learning", to appear in the Journal of IEEE Access, 2021
- A. Rahman and E. Farhana, "An empirical study of bugs in covid-19 software projects", to appear in the Journal of Software Engineering Research and Development (JSERD), 2021
- F.A.Bhuiyan, A.Rahman, P. Morrison, "Practitioner perception of vulnerability discover strategies", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- D.B. Bose, A.Rahman, and S.I. Shamim, "Under-reported' security defects in kubernetes manifests", to appear in the 2nd International Workshop on Engineering and CyberSecurity of Critical Systems (EnCyCriS 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021
- 2020 Publications
2020 Publications
- H. Mohammed*, S. R. Hassan, F. Awwad, " FusIon: On-Field Security and Privacy Preservation for IoT Edge Devices: Concurrent Defense Against Multiple types of Hardware Trojan Attacks" IEEE Access, 2020 (in press) - https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9003413
- F. Khalid*, S. R. Hasan, O. Hasan, M. Shafique "SIMCom: Statistical Sniffing of Inter-Module Communications for Runtime Hardware Trojan Detection" accepted for publication in Elsevier's Microelectronics Journal, 2020 - https://doi.org/10.1016/j.micpro.2020.103122
- Khalid*, S. R. Hasan, S. Zia*, O. Hasan, F. Awwad, M. Shafique, "MacLeR: Machine Learning-based Run-Time Hardware Trojan Detection in Resource Constrained IoT Edge Devices", IEEE Transaction on Computer-Aided Design of Integrated Circuits and Systems, 2020 (Early access: 10.1109/TCAD.2020.3012236)
- Ibrahim Yilmaz, Rahat Masum and Ambareen Siraj: “Addressing Imbalanced Data Problem with Generative Adversarial Network For Intrusion Detection”, Proceedings: IEEE International Conference on Information Reuse and Integration (IRI’2020), August 11-13, 2020.
- Md Ahsan Ayub, Andrea Continella and Ambareen Siraj: “An I/O Request Packet (IRP) Driven Effective Ransomware Detection Scheme using Artificial Neural Network”, Proceedings: IEEE International Conference on Information Reuse and Integration (IRI’2020), August 11-13, 2020.
- Sheikh Rabiul Islam, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, and Mike Rogers, Proceedings: “Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response”, AAAI Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice, Mar 23 - 25, 2020 at Palo Alto, CA.
- Susan Jeziorowski, Muhammad Ismail and Ambareen Siraj: “Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces”, Proceedings: 6th ACM International Workshop on Security and Privacy Analytics IWSPA 2020, New Orleans, LA, March 18, 2020.
- Md Ahsan Ayub, William A. Johnson, Douglas A. Talbert, and Ambareen Siraj: “Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning”, Proceedings: 54th Annual Conference on Information Sciences and Systems (CISS: Princeton IEEE Information Theory Society), Princeton, NJ, March 18-20, 2020.
- Awad, Rima Asmar, Juan Lopez Jr, and Mike Rogers. "Volatile Memory Extraction-Based Approach for Level 0-1 CPS Forensics."
- N. Martindale, M. Ismail, and D. A. Talbert, “Ensemble-Based Online Machine Learning Algorithms for Network Intrusion Detection Systems Using Streaming Data,” MDPI-Information, vol. 11, no. 6, June 2020.
- S. Jeziorowski, M. Ismail, and A. Siraj, “Towards Image-Based Dark Vendor Profiling: An Analysis of Image Metadata and Image Hashing in Dark Web Marketplaces,” The Sixth International Workshop on Security and Privacy Analytics, March 2020.
- A. Takiddin, M. Ismail, U. Zafar, and E. Serpedin, “Variational Auto-encoder-based Detection of Electricity Stealth Cyber-attacks in AMI Networks,'' European Signal Processing Conference (EUSIPCO), accepted in May 2020, to appear.
- Gupta, Deepti, Olumide Kayode, Smriti Bhatt, Maanak Gupta, and Ali Saman Tosun. "Learner's Dilemma: IoT Devices Training Strategies in Collaborative Deep Learning." arXiv preprint arXiv:2007.15215 (2020). (Accepted in IEEE WFIOT 2020)
- Gupta, Deepti, Smriti Bhatt, Maanak Gupta, Olumide Kayode, and Ali Saman Tosun. "Access control model for google cloud iot." In 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), pp. 198-208. IEEE, 2020.
- Maanak Gupta, Mahmoud Abdelsalam, and Sudip Mittal. "Enabling and enforcing social distancing measures using smart city and its infrastructures: a COVID-19 Use case." arXiv preprint arXiv:2004.09246 (2020).
- Chukkapalli, Sai Sree Laya, Aritran Piplai, Sudip Mittal, Maanak Gupta, and Anupam Joshi. "A Smart-Farming Ontology for Attribute Based Access Control." In 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020). 2020.
- Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo, and Sudip Mittal. "Security and privacy in smart farming: Challenges and opportunities." IEEE Access 8 (2020): 34564-34584.
- McDole, Andrew, Mahmoud Abdelsalam, Maanak Gupta, and Sudip Mittal. "Analyzing CNN Based Behavioral Malware Detection Techniques on Cloud IaaS." arXiv preprint arXiv:2002.06383 (2020). (Accepted in CLOUD 2020)
- Maanak Gupta, James Benson, Farhan Patwa, and Ravi Sandhu. "Secure V2V and V2I communication in intelligent transportation using cloudlets." arXiv preprint arXiv:2001.04041 (2020).
- Awaysheh, Feras M., Mamoun Alazab, Maanak Gupta, Tomás F. Pena, and José C. Cabaleiro. "Next-generation big data federation access control: A reference model." Future Generation Computer Systems (2020).
- Mithu, M. Rayhan Ahmed, Vadim Kholodilo, Rajesh Manicavasagam, Denis Ulybyshev, and Mike Rogers. "Secure Industrial Control System with Intrusion Detection." In The Thirty-Third International Flairs Conference. 2020. https://www.aaai.org/ocs/index.php/FLAIRS/FLAIRS20/paper/viewPaper/18397- published in May, 2020
- Farzana Ahamed Bhuiyan and Akond Rahman, "Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
- Farzana Ahamed Bhuiyan, Akond Rahman and Patrick Morrison, "Vulnerability Discovery Strategies Used in Software Projects", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE).
- Raunak Shakya and Akond Rahman, "A Preliminary Taxonomy of Techniques Used in Software Fuzzing", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
- Justin Murphy, Elias Brady, Shazibul Islam Shamim, and Akond Rahman, "A Curated Dataset of Security Defects in Scientific Software Projects", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
- Farzana Ahamed Bhuiyan, Raunak Shakya, and Akond Rahman, "Can We Use Software Bug Reports to Identify Software Vulnerability Strategies?", to appear in the 7th Annual Hot Topics in the Science of Security (HoTSoS) Symposium 2020.
- Md. Shazibul Islam Shamim, Farzana Ahamed Bhuiyan, and Akond Rahman, "XI Commandments of Kubernetes Security: A Systematization of Knowledge Related to Kubernetes Security Practices", in the IEEE Secure Development Conference (SecDev) 2020.
- Akond Rahman, Md. Rayhanur Rahman, Chirs Parnin, and Laurie Williams, "Security Smells in Ansible and Chef Scripts: A Replication Study", in the journal of ACM Transactions on Software Engineering and Methodology (TOSEM).
- Maanak Gupta, Feras M. Awaysheh, James Benson, Mamoun Alazab, Farhan Patwa and Ravi Sandhu, “An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles”, Accepted in IEEE Transactions on Industrial Informatics, 2020.
- Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi Sandhu and Karuna Joshi “Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem”, IEEE Access 8 (2020): 164045-164064.
- Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo and Sudip Mittal, “Security and Privacy in Smart Farming: Challenges and Opportunities.” IEEE Access 8 (2020): 34564-34584.
- Feras M. Awaysheh, Mamoun Alazab, Maanak Gupta, Tomas F. Pena and Jose Cabaleiro. “Next Generation Big Data Federation Access Control: A Reference Model”. Future Generation Computer Science, 2020.
- Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, and Ravi Sandhu. "Cyber Attacks on Smart Farming Infrastructure." In Proceedings of the IEEE International Conference on Collaboration and Internet Computing (CIC) 2020.
- Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI) 2020.
- Ulybyshev, Denis, Christian Bare, Kristen Bellisario, Vadim Kholodilo, Bradley Northern, Abhijeet Solanki, Timothy O’Donnell. ”Protecting Electronic Health Records in Transit and at Rest.” IEEE 33-rd Intl. Symposium on Computer-Based Medical Systems (CBMS), pp. 449-452, IEEE, 2020.
- Mithu, M Rayhan Ahmed, Vadim Kholodilo, Rajesh Manicavasagam, Denis Ulybyshev and Michael Rogers, “Secure Industrial Control System with Intrusion Detection”. 33-rd Intl. FLAIRS conf., AAAI, 2020.
- Yilmaz, Ibrahim, Ambareen Siraj and Denis Ulybyshev, “Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.” To appear in the 4-th Conf. on Information and Communication Technology, IEEE, 2020.
- W. Al Amiri, M. Baza, M. Mahmoud, W. Alasmary, K. Akkaya, “Towards secure smart parking system using blockchain technology,” Proc. of IEEE Consumer Communications Networking Conference (IEEE CCNC’20), Las Vegas, NV.
- M. Baza, J. Baxter, N. Lasla, M. Mahmoud, M. Abdallah, and M. Younis, “Incentivized and secure blockchain-based firmware update and dissemination for autonomous vehicles,” in Connected and Autonomous Vehicles in Smart Cities. CRC press, 2020.
- R. Paudel and W. Eberle, “SNAPSKETCH: Graph Representation Approach for Intrusion Detection in a Streaming Graph,” Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG), August 2020.
- S. R. Islam, W. Eberle, and S. Ghafoor, “Towards Quantification of Explainability in Explainable Artificial Intelligence Methods,” International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.
- P. Kandel and W. Eberle, “Node Similarity For Anomaly Detection in Attributed Graphs,” International Conference of the Florida Artificial Intelligence Research Society (FLAIRS), May 2020.
- S. R. Islam, W. Eberle, S. Ghafoor, A. Siraj, and M. Rogers, “Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response,” Proceedings of the AAAI 2020 Spring Symposium on Combining Machine Learning and Knowledge Engineering in Practice (AAAI-MAKE), March 2020.
- Piplai, Aritran, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." accepted at IEEE International Conference on Intelligence and Security Informatics (ISI) , 2020.
- Andrew McDole, Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal, and Mamoun Alazab,” Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS”, To appear in Malware Analysis using Artificial Intelligence and Deep Learning, Published by Springer, 2020.
- Andrew McDole, Maanak Gupta, and Mahmoud Abdelsalam, “Comparing Deep Learning Based Malware Detection Techniques in Cloud IaaS”, Research and Creative Inquire Day (2020), Tennessee Tech University.
- Austin Brown, Kendall Land, Andy Brown, and Maanak Gupta, “Detecting Illegitimate Use of Legitimate Credentials”, Research and Creative Inquire Day (2020), Tennessee Tech University.
- Mohammad Mehedi Hasan, Farzana Ahamed Bhuiyan, and Akond Rahman, "Testing Practices for Infrastructure as Code", to appear in the Languages and Tools for Next Generation Testing Workshop - LANGETI 2020, co-located with the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). Pre-print
- Farzana Ahamed Bhuiyan and Akond Rahman, "Characterizing Co-located Insecure Coding Patterns in Infrastructure as Code Scripts", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located with the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). Pre-print
- Akond Rahman and Farzana Ahamed Bhuiyan, "A Vision to Mitigate Bioinformatics Software Development Challenges", to appear in the 2020 Workshop on Human Centric Software Engineering and Cyber Security, co-located with the 35th IEEE/ACM International Conference on Automated Software Engineering (ASE). Pre-print
- Akond Rahman, Effat Farhana, and Laurie Williams, "The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code", in the Journal of Empirical Software Engineering (EMSE) 2020. (Journal-first at FSE 2020) Pre-print
- Akond Rahman, Effat Farhana, Chirs Parnin, and Laurie Williams, "Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts", to appear in the International Conference on Software Engineering (ICSE) 2020. Pre-print
- Yilmaz, Ibrahim, Ambareen Siraj and Denis Ulybyshev, “Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning.” To appear in the 4-th Conf. on Information and Communication Technology, IEEE, 2020.
- Maanak Gupta, Feras M. Awaysheh, James Benson, Mamoun Alazab, Farhan Patwa and Ravi Sandhu, “An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles”, Accepted in IEEE Transactions on Industrial Informatics, 2020.
- Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, and Tim Finin. "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior." In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI) 2020.
- 2019 Publications
2019 Publications
- M. Hailesellasie*, J. Nelson*, F. Khalid*, S. R. Hasan, "VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- H Mohammed*, T. A. Odetola*, S. R. Hasan, S. Stissi*, I. Garlinx*, F. Awwad, "(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- Enahoro Oriero*, S. R. Hasan, "Survey on Recent Counterfeit IC Detection Techniques and Future Research Directions", Integration, The VLSI Journal, 2019 https://www.sciencedirect.com/science/article/pii/S0167926018301664
- Alsharif, Ahmad, Mahmoud Nabil, Mohamed Mahmoud, and Mohamed Abdallah. "EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks." IEEE Access (2019).
- Shafee, Ahmed, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, and Mohamed Mahmoud. "Mimic learning to generate a shareable network intrusion detection model." arXiv preprint arXiv:1905.00919 (2019).
- Baza, Mohamed, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, and Mohamed Abdallah. "Detecting sybil attacks using proofs of work and location in vanets." arXiv preprint arXiv:1904.05845 (2019).
- Amiri, Wesam Al, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, and Kemal Akkaya. "Privacy-preserving smart parking system using blockchain and private information retrieval." arXiv preprint arXiv:1904.09703 (2019).
- M. Nabil, M. Ismail, M. M. E. A. Mahmoud, W. Alasmary and E. Serpedin, "PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks," in IEEE Access, vol. 7, pp. 96334-96348, 2019.
- Pazos-Revilla, Marbin, Ahmad Alsharif, Surya Gunukula, Terry N. Guo, Mohamed Mahmoud, and Xuemin Sherman Shen. "Privacy-Preserving Physical-Layer-Assisted Charging Authorization Scheme for EV Dynamic Charging System."
- E. M. Radi, N. Lasla, S. Bakiras and M. Mahmoud, "Privacy-Preserving Electric Vehicle Charging for Peer-to-Peer Energy Trading Ecosystems," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6.
- Alsharif, M. Nabil, S. Tonyali, H. Mohammed, M. Mahmoud and K. Akkaya, "EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3309-3321, April 2019.
- Ford, Vitaly, and Ambareen Siraj. "GenCyberCoin: an engaging, customizable, and gamified web platform for cybersecurity summer camps and classrooms." Journal of Computing Sciences in Colleges 35, no. 3 (2019): 87-96.
- Paudel, Ramesh, Peter Harlan, and William Eberle. "Detecting the onset of a network layer dos attack with a graph-based approach." In The Thirty-Second International Flairs Conference. 2019.
- Ramesh Paudel, Prajwal Kandel, and William Eberle, “Detecting Spam Tweets in Trending Topics using Graph-Based Approach,” Proceedings of the Future Technologies Conference (FTC), October 2019.
- Sheikh Rabiul Islam, William Eberle, Sid C. Bundy, and Sheikh Ghafoor, “Infusing Domain Knowledge in AI-based “black box” Models for Better Explainability with Application in Bankruptcy Prediction,” Workshop on Anomaly Detection in Finance, SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2019.
- Bhuiyan, M. B. Sharif, P. J. Tinker, W. Eberle, D. A. Talbert, S. K. Ghafoor, and L. Frey, “Gene Selection and Clustering of Breast Cancer Data,” International Conference of the Florida AI Research Society (FLAIRS), May 2019.
- Sirisha Velampalli, Lenin Mookiah, and William Eberle, “Discovering Suspicious Patterns Using a Graph Based Approach,” International Conference of the Florida AI Research Society (FLAIRS), May 2019.
- Ramesh Paudel, Peter Harlan, and William Eberle, “Detecting the Onset of a Network Layer DoS Attack with a Graph-Based Approach,” International Conference of the Florida AI Research Society (FLAIRS), May 2019.
- M. A. Ayub, Z. A. Onik, and S. Smith, “Parallelized RSA Algorithm: An Analysis with Performance Evaluation using OpenMP Library in High Performance Computing Environment,” 2019 22nd International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 2019, pp. 1-6.
- M. A. Ayub, S. Smith, and A. Siraj, “A Protocol Independent Approach in Network Covert Channel Detection,” 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), New York, NY, USA, 2019, pp. 165-170.
- Enahoro Oriero*, S. R. Hasan, "Survey on Recent Counterfeit IC Detection Techniques and Future Research Directions", Integration, The VLSI Journal, 2019 https://www.sciencedirect.com/science/article/pii/S0167926018301664
- H Mohammed*, T. A. Odetola*, S. R. Hasan, S. Stissi*, I. Garlinx*, F. Awwad, "(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- M. Hailesellasie*, J. Nelson*, F. Khalid*, S. R. Hasan, "VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
- M. Nabil, M. Ismail, M. Mahmoud, W. Alasmary, and E. Serpedin, “PPETD: Privacy-preserving electricity theft detection scheme with load monitoring and billing for AMI networks,” IEEE Access, Special issue on Security, Privacy, and Trust Management in Smart Cities, vol. 7, no. 1, pp. 96 334–96 348, Dec. 2019.
- Shafee, M. Baza, D. Talbert, M. Fouda, M. Nabil, and M. Mahmoud, “Mimic learning to generate a shareable network intrusion detection model,” Proc. IEEE Consumer Communications Networking Conference (IEEE CCNC’19), Las Vegas, USA, January 2019.
- M. Mahmoud, K. Rabieh, A. Sherif, E. Oriero, M. Ismail, E. Serpedin, and K. Qaraqe, “Privacy-preserving fine-grained data retrieval scheme for mobile social networks (MSNs),” IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 16, no. 5, pp. 871–884, Sept./Oct. 2019.
- M. Nabil, M. Ismail, M. Mahmoud, and E. Serpedin, “Deep recurrent electricity theft detection in AMI networks with evolutionary hyper-parameter tuning,” Proc. of IEEE International Conference on Internet of Things (iThings’19), Atlanta, USA, July 2019
- M. Baza, M. Nabil, M. Ismail, and M. Mahmoud, E. Serpedin, and M. Rahman, “Blockchainbased privacy-preserving charging coordination mechanism for energy storage units,” Proc. of Recent Advances on Blockchain and Its Applications Symposium of the 2nd IEEE International Conference on Blockchain (Blockchain-2019), Atlanta, USA, July 2019.
- W. Al Amiri, M. Baza, K. Banawan, M. Mahmoud, W. Alasmary, K. Akkaya, “Privacy-preserving smart parking system using blockchain and private information retrieval,” Proc. of the 2019 International Conference on Smart Applications, Communications and Networking (IEEE SmartNets), July 2019.
- M. Mahmoud, and M. Song, “MDMS: Efficient and privacy-preserving multi-dimension and multi-subset data collection for AMI networks,” IEEE Internet of Things Journal (IoT), Aug. 2019, accepted, In press.
- M. Baza, N. Lasla, M. Mahmoud, and M. Abdallah, “B-Ride: Ride sharing with privacy preservation, trust and fair payment atop public blockchain,” IEEE Transactions on Network Science and Engineering, 2019.
- M. Baza, M. Nabil, N. Lasla, K. Fidan, M. Mahmoud, M. Abdallah, “Blockchain-based firmware update scheme tailored for autonomous vehicles,” Proc. of IEEE WCNC’19, Marrakech, Morocco, April 2019.
- M. Nabil, M. Mahmoud, A. Sherif, A. Alsharif, and M. Abdulla, “Efficient privacy-preserving ride sharing organization for transferable and non-transferable services,” IEEE Transactions on Dependable and Secure Computing (TDSC), May 2019.
- M. Baza, M. Nabil, N. Bewermeier, K. Fidan, M. Mahmoud, and M. Abdallah, “Detecting sybil attacks using proofs of work and location in VANETs,” IEEE Transactions on Dependable and Secure Computing (TDSC), 2019.
- Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie Williams, and Andrew Meneely "Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition" in Proceedings of the International Symposium on Empirical Software Engineering and Measurement (ESEM) 2019, Porto de Galinhas, Brazil, Sep 2019.
- Md. Rayhanur Rahman, Akond Rahman, and Laurie Williams "Share, But Be Aware: Security Smells in Python Gists" in Proceedings of the International Conference on Software Maintenance and Evolution (ICSME) 2019, Ohio, USA, Oct 2019.
- Terry Guo, Animesh Dahal and Ambareen Siraj, “Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System Environment”, 15th International Conference on Machine Learning and Data Mining held July 13 - 18, New York, NY, 2019.
- Islam, Sheikh Rabiul, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, and Mike Rogers. "Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response." arXiv preprint arXiv:1911.09853 (2019).
- Ayub, Md Ahsan, Zishan Ahmed Onik, and S. "Parallelized RSA Algorithm: An Analysis with Performance Evaluation using OpenMP Library in High Performance Computing Environment." (2019).
- Chen, Qian, Sheikh Rabiul Islam, Henry Haswell, and Robert A. Bridges. "Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection." In International Conference on Science of Cyber Security, pp. 199-214. Springer, Cham, 2019.
- M. Nabil, M. Mahmoud, M. Ismail and E. Serpedin, "Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning," 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 2019, pp. 1002-1008.
- Pazos-Revilla, Marbin, Mohamed Baza, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, and Waleed Alasmary. "Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid." arXiv preprint arXiv:1905.04666 (2019).
- Nabil, Mahmoud, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, and Erchin Serpedin. "Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks." In Deep Learning Applications for Cyber Security, pp. 73-102. Springer, Cham, 2019.
- Yilmaz, Ibrahim, and Rahat Masum. "Expansion of cyber attack data from unbalanced datasets using generative techniques." arXiv preprint arXiv:1912.04549 (2019).
- A. Alsharif, A. Shafee, M. Nabil, M. Mahmoud and W. Alasmary, "A Multi-Authority AttributeBased Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication," 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE.
- Baza, Mohamed, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, and Kemal Akkaya. "On sharing models instead of data using mimic learning for smart health applications." arXiv preprint arXiv:1912.11210 (2019).
- M. Nabil, A. Sherif, M. Mahmoud, A. Alsharif and M. Abdallah, "Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services," in IEEE Transactions on Dependable and Secure Computing.
- Islam, Sheikh Rabiul, William Eberle, Sheikh K. Ghafoor, Sid C. Bundy, Douglas A. Talbert, and Ambareen Siraj. "Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy." arXiv preprint arXiv:1911.09858 (2019).
- R. Paudel, T. Muncy and W. Eberle, "Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 5249-5258.
- Ramesh Paudel, Prajwal Kandel, and William Eberle, “Detecting Spam Tweets in Trending Topics using Graph-Based Approach,” Proceedings of the Future Technologies Conference (FTC), October 2019.
- Sheikh Rabiul Islam, William Eberle, Sid C. Bundy, and Sheikh Ghafoor, “Infusing Domain Knowledge in AI-based “black box” Models for Better Explainability with Application in Bankruptcy Prediction,” Workshop on Anomaly Detection in Finance, SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2019.
- Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Dynamic Groups and Attribute Based Access Control for Next-Generation Smart Cars. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, Texas, March 25-27, 2019, pages 12.
- Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control." arXiv preprint arXiv:1908.08112 (2019). https://arxiv.org/abs/1908.08112
- Effat Farhana, Nasif Imtiaz, and Akond Rahman "Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software" in Proceedings of the International Conference on Software Maintenance and Evolution (ICSME) 2019, Ohio, USA, Oct 2019 Pre-print
- Akond Rahman and Laurie Williams, "Source Code Properties of Defective Infrastructure as Code Scripts", in the Journal of Information and Software Technology (IST), (Journal-first at ICSME 2019) Pre-print
- Akond Rahman, "Anti-patterns in Infrastructure as Code", PhD Dissertation, NC State University 2019. (NC State CSC and COE Distinguished Dissertation Award) Pre-print
- Kanthi Sarpatwar, Venkata Sitaramagiridharganesh Ganapavarapu, Karthikeyan Shanmugam, Akond Rahman, and Roman Vaculin, "Blockchain Enabled AI Marketplace: The Price You Pay For Trust" in Proceedings of the International Workshop of Blockchain Meets Computer Vision and Artificial Intelligence 2019, CA, USA 2019. Preprint
- Akond Rahman, Effat Farhana, and Nasif Imtiaz, "Snakes in Paradise?: Insecure Python-related Coding Practices in Stack Overflow" in Proceedings of the International Conference on Mining Software Repositories (MSR) 2019, Montreal, Canada, May 2019. Preprint
- Nasif Imtiaz, Akond Rahman, Effat Farhana, and Laurie Williams, "Challenges with Responding to Static Analysis Tool Alerts" in Proceedings of the International Conference on Mining Software Repositories (MSR) 2019, Montreal, Canada, May 2019. Preprint
- Akond Rahman and Laurie Williams, "Poster: A Bird's Eye View of Knowledge Needs Related to Penetration Testing" in Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS) 2019, Nashville, Tennessee, April 2019 Preprint
- Akond Rahman, Chirs Parnin, and Laurie Williams, "The Seven Sins: Security Smells in Infrastructure as Code Scripts", in the International Conference on Software Engineering (ICSE) 2019. (ACM SIGSOFT Distinguished Paper Award) Pre-print
- R Atat, M Ismail, Multi‐RAT D2D Communication Paradigms: Potential Benefits and Challenging Issues, Wiley 5G Ref: The Essential 5G Reference Online, 1-19
- R Atat, M Ismail, E Serpedin, Stochastic Geometry-based Model for Spatio-temporal Expanding Smart Grids, 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 457-462
- M Nabil, M Mahmoud, M Ismail, E Serpedin, Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning, 2019 International Conference on Internet of Things (iThings) and IEEE Green
- R Atat, M Ismail, MF Shaaban, E Serpedin, T Overbye, Stochastic Geometry-Based Model for Dynamic Allocation of Metering Equipment in Spatio-Temporal Expanding Power Grids, IEEE Transactions on Smart Grid 11 (3), 2080-2091
- IS Bayram, M Ismail, A Stochastic Model for Fast Charging Stations with Energy Storage Systems, 2019 IEEE Transportation Electrification Conference and Expo (ITEC), 1-5
- HB Kong, M Ismail, E Serpedin, KA Qaraqe, Energy Efficient Optimization of Base Station Density for VLC Networks, ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6
- M Ismail, IS Bayram, K Qaraqe, E Serpedin, IMA Imran, YA Sambo, ..., 5G-Enhanced Smart Grid Services, Enabling 5G Communication Systems to Support Vertical Industries, 28-102
- M Nabil, M Ismail, M Mahmoud, M Shahin, K Qaraqe, E Serpedin, Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks, Deep Learning Applications for Cyber Security, 73-102
- M Nabil, M Ismail, MMEA Mahmoud, W Alasmary, E Serpedin, PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks, IEEE Access 7, 96334-96348
- MF Shaaban, S Mohamed, M Ismail, KA Qaraqe, E Serpedin, Joint planning of smart EV charging stations and DGs in Eco-friendly remote hybrid microgrids, IEEE Transactions on Smart Grid 10 (5), 5819-5830
- M Baza, M Nabil, M Ismail, M Mahmoud, E Serpedin, MA Rahman, Blockchain-based charging coordination mechanism for smart grid energy storage units, 2019 IEEE International Conference on Blockchain (Blockchain), 504-509
- J Kong, ZY Wu, M Ismail, E Serpedin, KA Qaraqe, Q-Learning Based Two-Timescale Power Allocation for Multi-Homing Hybrid RF/VLC Networks, IEEE Wireless Communications Letters 9 (4), 443-447
- 2018 Publications
2018 Publications
- J. Shelley*, H. Mohammed*, L. Zink*, S. R. Hasan, O. Elkeelany, "Covert Communication Channel Detection in Low-Power Battery Operated IoT Devices: Leveraging Power Profiles", in IEEE South East Conference, 2018
- E. Oriero*, S. R. Hasan, "All Digital Low Power Aging Sensor for Counterfeit Detection in Integrated Circuits", in IEEE International MidWest Symposium on Circuits and Systems, 2018
- H. Mohammed*, J. Howell*, S. R. Hasan, N. Guo, O. Elkeelany, " Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup" , in IEEE International MidWest Symposium on Circuits and Systems, 2018
- S. R. Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, "A Novel Framework to Introduce Hardware Trojan Monitors Using Model Checking Based Counterexamples: Inspired by Game Theory" in IEEE International MidWest Symposium on Circuits and Systems, 2018
- M. T. Hailesellasie*, S. R. Hasan, "Intrusion Detection in PLC Based Industrial Controls Systems Using Formal Model of the System in Conjunction with Graphs", Journal of Hardware and Systems Security, Vol. 2, Issue 1, pp. 1-14, March, 2018 https://link.springer.com/article/10.1007/s41635-017-0017-y)
- F. Khalid*, S. R. Hasan, O. Hasan, F. Awwad, "Runtime Hardware Trojan Monitors Though Modeling Burst Mode Communication using Formal Verification", Integration, The VLSI Journal, Vol. 61, pp. 62-76, March 2018, https://doi.org/10.1016/j.vlsi.2017.11.003
- Lenin Mookiah, William Eberle, and M. Mondal, “Personalized News Recommendation using Graph-Based Approach”, Intelligent Data Analysis, an International Journal, Volume 22 (2018) 881–909.
- Ramesh Paudel, William Eberle, and Lawrence Holder, “Anomaly Detection of Elderly Patient Activities in Smart Homes using a Graph-Based Approach,” International Conference on Data Science (ICDATA), July 2018.
- Sheikh Rabiul Islam, William Eberle, and Sheikh Ghafoor, “Credit Default Mining Using Combined Machine Learning and Heuristic Approach,” International Conference on Data Science (ICDATA), July 2018.
- Rina Singh, Jeffrey Graves, Douglas Talbert, and William Eberle, “Prefix and Suffix Sequential Pattern Mining”, Conference on Machine Learning and Data Mining (MLDM), July, 2018.
- Ramesh Paudel, Kimberlyn Dunn, William Eberle, and Danielle Chaung, “Cognitive Health Prediction on the Elderly Using Sensor Data in Smart Homes,” International Conference of the Florida AI Research Society (FLAIRS), May 2018.
- Enahoro Oriero and Mohammad Ashiqur Rahman, Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks, the 37th International Conference for Military Communications (MILCOM), Los Angeles, USA, October 2018.
- Anshu Bhattarai, Ambareen Siraj, “Increasing Accuracy of Hand-Motion Based Continuous Authentication Systems”, Proceedings: to 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) to be held in New York, NY, November 8-10, 2018.
- Vitaly Ford, Daniel Taylor, Ambareen Siraj, “AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation”, Proceedings: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET ‘18) held in Baltimore, MD, August, 2018.
- A H M Jakaria and Mohammad Ashiqur Rahman, Formal Analysis of k-Resiliency for Collaborative UAVs, The 42nd IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Tokyo, Japan, July 2018.
- MGM Mehedi Hasan, Amarjit Datta, Mohammad A. Rahman, and Hossain Shahriar, Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services, 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA) in conjunction with the 42th IEEE COMPSAC, Tokyo, Japan, July 2018.
- Madhukrishna Priyadarsini, Padmalochan Bera, and Mohammad A. Rahman, A New Approach for Energy Efficiency in Software Defined Network, Fifth International Conference on Software Defined Systems (SDS), Barcelona, Spain, Apr 2018.
- Bahman Rashidi, Carol Fung, and Mohammad A. Rahman, A Scalable and Flexible DDoS Mitigation System Using Network Function Virtualization, IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies in association with IEEE/IFIP NOMS, Taipei, Taiwan, Apr 2018.
- Mohammad Ashiqur Rahman and Amarjit Datta, Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis, IEEE Transactions on Dependable and Secure Computing (TDSC), February 2018 (Online).
- Islam, S., Eberle, W., & Ghafoor, S. (2018). Credit Default Mining Using Combined Machine Learning and Heuristic Approach.
- Khalid, Faiq & Nanjiani, Sunil & Hasan, Syed Rafay & Hasan, Osman & Shafique, Muhammad & Awwad, Falah. (2018). Low Power Digital Clock Multipliers for Battery-Operated Internet of Things (IoT) Devices. 10.1109/ISCAS.2018.8351102.
- Mohammed, Hawzhin & Rafay Hasan, Syed & Ashiqur Rahman, Mohammad. (2018). Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks.
- Khalid, Faiq & Hasan, Syed Rafay & Hasan, Osman & Awwad, Falah. (2018). Runtime Hardware Trojan Monitors Through Modeling Burst Mode Communication Using Formal Verification. Integration the VLSI Journal. 61. 62-76. 10.1016/j.vlsi.2017.11.003.
- Hailesellasie, Muluken & Hasan, Syed Rafay & Khalid, Faiq & Awwad, Falah & Shafique, Muhammad. (2018). FPGA-Based Convolutional Neural Network Architecture with Reduced Parameter Requirements. 10.1109/ISCAS.2018.8351283.
- Fulum Mossa, Siraj & Hasan, Syed Rafay & Elkeelany, Omar. (2017). Hardware trojans in 3-D ICs due to NBTI effects and countermeasure. Integration, the VLSI Journal. 59. 10.1016/j.vlsi.2017.03.009.
- F. Khalid*, S. R. Hasan, O. Hasan, F. Awwad, "Runtime Hardware Trojan Monitors Though Modeling Burst Mode Communication using Formal Verification", Integration, The VLSI Journal, Vol. 61, pp. 62-76, March 2018, https://doi.org/10.1016/j.vlsi.2017.11.003
- M. Nabil, M. Ismail, M. Mahmoud, M. Shahin, K. Qaraqe, and E. Serpedin, “Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks,” in Deep Learning Applications for Cyber Security, Advanced Sciences and Technologies for Security Applications Series. Springer, 2018.
- M. Pazos-Revilla, A. Alsharif, S. Gunukula, N. Guo, M. Mohamed, and X. Shen, “Privacy-preserving physical-layer-assisted charging authorization scheme for EV dynamic charging system,” IEEE Transactions on Vehicular Technology, vol. 67, no. 4, pp. 3304–3318, April 2018.
- Vitaly Ford, Daniel Taylor, Ambareen Siraj, “AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation”, Proceedings: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET ‘18) held in Baltimore, MD, August, 2018.
- Enahoro Oriero and Mohammad Ashiqur Rahman, Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks, the 37th International Conference for Military Communications (MILCOM), Los Angeles, USA, October 2018.
- A H M Jakaria and Mohammad Ashiqur Rahman, Formal Analysis of k-Resiliency for Collaborative UAVs, The 42nd IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Tokyo, Japan, July 2018.
- MGM Mehedi Hasan, Amarjit Datta, Mohammad A. Rahman, and Hossain Shahriar, Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services, 13th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA) in conjunction with the 42th IEEE COMPSAC, Tokyo, Japan, July 2018.
- Mohammed, Hawzhin, Syed Rafay Hasan, and Mohammad Ashiqur Rahman. "Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks." arXiv preprint arXiv:1807.11565 (2018).
- Jakaria, A. H. M., Md Mosharaf Hossain, and Mohammad Ashiqur Rahman. "Smart Weather Forecasting Using Machine Learning: A Case Study in Tennessee." (2018).
- Oriero, Enahoro, and Mohammad Ashiqur Rahman. "Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks." MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM). IEEE, 2018.
- Hasan, Syed Rafay, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. "A Novel Framework to Introduce Hardware Trojan Monitors using Model Checking Based Counterexamples: Inspired by Game Theory." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 853-856. IEEE, 2018.
- Islam, Sheikh Rabiul, Sheikh Khaled Ghafoor, and William Eberle. "Mining Illegal Insider Trading of Stocks: A Proactive Approach." In 2018 IEEE International Conference on Big Data (Big Data), pp. 1397-1406. IEEE, 2018.
- Baza, Mohamed, Mahmoud Nabil, Muhammad Ismail, Mohamed Mahmoud, Erchin Serpedin, and Mohammad Rahman. "Blockchain-based privacy-preserving charging coordination mechanism for energy storage units." arXiv preprint arXiv:1811.02001 (2018).
- M. Nabil, A. Alsharif, A. Sherif, M. Mahmoud and M. Younis, "Efficient Multi-Keyword Ranked Search over Encrypted Data for Multi-Data-Owner Settings," 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, 2018, pp. 1-6.
- M. Nabil, M. Ismail, M. Mahmoud, M. Shahin, K. Qaraqe and E. Serpedin, "Deep Recurrent Electricity Theft Detection in AMI Networks with Random Tuning of Hyper-parameters," 2018 24th International Conference on Pattern Recognition (ICPR), Beijing, 2018, pp. 740-745.
- Hossain, Md Mosharaf, Thomas M. Hines, Sheikh K. Ghafoor, Ryan J. Marshall, Muzakhir S. Amanzholov, and Ramakrishnan Kannan. "Performance Issues of SYRK Implementations in Shared Memory Environments for Edge Cases." In 2018 21st International Conference of Computer and Information Technology (ICCIT), pp. 1-7. IEEE, 2018.
- Mohammed, Hawzhin, Jimmy Howell, Syed Rafay Hasan, Nan Guo, Faiq Khalid, and Omar Elkeelany. "Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 972-975. IEEE, 2018.
- Oriero, Enahoro, and Syed Rafay Hasan. "All Digital Low Power Aging Sensor for Counterfeit Detection in Integrated Circuits." In 2018 IEEE 61st International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 33-36. IEEE, 2018.
- Baza, Mohamed, Mahmoud Nabil, Noureddine Lasla, Kemal Fidan, Mohamed Mahmoud, and Mohamed Abdallah. "Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles." arXiv preprint arXiv:1811.05905(2018).
- Alsharif, Ahmad, Mahmoud Nabil, Samet Tonyali, Hawzhin Mohammed, Mohamed Mahmoud, and Kemal Akkaya. "EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks." IEEE Internet of Things Journal (2018).
- David W. Brown, Sheikh K. Ghafoor, and Stephen Canfield. 2018. Instruction of introductory programming course using multiple contexts. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE 2018). ACM, New York, NY, USA, 147-152. DOI: https://doi.org/10.1145/3197091.3197105
- Sherif, Ahmed, Muhammad Ismail, Marbin Pazos-Revilla, Mohamed Mahmoud, Kemal Akkaya, Erchin Serpedin, and Khalid Qaraqe. "Privacy preserving power charging coordination scheme in the smart grid." Transportation and Power Grid in Smart Cities: Communication Networks and Services (2018): 555-576.
- Sherifl, A. Alsharif, M. Mahmoud, M. Abdallah and M. Song, "Efficient Privacy-Preserving Aggregation Scheme for Data Sets," 2018 25th International Conference on Telecommunications (ICT), St. Malo, 2018, pp. 191-195.
- T. Guo and M. Mahmoud, "Performance Analysis of Physical-Layer-Based Authentication for Electric Vehicle Dynamic Charging," 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, 2018, pp. 1-7.
- Ford, Vitaly, Daniel Tyler, and Ambareen Siraj. "AMIsim: application-layer advanced metering infrastructure simulation framework for secure communication protocol performance evaluation." In 11th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 18). 2018.
- Anshu Bhattarai, Ambareen Siraj, “Increasing Accuracy of Hand-Motion Based Continuous Authentication Systems”, Proceedings: 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) held in New York, NY, November 8-10, 2018.
- Gustavo Angeles, Terry Guo, and Ambareen Siraj, “An Exploratory IoT Testbed for Cyber-Physical Systems Security Research”, Proceedings: ACM Mid-Southeast Conference, held in Gatlinburg, TN, November, 2018.
- “A Machine Learning Recommender System to Tailor Preference Assessments to Enhance Person Centered Care among Nursing Home Residents”, Gerald C. Gannod, Katherine M. Abbott, Kimberly Van Haitsma, Nathan Martindale and Alexandra Heppner, The Gerontologist (special issue on Technology and Aging), Oxford University Press, 2018. Impact Factor: 3.505, doi:10.1093/geront/gny056
- “Delivering Person Centered Care: Important Preferences for Recipients of Long-Term Services and Supports”, Katherine M. Abbott, Rachel Kendall A. Leser, PhD, Jane Straker, Gerald C. Gannod, Kimberly Van Haitsma, Journal of the American Medical Directors Association (JAMDA), 2018.
- “Establishing an Agile Mindset and Culture for Workforce Preparedness: A Baseline Study”, Gerald C. Gannod, William Eberle, Douglas Talbert, Robert A. Cooke, Kathy Hagler, Kathy Opp, and Jasmin Baniya, to appear in the Proceedings of the IEEE Frontiers in Education (FIE18) Conference, October 2018.
- “Using Machine Learning to Facilitate the Delivery of Person Centered Care in Nursing Homes”, Gerald C. Gannod, Katherine M. Abbott, Kimberly Van Haitsma, Nathan Martindale, Rachel A. Kaczka Jennings, and Chelsey Long”, accepted to appear in the Proceedings of the 31st Florida Artificial Intelligence Research Society (FLAIRS) Conference, AAAI, May 2018.
- Lenin Mookiah, William Eberle, and M. Mondal, “Personalized News Recommendation using Graph-Based Approach”, Intelligent Data Analysis, an International Journal, Volume 22 (2018) 881–909.
- 2017 Publications
2017 Publications
- F. K. Lodhi*, S. R. Hasan, O. Hasan, F. Awwad, "Power Profiling of Microcontroller's Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models", in IEEE/ACM Conference on Design Automation and Test Europe (DATE), Lausanne, Switzerland, 2017
- S. Kottler*, M. Khayamy, S. R. Hasan, O. Elkeelany, "Formal Verification of Ladder Logic programs using NuSMV", in IEEE South East Conference, 2017
- F. K. Lodhi*, S. R. Hasan, O. Hasan, F. Awwad, " Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection", in IEEE International MidWest Symposium on Circuits and Systems, 2017
- O. Adegbite*, S. R. Hasan, "A Novel Correlation Power Analysis Attack on PIC Based AES-128 without Access to Crypto-Device", in IEEE International MidWest Symposium on Circuits and Systems, 2017
- S. F. Mossa*, S. R. Hasan, O. S. A. Elkeelany, "Self-triggering Hardware Trojan: Due to NBTI Related Aging in 3-D ICs", Integration, The VLSI Journal, Vol. 58, pp. 116 - 124, June, 2017 DOI: http://dx.doi.org/10.1016/j.vlsi.2016.12.013
- S. F. Mossa*, S. R. Hasan, O. S. A. Elkeelany, "Hardware Trojans in 3-D ICs Due to NBTI Effects and Countermeasure", Integration, The VLSI Journal, Vol. 59, pp. 64 - 74, September, 2017. DOI: http://dx.doi.org/10.1016/j.vlsi.2017.03.009
- K. Rabieh, M. Mahmoud, K. Akkaya, S. Tonyali, “Scalable certificate revocation schemes for smart grid AMI networks using Bloom filters,” IEEE Transactions on Dependence and Secure Computing (TDSC), vol. 14, no. 4, pp. 420–432, 2017.
- M. Mahmoud, N. Saputro, P. Akula, and K. Akkaya, “Privacy-preserving power injection over a hybrid AMI/LTE smart grid network,” IEEE Journal on Internet of Things (IoT), vol. 4, no. 4, p. 870 – 880, August 2017.
- Sherif, K. Rabieh, M. Mahmoud, and X. Liang, “Privacy-preserving ride sharing scheme for autonomous vehicles in big data era,” IEEE Journal on Internet of Things (IoT), vol. 4, no. 2, pp. 611–618, April 2017.
- K. Rabieh, M. Mahmoud, and M. Younis, “Privacy-preserving route reporting schemes for traffic management systems,” IEEE Transactions on Vehicular Technology (TVT), vol. 66, no. 3, pp. 2703– 2713, March 2017.
- A H M Jakaria, Mohammad Ashiqur Rahman, and Carol Fung, Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design, the 13th International Conference on Network and Service Management (CNSM), Short Paper, Tokyo, Japan, November 2017.
- Amarjit Datta and Mohammad Ashiqur Rahman, Cyber Threat Analysis Framework for the Wind Energy Based Power System, ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in conjunction with the 24th ACM CCS, Dallas, Texus, USA, November 2017.
- Bata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman, Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile AdHoc Network, The 41st IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Torino, Italy, July 2017.
- Khalid, Faiq & Hasan, Syed Rafay & Hasan, Osman & Awwad, Falah. (2017). Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection. 10.1109/MWSCAS.2017.8053173.
- Mahmoud, Mohamed & Saputro, Nico & Kumar Akula, Prem & Akkaya, Kemal. (2017). Privacy-Preserving Power Injection over a Hybrid AMI/LTE Smart Grid Network. IEEE Internet of Things Journal. 4. 870-880. 10.1109/JIOT.2016.2593453.
- Saputro, Nico & Tonyalı, Samet & Akkaya, Kemal & Cebe, Mumin & Mahmoud, Mohamed. (2017). Efficient Certificate Verification for Vehicle-to-Grid Communications. 3-18.
- Hailesellasie, Muluken & Hasan, Syed Rafay. (2017). Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs. Journal of Hardware and Systems Security. 10.1007/s41635-017-0017-y.
- Hasan, Syed Rafay & Tangellapalli, Phani. (2017). Area efficient soft error tolerant RISC pipeline: Leveraging data encoding and inherent ALU redundancy. 699-702. 10.1109/MWSCAS.2017.8053019.
- Adegbite, Oluwadara & Hasan, Syed Rafay. (2017). A Novel Correlation Power Analysis Attack on PIC Based AES-128 without Access to Crypto Device. 10.1109/MWSCAS.2017.8053174.
- Kottler, Sam & Khayamy, Mehdy & Hasan, Syed Rafay & Elkeelany, Omar. (2017). Formal verification of ladder logic programs using NuSMV. 1-5. 10.1109/SECON.2017.7925390.
- Vitaly Ford, Ambareen Siraj, Eric Brown and Ada Haynes, “Capture the Flag Unplugged: An Offline Cyber Competition”, Proceedings: ACM Special Interest Group on Computer Science Education (SIGCSE), held in Seattle, WA, March 8th - 11th, 2017.
- “Agile Manifesto for Teaching and Learning”, Timothy C. Krehbiel, Peter A. Salzarulo, Michelle Cosmah, John Forren, Gerald Gannod, Douglas Havelka, Andrea Hulshult, and Jeffrey Merhout, Journal of Effective Teaching, 2017, (in press).
- Sirisha Velampalli, Lenin Mookiah, and William Eberle, “Detecting Vehicular Patterns Using a Graph-Based Approach,” IEEE Conference on Visual Analytics Science and Technology (VAST), October 2017.
- Deon Liang, Chih-Fong Tsai, An-Jie Dai, and William Eberle, “A novel classifier ensemble approach for financial distress prediction,” Knowledge and Information Systems, An International Journal, May 2017.
- Lenin Mookiah, Chris Dean, and William Eberle, “Graph-Based Anomaly Detection on Smart Grid Data,” International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Ramesh Paudel, William Eberle, and Douglas Talbert “Detection of Anomalous Activity in Diabetic Patients Using Graph-Based Approach,” International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Sirisha Velampalli and William Eberle, “Novel Graph Based Anomaly Detection Using Background Knowledge,” International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Nishith Thakkar, Lenin Mookiah, Douglas Talbert, and William Eberle, “Anomalies in Student Enrollment Using Visualization,” International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- 2016 Publications
2016 Publications
- S. R. Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, "Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors" in AsianHOST, Taipei, Taiwan, 2016
- F. K. Lodhi*, I. Abbasi , F. Khalid , O. Hasan , F. Awwad and S. R. Hasan, "A Self-learning Framework to Detect the Intruded Integrated Circuit", in IEEE international symposium of circuits and systems (ISCAS' 2016)
- S. R. Hasan, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, "Translating Circuit Behavior Manifestations of Hardware Trojans using Model Checkers into Run-time Trojan Detection Monitors" in AsianHOST, Taipei, Taiwan, 2016
- F. K. Lodhi*, I. Abbasi , F. Khalid , O. Hasan , F. Awwad and S. R. Hasan, "A Self-learning Framework to Detect the Intruded Integrated Circuit", in IEEE international symposium of circuits and systems (ISCAS' 2016)
- Vitaly Ford, Ambareen Siraj, and M. Ashiqur. Rahman, “Secure and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure Supporting Fine-grained Data Analysis”, Journal of Computer and System Sciences Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions, Volume 83, Issue 1, Pages 84-100, 2016.
- Jeffery D. Dodson and Ambareen Siraj, "Applying Fuzzy Hashing to Steganography," International Journal of Future Computer and Communication vol. 4, no. 6, pp. 421-425, 2015.
- Ambareen Siraj, Blair Taylor, Siddarth Kaza, Sheikh Ghafoor (2015), “Integrating Security in The Computer Science Curriculum,” ACM Inroads, 6(2), pp 77-81
- Brian Ledbetter, Zach Wallace, Adam Harms, Ambareen Siraj, and Laurin Buchanan, "CySCom: CyberSecurity COMics," in IEEE Intelligence and Security Informatics Conference, held in Tucson, AZ September 28-30, 2016.
- Christa Cody, Vitaly Ford, and Ambareen Siraj, “Decision Tree Learning for Fraud Detection in Consumer Energy Consumption,” in the 14th IEEE International Conference on Machine Learning and Applications, 2015.
- Khaled Rabieh, Mohamed Mahmoud, Ambareen Siraj, J. Misic, “Efficient Privacy-Preserving Chatting Scheme with Degree of Interest Verification for Vehicular Social Networks”, Proc. of IEEE Global Communications Conference, Selected Areas in Communications: Social Networks, San Diego, USA, 2015.
- Lenin Mookiah, William Eberle, and Ambareen Siraj, “Survey of Crime Analysis and Prediction,” International Conference of the Florida AI Research Society (FLAIRS), May 2015.
- “vizSlice: Visualizing Large Scale Software Slices”, Hakam Alomari, Rachel Jennings, Paulo Virote de Souza, Matthew Stephan, and Gerald C. Gannod, in Proceedings of the 2016 IEEE Working Conference on Software Visualization (VISSOFT), October 2016.
- Zdravko Markov, Ingrid Russell, and William Eberle, “Report on the 29th International Florida Artificial Intelligence Research Society Conference (FLAIRS-29),” AI Magazine, Winter 2016.
- Lenin Mookiah and William Eberle, “Co-Ranking Authors in Heterogeneous News Networks,” 2016 International Conference on Computational Science and Computational Intelligence, December 2016.
- Sirisha Velampalli and William Eberle, “Novel Application of MapReduce and Conceptual Graphs,” 2016 International Conference on Computational Science and Computational Intelligence, December 2016.
- William Eberle and Lawrence Holder, “Identifying Anomalies in Graph Streams Using Change Detection,” Conference on Knowledge Discovery and Data Mining (KDD) Mining and Learning with Graphs (MLG), August 2016.
- Lenin Mookiah, William Eberle, and Maitrayi Mondal, “Detecting Change in News Feeds Using a Context-Based Graph,” International Conference on Data Mining (DMIN), 2016.
- Dario Cruz, Doug Talbert, William Eberle, and Joseph Biernacki, “A neural network approach for predicting microstructure development in cement,” Int’l Conf. Artificial Intelligence, ICAI’16, pp. 328-334, 2016.
- M.-W. Huang, W.-C. Lin, L. Chih-Wen, C. Shih-en, C.-F. Tsai, and W. Eberle, “Data preprocessing issues for incomplete medical datasets,” Expert Systems, June 2016.