ITOC Supported Publications

Academic Year 2006

F. Maymi, P. Manz, “Dismounted soldier Tracking and Strike Warning”, MILCOM 2005, 17-20 October, 2005, Atlantic City, NJ
F. Maymi and P. Manz, "Dismounted Soldier Tracking and Strike Warning", presented at the 25th Army Science Conference, 2006
S. Georger, T. Morel, M. Kwinn, R. Dodge, "ANCILE – advanced warning threat indicator," 30 May 2006. Final Technical Report
F. Maymi, R. Brown, CPOF Security Assessment Technical Report, October 2005
CDT Brian Boyles, CDT Preston Lopez, and CDT Humberto Nieves, NetFires Cadet Technical Report, May 2006
CDT Michael D. Miller, CDT Michael Pitulej, CDT V. Nathan Pritchard, Voice over Internet Protocol (VoIP) Security Analysis Technical Report, May 2006
P. Curtiss, M. Miller, J. Hill, and D. Massie "Development of a Neural Network Optimizing Controller for Power Generation," 30 NOV 2005. Final Technical Report for DoE agreement DE-AI26-04NT42202.
J. M. D. Hill, D. D. Massie, and L. A. Shay, "Software Architecture of an Intelligent Power Controller for Soldier Systems, Technical Report " 2 SEP 2005 (updated 9 NOV 2005).
CDT D. Drew, CDT D. Meyer, CDT J. Parlee , Project CLADE Cadet Technical Report, May 2006
R. Dodge and J. Hill, Military Academy Attack/Defense Network Simulation NSF Technical Report, May 2006
Frank J. Mabry, John R. James, Aaron J. Ferguson, Unicode Steganographic Exploits: Maintaining Enterprise Border Security, submitted to the IEEE Security and Privacy, May 2006
Grant A. Jacoby and Nathaniel J. Davis IV, “Battery-Based Intrusion Detection: A Focus on Power for Security Assurance,” 2005 Journal of Space and Aeronautical Engineering, vol. 113, pp. 1818-1829, 2005.
Grant A. Jacoby and Nathaniel J. Davis IV, “Mobile Host-Based Intrusion Detection and Attack Identification,” IEEE Wireless Communications Journal, Fall 2006.
Grant A. Jacoby and Nathaniel J. Davis IV, “Achieving Mobile Host-Based Security,” ACM Transactions on Information and System Security Journal, 2006.
Grant A. Jacoby, Randy Marchany and Nathaniel J. Davis IV, “Using Battery Constraints Within Mobile Hosts To Improve Network Security,” IEEE Security & Privacy Magazine, September 2006.
Scot Ransbottom and Grant A. Jacoby, “Mobile Triage in Support of Effective Reporting (ER),” Military Communications Conference (MILCOM06), 23-25 October 2006
Grant A. Jacoby, Thadeus Hickman, Stuart P. Warders, Barak Griffin, Aaron Darensburg and Daniel E. Castle, “Mobile Intrusion Protection,” Proceedings from The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, June 2006.
Timothy K. Buennemeyer, Grant A. Jacoby, Randolph C. Marchany, and Joseph G. Tront, "Battery-Sensing Intrusion Protection System," Proceedings of the 7th IEEE SMC 2006 Information Assurance Workshop, June 2006.
Daniel E. Castle, Aaron Darensburg, Barak Griffin, Thadeus Hickman, Stuart P. Warders, and Grant A. Jacoby, "Gibraltar: A Mobile Host-Based Intrusion Protection System," National Conference on Undergraduate Research, April 2006.
R. C. Dodge, Chapter Title: "Configuring and Deploying Honeynet Systems," Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Idea Group Publishing, copyright 2006
R Dodge, “The Virtual Guide to Honeynet Deployments”, www.honeynet.org
CDT Ryan E. Collins and CDT Daniel C. Stewart, Voice over Internet Protocol (VoIP) Security Analysis Technical Report, May 2006
J. James, F. Mabry, L. Shay, and R. Dodge " Network Cognition – Technology Review and Overlay Requirements Analysis," 20 Feb 2006. Interim Technical Report.
S. Dehney, RFID Security Primer Technical Report, August 2006
L. J. Hoffman, R. Dodge, T Rosenberg, and D. J. Ragsdale, “Exploring a National Cybersecurity Exercise for Universities,” IEEE Security and Privacy, September 2005, page. 52-58
G. White, R. Dodge, “The National Collegiate Cyber Defense Competition,”, page 68-75, 10th Colloquium for Information Systems Security Education Washington, DC, June 5-8, 2006.
T. Augustine, R. Dodge, “Cyber Defense Exercise: Meeting Learning Objectives thru Competition,”, page 61-67, 10th Colloquium for Information Systems Security Education Washington, DC, June 5-8, 2006.
Ferguson, A., “Duty, Honor, Country and Email Attachments: The West Point Carronade” Educause Quarterly, Number 1 2005, pp 54-57
Jackson, J., Ferguson, A., Cobb, M., “Building a University-wide Automated IA Awareness Exercise: The West Point Carronade”, Frontiers in Education Conference, 19-22 October 2005, pp T2E7-10
R. Dodge, A Ferguson, "Using Phishing for User Email Security Awareness", Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), page 454-458, Karlstadt, Sweden, 22-24 May 2006
Grant Jacoby and Jean Blair, “An Undergraduate Success Story: A Computer Science and Electrical Engineering Integrative Experience,” IEEE Pervasive Computing, August 2006
Grant A. Jacoby and Luqi, “Critical Business Requirements Model and Metrics for Intranet ROI,” Journal of Electronic Commerce Research, vol. 6, no. 1, pp. 1-30, 2005.
G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. Copeland, M. Ahamad, H. Owen and C. Lee;"Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization;" IEEE Computer Graphics and Applications (CG&A), March 2006.
G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. November/December 2005.
G. Conti, "Countering Network Level Denial of Information Attacks Using Information Visualization," Ph.D. Dissertation, Georgia Institute of Technology, May 2006. (Advisor: Mustaque Ahamad)
G. Conti, J. Grizzard, M. Ahamad and H. Owen; "Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.
K. Abdullah, C. Lee, G. Conti, J. Copeland and J. Stasko; " IDS RainStorm: Visualizing IDS Alarms;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.
G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005.
S. Krasser, G. Conti, J. Grizzard, J. Gribschaw and H. Owen; "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization;" IEEE Information Assurance Workshop (IAW); June 2005.
K. Abdullah, C. Lee, G. Conti and J. Copeland; "Visualizing Network Data for Intrusion Detection;" IEEE Information Assurance Workshop (IAW); June 2005.
G. Hadjichristofi, W. Adams, N. Davis, "A Framework for Key Management in a Mobile Ad-Hoc Network," In the International Journal of Information Technology, v11(2), Pp. 31 - 61.