Publications

Vijay Anand:

  • Partition based Hash tree - An Efficient Certificate Revocation System, 2017 IEEE International Conference on Electro Information Technology (EIT), Vijay Anand, Raasi Annavajjala
  • Intrusion Detection: Tools, Techniques and Strategies, 42th ACM annual conference on SIGUCCS, October 2014
  • Threat-adaptive architectures for trusted platform modules in secure computing systems, V. Anand, J. Saniie, E. Oruklu, Electro/Information Technology (EIT), 2010 IEEE International Conference on , vol., no., pp.1-6, 20-22 May 2010
  • Cyber Labs - A Real Time Interactive, Secure Laboratory Environment for Remote Students, V. Anand, J. Saniie, E. Oruklu, R. Hanley, SIGUCCS, 2011 Philadelphia-PA
  • Application commerce: Security challenges and workflows, V. Anand, J. Saniie, E.Oruklu, Electro/Information Technology (EIT), 2011 IEEE International Conference on , vol., no., pp.1-6, 15-17 May 2011
  • Trusted computing architectures for a mobile IT infrastructure, V. Anand, J. Saniie, E. Oruklu, In Proceedings of the 39th ACM annual conference on SIGUCCS (SIGUCCS '11). ACM, New York, NY, USA, 73-78.
  • Superdistribution: Testability, security and management of digital applications, V.Anand, J. Saniie, Electro/Information Technology (EIT), 2012 IEEE InternationalConference on , vol., no., pp.1-5, 6-8 May 2012
  • Security Challenges in IT infrastructure for Cybersecurity Curriculum Support, V.Anand, In Proceedings of the 40th ACM annual conference on SIGUCCS, October 2012

Xianping Wang:

  • Xianping Wang, Samy El-Tawab, Ahmed Alhafdhi, Mohammad Almalag and Stephan Olariu,"Toward Probabilistic Data Collection in the NOTICE Architecture," IEEE Transactions on Intelligent Transportation Systems, vol.PP, no.99, pp.1-10, 2016
  • Stephan Olariu, Shahram Mohrehkesh, Xianping Wang and Michele C. Weigle, "Aggregating Information in Actor Networks," SIGMOBILE Mobile Computing Communications Review, Vol. 18, No. 1, January 2014, pp. 85-96
  • Xianping Wang, Aaron Walden, Michele C. Weigle and Stephan Olariu, "Strategies for Sensor Data Aggregation in Support of Emergency Response," In Proceedings of the Military Communications Conference (MILCOM’2014). Baltimore, MD, October 2014.
  • Shahram Mohrehkesh, Aaron Walden, Xianping Wang, Michele C. Weigle and Stephan Olariu," Towards Building Asset Registry in Emergency Response," In Proc. of the 3rd IEEE Annual International Workshop on Mission-Oriented Wireless Sensor Networking (MiSeNet). Philadelphia, PA, October 2014. Best Paper Award
  • Samy El-Tawab, Xianping Wang, Ahmed Alhafdhi and Stephan Olariu, " Probabilistic DataCollection in the NOTICE Architecture," In Proc. of the 3rd IEEE Annual International Workshop on Mission-Oriented Wireless Sensor Networking (MiSeNet2014). Philadelphia, PA, October 2014.

Amer Suhair:

  • Suhair Amer. Improving an Online Course That Teaches Ethics in the Cyber World Using Quality Matters Through Informal Reviewers. The 2015 International Conference on Computational Science and  Computational Intelligence. THE 2015 INTERNATIONAL SYMPOSIUM ON EDUCATION CSCI-ISED 2015.  December 7-9, 2015, Las Vegas, USA
  • Suhair Amer, Joshua Leonard . Danger Theory Concepts Improving Malware Detection of Intrusion Detection Systems That Uses Exact Graphs. The 2015 International Conference on Computational Science and Computational Intelligence. THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE . CSCI-ISCI . December 7-9, 2015, Las Vegas, USA

Contact

573-651-2653
vanand@semo.edu
Dempster 021E

Center for Cybersecurity
One University Plaza, MS5950
Cape Girardeau, Missouri 63701