UW/CIAC-Affiliated Conference Papers

2017

  • Burkard C. and Lagesse, B. (2017). Analysis of Causative attacks against SVMs Learning from Data Streams. International Workshop on Security and Privacy Analytics. Read full article.
  • Kumar, G. and Lagesse, B. (2017). Limited Use Cryptographic Tokens in Securing Ephemeral Cloud Servers. International Conference on Information Systems Security and Privacy (ICISSP). Read full article.
  • Ogunnaike, R. and Lagesse, B. (2017).  Toward Consumer-Friendly Security in Smart Environments.  IEEE Workshop on Security, Privacy, and Trust in the Internet of Things. Read full article.
     

2016

  • Dupuis, M., Crossler, R., & Endicott-Popovsky, B. (2016). Measuring the Human Factor in Information Security and Privacy. In The 49th Hawaii International Conference on System Sciences (HICSS). Kauai, Hawaii: IEEE. Read full article.
  • Lagesse, B., Burkard, C. and Perez, J. (2016). Securing Pervasive Systems Against Adversarial Machine Learning. IEEE Pervasive Computing and Communications Conference Work in Progress. Read full article.
  • Liu, Z., Clark, A., Lee, P., Bushnell, L., Kirschen, D. and Poovendran, R. (Dec 2016). MinGen: Minimal Generator Set Selection for Small Signal Stability in Power Systems: A Submodular Framework. In IEEE Conference on Decision and Control (CDC), Las Vegas.
  • Liu, Z., Clark, A., Lee, P., Bushnell, L., Kirschen, D. and Poovendran, R. (April 2016). Towards Scalable Voltage Control in Smart Grid. In International Conference on Cyber-Physical Systems (ICCPS), IEEE/ACM CPS Week, Vienna, Austria. Read full article.

 

2015

  • Ambrosin, M., Conti, M., Gaspari F.D. and Poovendran, R. (2015 November). LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking. Presented in IEEE/ACM Transactions on Networking. View slides.
  • Clark, A. Sun, K, Bushnell, L. and Poovendra, R. (2015) A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense. In IEEE Conference on Game and Decision Theory for Security (GameSec), London, UK. Read full article.
  • Kuntze, N. Rudolph, R., Boggess, M., Brisbois, B. and Endicott-Popovsky, B. (2015). Security vs. Safety: Why People Die in Spite of Good Safety. IEEE Integrated Communications, Navigation and Surveillance Conference (ICNS) April 21-23, 2015. Herndon, Virginia.  Read full article.
  • Lee, P., Clark, A., Alomair, B., Bushnell, L. and Poovendran, R. (Dec 2016). Distributed Adaptive Patching Strategies against Malware Propagation: A Passivity Approach. In IEEE Conference on Decision and Control (CDC), Las Vegas. Read full article.
  • Morgan, S. and Lagesse, B. (2015). Dynamically Generated Virtual Systems for Cyber Security Education. International Conference on Cloud Security and Management. Read full article.
  • Thamilarasu, G. (July 2015). Genetic Algorithm Based Intrusion Detection System for Wireless Body Area Networks, at Third International Workshop on Security and Forensics in Communication Systems, in conjunction with The Twentieth IEEE Symposium on Computers and Communications. Read full article.
  • Thamilarasu, G. and Ma, Z. (June 2015). Autonomous Mobile Agent based Intrusion Detection Framework in Wireless Body Area Networks, at IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. Read full article.

 

2014

  • Chung, S. Wu, Y., Escrig, T. and Endicott-Popovsky, B. (2014 March) Toward software assurance: Infusing a threat modeling methodology into beginning level programming courses. Paper to be presented at CCSC: SW 2014 Conference, California State University, Northridge, Los Angeles, California. 
  • Dupuis, M. and Endicott-Popovsky, B. (2014 March). The art of cyber warfare: An exploration of classic military strategies and the threat against home users. In Proceedings of the 9th International Conference on Information Warfare and Security ICIW, Purdue University, West Lafayette, Indiana: Academic Publishing Limited.
  • Kuntze, N., Rudolph, C., Leivesley, S., Manz, D. and Endicott-Popovsky, B. (July 2014). Resilient core networks for energy distribution. Paper presented at the IEEE Power & Energy Society General Meeting (PESGM2014) 27-31 July, Washington, D.C.  Read full article.
  • Kuntze, N. Rudolph, C., Schilling, H., Alva, A., Brisbois, B. and Endicott-Popovsky, B. (September 2014). Seizure of digital data and “selective suppression” of digital evidence. Paper presented at 8th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) at IEEE/International Conference on Digital Forensics and Cyber Crime, 18-20 September, New Haven, Connecticut. pp.1-6.  Read full article.
  • Lee, P., Saleh, O., Alomair, B., Bushnell, L. and Poovendran, R. (April 2014). Graph-Based Verification and Misbehavior Detection in Multi-Agent Networks. In the 3rd ACM Conference on High Confidence Networked Systems (HiCONS), Berlin, Germany. Read full article.
  • Moon, S., Chung, S. and Endicott-Popovsky, B. (2014) Monitoring Insider Attack in Dynamic Database Systems Using Multiple-Criteria Query Statement Probabilities. International Conference on Cloud Security Management. University of Washington Tacoma. Read full article.

 

2013

  • Crosby, M., Endicott-Popovsky, B. and Heller, R. (2013 June). From sea to shining sea: Bringing Federal cybersecurity issues into classrooms outside the Beltway. HUIC Education and Technology: Math and Engineering Technology Conference 9-12 June, Honolulu, Hawaii. Conference booklet.
  • Dupuis, M., Endicott-Popovsky, B. and Crossler, R. (2013 October). An analysis of the use of Amazon’s Mechanical Turk for survey research in the Cloud. Paper presented at the 1st Annual International Conference on Cloud Security Management, Seattle, Washington. pp. 10-19. View full article.
  • Endicott-Popovsky, B. Hinrichs, R. and Frincke, D. (2013 July). Leveraging 2nd Life as a communications media: An effective tool for security awareness training. Paper presented at 2013 IEEE Professional Communications Society. Vancouver, B.C. Read full article.
  • Endicott-Popovsky, B. and Horowitz, D. (2013 February). Unintended consequences: Digital forensics literacy and the legal system. Paper presented at 65th Annual Scientific Meeting of the American Academy of Forensic Scientists, Washington, D.C. Read full article.
  • Fink, G., Best, D. Manz, D., Popovsky, V. and Endicott-Popovsky, B. (2013 July). Gamification for measuring cyber security awareness. Paper presented at Human Computer Interface (HCI) Conference, Las Vegas, Nevada. Published in Foundations of Augmented Cognition Lecture Notes in Computer Science Volume 8027 Berlin, Germany, Springer, pp. 656-665. Read full article.
  • Kuntze, N., Rudolph, C., Schilling, H., Alva, A., Bribois, B. and Endicott-Popovsky, B. (2013 November). Seizure of digital data and “selective suppression” of digital evidence. Paper presented at 8th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), University of Hong Kong, Hong Kong. Read full article.
  • Schweiger, M., Chung, S., and Endicott-Popovsky, B. (2013 October). Malware analysis on the Cloud: Increased performance, reliability and flexibility. Paper presented at the 1st Annual International Conference on Cloud Security Management, Seattle, Washington. pp. 127-135.  Read full article.
     

2012

  • Alva, A., David, S. and Endicott-Popovsky, B. (2012 September). Forensic Barriers: Legal Implications of Storing Information in the Cloud. Paper presented at 7th International Workshop on Systematic Approaches to Digital Forensic Engineering of UNESCO The Memory of the World in the Digital Age: Digitization and Preservation Conference, Vancouver, BC. Read full article.
  • Chung, S., Chung, S., Escrig, T., Bai, Y. and Endicott-Popovsky, B. (2012 December). 2TAC: Distributed access control architecture for “Bring Your Own Device” security. Paper presented at Redefining and Integrating Security Engineering (RISE) Workshop, Washington, D.C. Read full article.
  • Dupuis, M., Crossler, R. and Endicott-Popovsky, B. (2012 September). The information security behavior of home users: Exploring a user's risk tolerance in the framework of protection motivation theory. Paper presented at Dewald Roode Information Security Workshop organized by IFIP 8.11/11.13 Working Group. Provo, Utah. Read full article.
  • Kim, W., Moon, C., Chung, S., Escrig, T. and Endicott-Popovsky, B. (2012 December). Scalable and reusable attack aware software, Workshop on Redefining and Integrating Security Engineering (RISE). In Proceedings of the 2012 ASE/IEEE International Conference on Cybersecurity, Washington, D.C. Read full article.
  • Kuntze, N., Rudolph, C., Alva, A., Endicott-Popovsky, B., Christiansen, J. and Kemmerich, T. (January 2012) On the Creation of Reliable Digital Evidence. Paper presented at Eighth Annual IFIP WG 11.9 International Conference. Read full article.
  • Smith, S. and Endicott-Popovsky, B. (2012 April). Folk wisdom as forward thinking: Applying the ideas of our past for a more resilient future. Paper presented at The Critical Infrastructure Symposium, Arlington, Virginia. Read full article.
     

2011

  • Hansel, L., Chung, S. and Endicott-Popovsky, B. (2011 June). Software reengineering approach to teaching secure coding practices. In Proceedings of the 15th Colloquium for Information Systems Security Education, Fairborn, Ohio. Stoughton, WI: The Printing House Inc., pp. 29-36. Read full article.
  • Horey, J. and Lagesse, B. (2011). Latency Minimizing Tasking for Information Processing Systems. International Workshop on Knowledge Discovery Using Cloud and Distributed Computing Platforms. Read full article.
  • Malviya, A., Fink, G., Sego, L. and Endicott-Popovsky, B. (2011 April). Situational awareness as a measure of performance in cyber security collaborative work. In proceedings of IEEE 8th International Conference on Information Technology: New Generation (ITNG), Las Vegas, Nevada. Los Alamitos, CA: IEEE Publishing, pp. 937-942. Read full article.
  • Shue, C. and Lagesse, B. (2011) Embracing the Cloud for Better Cyber Security. Middleware Support for Pervasive Computing Workshop. Read full article.
     

2010

  • Chung, S. and Endicott-Popovsky, B. (2010 June). Software reengineering based security teaching. In Proceedings of the 7th Annual International Conference on International Conference on Cybernetics and Information Technologies, Systems and Applications: CITSA 2010 in the context of the 3rd International Multi-Conference on Engineering and Technological Innovation: IMETI 2010, Orlando, Florida. pp.1-7. Read full article.
  • Duranti, L. and Endicott-Popovsky, B. (2010 May). Digital records forensics: An interdisciplinary program for forensic readiness. Paper presented at Conference on Digital Forensics, Security and Law, St. Paul, Minnesota. Read full article.
  • Duranti, L. and Endicott-Popovsky, B. (2010 September). Digital records forensics: An interdisciplinary program for forensic readiness. Paper presented at 2nd Annual ACM Northeast Digital Forensics (Nefx). Georgetown University, Virginia. Read full article.
  • Lagesse, B., Kumar, M. and Wright, B. (2010). ReSCo: A Middleware Component for Reliable Service Composition in Pervasive Systems. Middleware Support for Pervasive Computing Workshop. Read full article.
  • Lagesse, B. (2010).  Privacy Challenges for Wireless Medical Devices. USENIX Workshop on Health, Security, and Privacy. Read full article.
  • Lagesse, B., Kumar, M., Lazarescu, M. and Venkatesh, S. (2010). Augmenting Trust Mechanisms with Social Networks. ACM Cyber Security and Information Intelligence Workshop. Read full article.
  • Narvaez, J., Aval, C., Endicott-Popovsky, B., Seifert, C., Malviya, A. and Nordwall, D. (2010 May). Assessment of virtualization as a sensor technique. In Proceedings of 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, in conjunction with the IEEE Security and Privacy Symposium, Oakland, California. Los Alamitos, CA: IEEE Publishing, pp.61-65. Read full article.
  • Narvaez, J., Endicott-Popovsky, B., Seifert, C., Aval, C. and Frincke, D. (2010 January). Drive-by downloads. In Proceedings of Hawaii International Conference on System Sciences (43), Koloa, Kauai, Hawaii. Los Alamitos, CA: IEEE Publishing, pp.1-10. Read full article.
  • Simpson, J. and Endicott-Popovsky, B. (2010 June). A systematic approach to information systems security education. In Proceedings of 14th Colloquium for Information Systems Security Education, Baltimore, Maryland. Stoughton, WI: The Printing House Inc., pp.173-179. Read full article.
  • Simpson, J. and Endicott-Popovsky, B. (2010 July). System security capability assessment model development and application. Paper presented at 20th Anniversary INCOSE International Symposium (INCOSE), Chicago, Illinois. (CD-ID535). Read full article
     

2009 and Prior

  • Aval, C., Seifert, C., Welch, I., Komisarczuk, P. and Endicott-Popovsky, B. (2008 October). Identification of malicious web pages through analysis of underlying DNS and web server relationships. In Proceedings of 4th IEEE LCN Workshop on Network Security, Montreal, Canada. Los Alamitos, CA: IEEE Publishing, pp. 935-941. Read full article.
  • Balasubramanian, V., Thamilarasu, G. and Sridhar, R. (June 2007). Security Solution For Data Integrity In Wireless Biosensor Networks, Specialized Ad Hoc Networks and Systems, in conjunction with ICDCS. Read full article.
  • Endicott-Popovsky, B., Fluckiger, J. and Frincke, D. (2007 April). Establishing tap reliability in expert witness testimony: Using scenarios to identify calibration need. In Proceedings of 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, Washington. Los Alamitos, CA: IEEE Publishing, pp.131-146. Read full article.
  • Endicott-Popovsky, B. and Frincke, D. (2004 March). A case study in rapid introduction of a computer security track into a software engineering curriculum. In Proceedings of IEEE Computer Society Press 17th Conference on Software Engineering Education and Training. Norfolk, Virginia. Los Alamitos, CA: IEEE Publishing, pp. 118-123. Read full article.
  • Endicott-Popovsky, B.E., Frincke, D., Dittrich, D., Phillips, A., Chavez, J.W., Gibbons, J., Nguyen, D., Seifert, C., Shephard, A., Abate, C. and Loveland, S. (2004 June). The Manuka Project. In Proceedings of 5th IEEE Systems, Man and Cybernetics Information Assurance Workshop. United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp. 314-320. Read full article.
  • Endicott-Popovsky, B. and Frincke, D. (2007 June). The observability calibration test development framework. In Proceedings of 8th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp. 61-66.  Read full article.
  • Endicott-Popovsky, B., Orton, I., Bailey, K. and Frincke, D. (2005 June). Community security awareness training. In Proceedings of 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop, United States Military Academy, West Point, New York. Los Alamitos, CA: IEEE Publishing, pp.373-379. Read full article.
  • Kalasapur, S., Senthivel, K., Lagesse, B. and Kumar, M. (2006). Just-in-time Service Composition in Pervasive Environments, IEEE Pervasive Computing and Communications Conference. Read full article.
  • Krishnamurthy, S., Thamilarasu, G. and Bauckhage, C. (August 2009). MALADY: A Machine Learning-based Autonomous Decision-Making System for Sensor Networks, International Conference on Embedded and Ubiquitous Computing (EUC-09), Vancouver, Canada. Read full article.
  • Lagesse, B. (2006). A Game-Theoretical Model for Task Assignment in Project Management. IEEE International Conference on Management of Innovation and Technology. Read full article.
  • Lagesse, B., Kumar, M., Mazzola Paluska, J. and Wright, M. (2009). DTT: A Distributed Trust Toolkit for Pervasive Systems. IEEE Pervasive Computing and Communications Conference. Read full article.
  • Lagesse, B., Kumar, M. and Wright, M. (2008). AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems. IEEE Peer to Peer Computing Conference. Read full article.
  • Lagesse, B. and Kumar, M. (2008). A Novel Utility and Game-Theoretic Based Model for Mobile P2P Systems. Mobile Peer to Peer Workshop. Read full article.
  • Lagesse, B. and Kumar, M. (2007). UBCA: Utility-Based Clustering Architecture for Peer-to-Peer Systems. International Conference on Distributed Computing Systems: Workshop on Mobile and Distributed Computing. Read full article.
  • Taylor, C., Endicott-Popovsky, B., and Phillips, A. (2007 April). Forensics education: Assessment and measures of excellence. In Proceedings of 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering, Seattle, Washington. Los Alamitos, CA: IEEE Publishing, pp.155-165. Read full article.
  • Thamilarasu, G., Balasubramanian, A., Mishra, S. and Sridhar, R. (November 2005). A Cross-Layer based Intrusion Detection System for Wireless Ad Hoc Networks. In International IEEE International Conference on Mobile Ad-hoc and Sensor Systems Conference (MASS 2005), Washington, DC. Read full article.
  • Thamilarasu, G., Mishra, S. and Sridhar, R. (October 2006). A Cross-layer approach to Detect Jamming Attacks in Wireless Ad Hoc Networks, IEEE Military Communications Conference 2006, Washington, D.C. Read full article.
  • Thamilarasu, G. and Sridhar, R. (August 2009). Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks, International Conference on Computer Communications and Networks, ICCCN, San Fransico.  Read full article.
  • Thamilarasu, G. and Sridhar, R. (January 2009). XLSEC - A Distributed Cross-layer Framework for Security in Wireless Sensor Networks, IEEE Consumer Communications and Networking Conference, (CCNC) Las Vegas. Read full article.
  • Thamilarasu, G. and Sridhar, R. (November 2008). Intrusion Detection in RFID Systems, IEEE Military Communications Conference, 2008, San Diego.  Read full article.
  • Thamilarasu, G. and Sridhar, R. (October 2007).  Exploring Cross-layer Techniques for Security Challenges and Opportunities in Wireless Networks, MILCOM 2007, Orlando, FL. Read full article.
  • Thamilarasu, G. and Sridhar, R. (June 2007). Toward Building a Multi-level Robust Detection Architecture for Distributed Mobile Networks, 27th International Conference Distributed Computing Systems Workshops, ICDCS 2007. Read full article.
     

 

Next Page: Recommended Resources 

Next page:

Recommended Resources 
Government, non-profits, and industry.