Cybersecurity Education, Research & Outreach Center
2017 Publications
- F. K. Lodhi*, S. R. Hasan, O. Hasan, F. Awwad, "Power Profiling of Microcontroller's Instruction Set for Runtime Hardware Trojans Detection without Golden Circuit Models", in IEEE/ACM Conference on Design Automation and Test Europe (DATE), Lausanne, Switzerland, 2017
- S. Kottler*, M. Khayamy, S. R. Hasan, O. Elkeelany, "Formal Verification of Ladder Logic programs using NuSMV", in IEEE South East Conference, 2017
- F. K. Lodhi*, S. R. Hasan, O. Hasan, F. Awwad, " Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection", in IEEE International MidWest Symposium on Circuits and Systems, 2017
- O. Adegbite*, S. R. Hasan, "A Novel Correlation Power Analysis Attack on PIC Based AES-128 without Access to Crypto-Device", in IEEE International MidWest Symposium on Circuits and Systems, 2017
- S. F. Mossa*, S. R. Hasan, O. S. A. Elkeelany, "Self-triggering Hardware Trojan: Due to NBTI Related Aging in 3-D ICs", Integration, The VLSI Journal, Vol. 58, pp. 116 - 124, June, 2017 DOI:
- S. F. Mossa*, S. R. Hasan, O. S. A. Elkeelany, "Hardware Trojans in 3-D ICs Due to NBTI Effects and Countermeasure", Integration, The VLSI Journal, Vol. 59, pp. 64 - 74, September, 2017. DOI:
- K. Rabieh, M. Mahmoud, K. Akkaya, S. Tonyali, 鈥淪calable certificate revocation schemes for smart grid AMI networks using Bloom filters,鈥 IEEE Transactions on Dependence and Secure Computing (TDSC), vol. 14, no. 4, pp. 420鈥432, 2017.
- M. Mahmoud, N. Saputro, P. Akula, and K. Akkaya, 鈥淧rivacy-preserving power injection over a hybrid AMI/LTE smart grid network,鈥 IEEE Journal on Internet of Things (IoT), vol. 4, no. 4, p. 870 鈥 880, August 2017.
- Sherif, K. Rabieh, M. Mahmoud, and X. Liang, 鈥淧rivacy-preserving ride sharing scheme for autonomous vehicles in big data era,鈥 IEEE Journal on Internet of Things (IoT), vol. 4, no. 2, pp. 611鈥618, April 2017.
- K. Rabieh, M. Mahmoud, and M. Younis, 鈥淧rivacy-preserving route reporting schemes for traffic management systems,鈥 IEEE Transactions on Vehicular Technology (TVT), vol. 66, no. 3, pp. 2703鈥 2713, March 2017.
- A H M Jakaria, Mohammad Ashiqur Rahman, and Carol Fung, Automated Synthesis of NFV Topology: A Security Requirement-Oriented Design, the 13th International Conference on Network and Service Management (CNSM), Short Paper, Tokyo, Japan, November 2017.
- Amarjit Datta and Mohammad Ashiqur Rahman, Cyber Threat Analysis Framework for the Wind Energy Based Power System, ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC) in conjunction with the 24th ACM CCS, Dallas, Texus, USA, November 2017.
- Bata Krishna Tripathy, Ashray Sudhir, Padmalochan Bera, Mohammad Ashiqur Rahman, Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile AdHoc Network, The 41st IEEE Computer Society International Conference on Computers, Software, and Applications (COMPSAC), Torino, Italy, July 2017.
- Khalid, Faiq & Hasan, Syed Rafay & Hasan, Osman & Awwad, Falah. (2017). Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection. 10.1109/MWSCAS.2017.8053173.
- Mahmoud, Mohamed & Saputro, Nico & Kumar Akula, Prem & Akkaya, Kemal. (2017). Privacy-Preserving Power Injection over a Hybrid AMI/LTE Smart Grid Network. IEEE Internet of Things Journal. 4. 870-880. 10.1109/JIOT.2016.2593453.
- Saputro, Nico & Tonyal谋, Samet & Akkaya, Kemal & Cebe, Mumin & Mahmoud, Mohamed. (2017). Efficient Certificate Verification for Vehicle-to-Grid Communications. 3-18.
- Hailesellasie, Muluken & Hasan, Syed Rafay. (2017). Intrusion Detection in PLC-Based Industrial Control Systems Using Formal Verification Approach in Conjunction with Graphs. Journal of Hardware and Systems Security. 10.1007/s41635-017-0017-y.
- Hasan, Syed Rafay & Tangellapalli, Phani. (2017). Area efficient soft error tolerant RISC pipeline: Leveraging data encoding and inherent ALU redundancy. 699-702. 10.1109/MWSCAS.2017.8053019.
- Adegbite, Oluwadara & Hasan, Syed Rafay. (2017). A Novel Correlation Power Analysis Attack on PIC Based AES-128 without Access to Crypto Device. 10.1109/MWSCAS.2017.8053174.
- Kottler, Sam & Khayamy, Mehdy & Hasan, Syed Rafay & Elkeelany, Omar. (2017). Formal verification of ladder logic programs using NuSMV. 1-5. 10.1109/SECON.2017.7925390.
- Vitaly Ford, Ambareen Siraj, Eric Brown and Ada Haynes, 鈥淐apture the Flag Unplugged: An Offline Cyber Competition鈥, Proceedings: ACM Special Interest Group on Computer Science Education (SIGCSE), held in Seattle, WA, March 8th - 11th, 2017.
- 鈥淎gile Manifesto for Teaching and Learning鈥, Timothy C. Krehbiel, Peter A. Salzarulo, Michelle Cosmah, John Forren, Gerald Gannod, Douglas Havelka, Andrea Hulshult, and Jeffrey Merhout, Journal of Effective Teaching, 2017, (in press).
- Sirisha Velampalli, Lenin Mookiah, and William Eberle, 鈥淒etecting Vehicular Patterns Using a Graph-Based Approach,鈥 IEEE Conference on Visual Analytics Science and Technology (VAST), October 2017.
- Deon Liang, Chih-Fong Tsai, An-Jie Dai, and William Eberle, 鈥淎 novel classifier ensemble approach for financial distress prediction,鈥 Knowledge and Information Systems, An International Journal, May 2017.
- Lenin Mookiah, Chris Dean, and William Eberle, 鈥淕raph-Based Anomaly Detection on Smart Grid Data,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Ramesh Paudel, William Eberle, and Douglas Talbert 鈥淒etection of Anomalous Activity in Diabetic Patients Using Graph-Based Approach,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Sirisha Velampalli and William Eberle, 鈥淣ovel Graph Based Anomaly Detection Using Background Knowledge,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.
- Nishith Thakkar, Lenin Mookiah, Douglas Talbert, and William Eberle, 鈥淎nomalies in Student Enrollment Using Visualization,鈥 International Conference of the Florida AI Research Society (FLAIRS), May 2017.