Skip Ribbon Commands
Skip to main content
Publications (Academic Year 2010-11)
  • Gleneesha Johnson, Paulo Shakarian, Neha Gupta, Ashok Agrawala. "Towards Shrink-Wrapped Security: A Logic Based Framework for the Dynamic Adaptation of Permission." Intl. Symposium on Frontiers in Ambient and Mobile Systems(FAMS-2011); accepted, 2011.
  • G. Conti and J. Caroland; "Embracing the Kobayashi Maru - Why You Should Teach Your Students to Cheat;" IEEE Security and Privacy, July/August 2011.
  • G. Conti and D. Raymond; "Leadership of Cyber Warriors: Enduring Principles and New Directions ;" Small Wars Journal, 11 July 2011.
  • G. Conti, T. Babbitt, and J. Nelson; "Hacking Competitions and Their Untapped Potential for Security Education ;" IEEE Security and Privacy, May/June 2011.
  • T. OConnor "Detecting and Responding to Data Link Layer Attacks." Submitted to SANS Reading Room for GIAC Gold Intrusion Analyst Certification, 11 Oct 2010.
  • David Aucsmith, Gregory Conti, David Dagon, Paul Judge, Val Rahmani, Chris Rouland, and Marc Sachs. "The Evolving Nature of Cyber Security Threats." Georgia Tech Security Summit, 7 October 2010.
  • Robert Fanelli, Jeffrey Henbest, Daniel Manson, Giovanni Vigna, and Gregory White. "The Value and Challenges of Cybersecurity Competitions." Department of Homeland Security / Stanford Research Institute Infosec Technology Transition Council (ITTC) Meeting, 29 September 10.
  • M. Weigand, B. Haines; "Wireless Mayhem From the Skies"; DEFCON 18 Presentation; August 2010.
  • G. Conti, S. Bratus, B. Sangster, R. Ragsdale, M. Supan, A. Lichtenberg, R. Perez and A. Shubina; "Automated Mapping of Large Binary Objects Using Primitive Fragment Type Classification; Digital Forensics Research Conference (DFRWS); August 2010.
  • R. Fanelli, T. OConnor; ?Experiences with Practice-Focused Undergraduate Security Education?, Cyber Security Experimentation and Test Workshop, USENIX Security, Aug 2010.