CFIC Publications

Selected Publications

2020

  • Hughes, N., Varol, C. "The Critical Need for Tool Validation Before Using Malware Scanners in Digital Forensics." Accepted to be published at 15th International Conference on Cyber Warfare and Security (ICCWS 2020). 2020.
  • Avinash Kumar, William Glisson, Ryan Benton. "Network Attack Detection using an Unsupervised Machine Learning Algorithm." Proceedings of the 53rd Hawaii International Conference on System Sciences. 2020.
  • Bronwyn Hodges, Jeffrey Mcdonald, William Glisson, Mike Jacobs, Maureen Van Devender, Harold Pardue. "Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices." Proceedings of the 53rd Hawaii International Conference on System Sciences. 2020.
  • William Glisson, George Grispos, Kim-Kwang Raymond Choo. "Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics." Proceedings of the 53rd Hawaii International Conference on System Sciences. 2020.
  • Thanh Nguyen, Jeffrey Mcdonald, William Glisson, Todd Andel. "Detecting Repackaged Android Applications Using Perceptual Hashing." Proceedings of the 53rd Hawaii International Conference on System Sciences. 2019.

2019

  • Paligu, F., Kumar, A., Cho, H., Varol, C. "BrowStExPlus: A Tool to Aggregate Indexed DB Artifacts for Forensic Analysis." Journal of Forensic Sciences (JFS) 64.5 (2019).
  • Saliah-Hassane, H., Shockey, J., Varol, C., et al. "IEEE Std. 1876—Networked Smart Learning Objects for Online Laboratories." IEEE Standards Association. May 30, 2019. Available online.
  • Garcia, J., Varol, C. "SmartThings Event Export using SmartApps." 7th International Symposium on Digital Forensics and Security (ISDFS 2019). 2019.
  • Jay Holdsworth, William Bradley Glisson, Kim-Kwang Raymond Choo. "Medical device vulnerability mitigation effort gap analysis taxonomy." Smart Health 12 (2019): 82-98.
  • Stacy Miller, William Bradley Glisson, Matt Campbell, Scott Sittig. "Risk Analysis of Residual Protected Health Information of Android Telehealth Apps." AMCIS 2019 Proceedings. 2019.
  • Watts, Thomas, et al. "Insight from a Docker Container Introspection." Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019.
  • Miller, Daniel Bradford, et al. "Investigating 3D Printer Residual Data." Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019.
  • Grispos, George, William Bradley Glisson and Tim Storer. "How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations." Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019.
  • Grispos, George, William Bradley Glisson and Peter Cooper. "A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices." Proceedings of the 52nd Hawaii International Conference on System Sciences. 2019.

2018

  • Kim-Kwang Raymond Choo, Matt Bishop, William Bradley Glisson, Kara L. Nance. "Internet and cloud-of-things cybersecurity research challenges and advances." Computers & Security 74 (2018): 275-276.
  • Daniel Bradford Miller, William Bradley Glisson, Mark Yampolskiy, Kim-Kwang Raymond Choo. "Identifying 3D printer residual data via open source documentation." Computers & Security. (2018): 10-23.
  • Patrick Luckett, Jeffrey Todd McDonald, William Bradley Glisson, Ryan Benton, Joel Dawson, Blair A. Doyle. "Identifying stealth malware using CPU power consumption and learning algorithms." Journal of Computer Security 26.5 (2018): 589-613.
  • William Bradley Glisson, Kim-Kwang Raymond Choo. "Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics." Proceedings of the 51st Hawaii International Conference on System Sciences. 2018. 5574-5575.
  • Katherine Sale, Jeffrey Todd McDonald, William Bradley Glisson, J. Harold Pardue, Michael Jacobs. "MedDevRisk: Risk Analysis Methodology for Networked Medical Devices." Proceedings of the 51st Hawaii International Conference on System Sciences. 2018. 3271-3280.
  • William Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo. "Digital Blues: An Investigation Into the Use of Bluetooth Protocols." 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). 2018. 498-503.
  • Karabiyik, U., Celebi, N., Yildiz, F., Holekamp, J., Rabieh, K. "Forensic Analysis of SCADA/ICS System with Security and Vulnerability Assessment." 125th ASEE Annual Conference and Exposition. 2018.
  • Rabieh, Khaled, et al. "A secure and cloud-based medical records access scheme for on-road emergencies." 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC). 2018. 1-8.
  • Khaled Rabieh, Miao Pan, Zhu Han, Vitaly Ford. "SRPV: A Scalable Revocation Scheme for Pseudonyms-Based Vehicular Ad Hoc Networks." 2018 IEEE International Conference on Communications (ICC). 2018. 1-6.
  • Mahmoud, Mohamed, Khaled Rabieh, Ahmed Sherif, Enahoro Oriero, Muhammad Ismail, Khalid Qaraqe, Erchin Serpedin. "Privacy-Preserving Fine-Grained Data Retrieval Schemes For Mobile Social Networks." IEEE Transactions on Dependable and Secure Computing. 2017.
  • Carson, J., Karabiyik, U., de Luna, E. and Rabieh, K. "Voteproject: Smart Democracy - A Blockchain Voting System Proof of Concept." 17th Annual Security conference securing the interconnected world. Las Vegas, 2018.
  • Lester, Li-Jen, and Yaprak Dallat-Ward. "Teaching Professionalism and Ethics in IT by Deliberative Dialogue." Proceedings of the EDSIG Conference. 2018. 3857.
  • Yaprak Dalat Ward, James G. Ward, Li-Jen Lester, Minghao Tao. "A Preliminary Study: The Use of VoiceThread in Online Business Courses." 2018 Proceedings of the EDSIG Conference. 2018.
  • Marilyn P. Rice, Li-Jen Shannon. "Project-Based Learning: A Structure to Facilitate Service Learning in an Online Interdisciplinary Project." Community Engagement Best Practices Across the Discipline. Ed. Heather K. Evans. Rowman & Littlefield, 2018.
  • Lester, Li-Jen. "Sustainability in Greening IT for Educational Systems." 2017 Proceedings of the EDSIG Conference. 2017. 4353.
  • Kenneth Dale Cook, Narasimha Shashidhar. "Using PowerShell to Capture and Compare Windows Registry and Live Memory Artifacts with Online Databases to Identify Suspect Files." INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE. 7.2 (2018).
  • Troy Lawrence, Umit Karabiyik, Narasimha Shashidhar. "Equipping a digital forensic lab on a budget." 2018 6th International Symposium on Digital Forensic and Security. 2018. 1-7.
  • Paul Knight, Narasimha Shashidhar. "DoS Forensic Exemplar Comparison to a Known Sample." International Journal of Computer Science and Security 12.1 (2018): 11.
  • Neyaz, Ashar, Narasimha Shashidhar and Umit Karabiyik. "Forensic Analysis of Wear Leveling on Solid-State Media." 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE. 2018. 1706-1710.

2017

  • Khaled Rabieh, Mingkui Wei. "Efficient and privacy-aware authentication scheme for EVs pre-paid wireless charging services." 2017 IEEE International Conference on Communications (ICC). 2017. 1-6.

2016

  • Hawzhin Mohammed, Samet Tonyali, Khaled Rabieh, Mohamed Mahmoud, Kemal Akkaya. "Efficient privacy-preserving data collection scheme for smart grid AMI networks." 2016 IEEE Global Communications Conference (GLOBECOM). 2016. 1-6.