Research
Faculty, staff, and students at St. Cloud State University are active in the field of security research. Students may present their research at the annual Student Research Colloquium on campus. Faculty and staff contribute to the field through their publications.
Faculty Research
Journal publications
2023
- Gavin Dutcher, Koku Azianyo, Thivanka P.B. M. Dissanayake, Akalanka Mailewa, Secure Cloud Storage Solution with 'Sea le' and 'NextCloud': A Resilient Eciency Assessment, Revised Manuscript is requested from Advances in Technology" Journal prior to Publish, Approximate publication Date: December 2023
- P.A.I. Pathirana, V.B. Godagama, H.K.S.H. Premadas, Akalanka Mailewa, Cost-E ective Investment to Monitor the Network Infrastructure of Small and Medium- Scale Enterprises, International Journal of Computer Applications (July 2023): 0975- 8887. (DOI: 10.5120/ijca2023922983)
- Safonov P., Bashurov.V., Anomaly detection in network traffic using entropy-based methods: Application to various types of cyberattacks, Paper presented at the 63th International Association for Computer Information Systems (IACIS) Meeting, Clearwater, USA, October 2023
- Rice, E., Safonov P., Guster D., An analysis of virtual memory addressing as a potential vulnerability within Linux operating system, Proceedings of the 63thInternational Association for Computer Information Systems (IACIS) Meeting, Clearwater, USA, October 2023
- Mailewa, Akalanka and Khan, Saad “Discover Botnets in IoT Sensor Networks: A Lightweight Deep Learning Framework with Hybrid Self-Organizing Maps.” Elsevier - Microprocessors and Microsystems (Cite Score 3.2 & Impact Factor 3.503) (Accepted December 2022) and published on January/02/2023. (DOI:https://doi.org/10.1016/j.micpro.2022.104753
- Atiewi, Saleh, Amer Al-Rahayfeh, Muder Almiani, Abdullah Abuhussein, and Salman Yussof. "Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks." Cluster Computing (2023): 1-18.
- Abuhussein, Abdullah, and Faisal S. Alsubaei. "Security in Cryptocurrency wallets." Telematique 22, no. 01 (2023): 2544-2575.
- Bashurov, P. Safonov, Anomaly detection in network traffic using entropy-based methods: Application to various types of cyberattacks, Issues in Information Systems, Volume 24, Issue 4, pp. 84-94, 2023
https://doi.org/10.48009/4_iis_2023_107
2022
- Rozendaal, Kyle, and Akalanka Mailewa. "A Novel Method for Moving Laterally and Discovering Malicious Lateral Movements in Windows Operating Systems: A Case Study." Advances in Technology (August 2022), ISSN 2773-7098. (DOI:10.31357/ait.v2i3.5584)
- Mailewa, Akalanka, Susan Mengel, Lisa Gittner, and Hafiz Khan. "Mechanisms and techniques to enhance the security of big data analytic framework with mongodb and Linux containers." Elsevier Array (June 2022): 100236. (DOI:10.1016/j.array.2022.100236)
- Rozendaal, Kyle, and Akalanka Mailewa. "Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks." International Journal of Computer Applications (May 2022) 975: 8887. (DOI:10.5120/ijca2022922098)
- Gamnis, Steven, Matthew VanderLinden, and Akalanka Mailewa. "Analyzing Data Encryption Efficiencies for Secure Cloud Storages: A Case Study of Pcloud vs OneDrive vs Dropbox." Advances in Technology (April 2022): 79-98. (DOI:10.31357/ait.v2i1.5526)
- Singh, Nicholas, Kevin Bui, and Akalanka Mailewa. "Robust Efficiency Evaluation of NextCloud and GoogleCloud." Advances in Technology (March 2022): 536-545. (DOI:10.31357/ait.v1i2.5392)
- Wang, Jieyu, Abu Hussein, Abdullah, Collen, Lynn A., Helping People with Social Anxiety Disorder to Recognize Facial Expressions in Video Meetings, in International Journal of Advanced Computer Science and Applications (IJACSA), March 2022 Volume 13 No 3
- Kaja, Durga Venkata Sowmya, Yasmin Fatima, and Akalanka B. Mailewa. "Data Integrity Attacks in Cloud Computing: A Review of Identifying and Protecting Techniques." Journal homepage: www. ijrpr. com (February 2022) ISSN 2582: 7421. (DOI:10.55248/gengpi.2022.3.2.8)
- Sapkota, Bhumika, and Akalanka B. Mailewa. "A Scalable Framework to Detect, Analyze, and Prevent Security Vulnerabilities in Enterprise Software-Defined Networks." Journal homepage: www. ijrpr. com (January 2022) ISSN 2582: 7421. (DOI:10.55248/gengpi.2022.3.2.1)
- Aleisa, Mohammed A., Abdullah Abuhussein, Faisal S. Alsubaei, and Frederick T. Sheldon. "Novel security models for IoT–fog–cloud architectures in a real-world environment." Applied Sciences 12, no. 10 (2022): 4837.
- Mahfouz, Ahmed M., Abdullah Abuhussein, Faisal S. Alsubaei, and Sajjan G. Shiva. "Toward A Holistic, Efficient, Stacking Ensemble Intrusion Detection System using a Real Cloud-based Dataset." International Journal of Advanced Computer Science and Applications 13, no. 9 (2022).
2021
- Song, Jae H., Collen, Lynn A., Sohn, Changsoo., Business Complexity As A Determinant of CEO Compensation, in Journal of Business and Economic Perspectives (JBEP), 2021 Fall Winter XLVIII
- Aleisa, Mohammed A., Abdullah Abuhussein, Faisal S. Alsubaei, and Frederick T. Sheldon. "Examining the Performance of Fog-Aided, Cloud-Centered IoT in a Real-World Environment." Sensors 21, no. 21 (2021): 6950.
- The Impact of Smart Classrooms on The Academic Success of Sri Lankan Government School Students, by Thivanka Mailewa, Piumika Chandrasiri, Dileepa Chandrasena, Sajeevkanth Kirubhakaran, Diluksan Jesudasan,Wasantha Rajapakshe, Akalanka Mailewa. Published in the International Journal of Science& Technology Research 9(12):323-333, December 2020.
2020
- Akalanka Mailewa Dissanayaka, Susan Mengel, Lisa Gittner, Hafiz Khan, "Security Assurance of MongoDB in Singularity LXCs: An Elastic AND Convenient Testbed Using Linux Containers to Explore Vulnerabilities", Submitted on March 14th 2109 and accepted with minor revisions on February 13th 2020 the Cluster Computing Journal special issue on Data-center Automation, Analytics, and Control, Springer Link, February 2020.
- Mahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble classifiers for network intrusion detection using a novel network attack dataset." Future Internet 12, no. 11 (2020): 180.
- Aleisa, Mohammed A., Abdullah Abuhussein, and Frederick T. Sheldon. "Access control in fog computing: Challenges and research agenda." IEEE Access 8 (2020): 83986-83999.
2019
- Alsubaei, Faisal, Abdullah Abuhussein, Vivek Shandilya, and Sajjan Shiva. "IoMT-SAF: Internet of medical things security assessment framework." Internet of Things 8 (2019): 100123.
- Al-Rahayfeh, Amer, Saleh Atiewi, Abdullah Abuhussein, and Muder Almiani. "Novel approach to task scheduling and load balancing using the dominant sequence clustering and mean shift clustering algorithms." Future Internet 11, no. 5 (2019): 109.
- Alsubaei, Faisal, Abdullah Abuhussein, and Sajjan Shiva. "Ontology-based security recommendation for the internet of medical things." IEEE Access 7 (2019): 48948-48960.
2017
- Chang, L.H. and Jim Q. Chen, “The Information Ethics Perception Gaps between Chinese and American Students – A Chinese Culture Perspective,” IT and People, Vol. 30, No. 2, 2017.
- Erickson, Andrew; Dennis C. Guster; Leena Radeke; and Mark B. Schmidt. “Quantum Information Systems and Encryption: Quantum Algorithms on Classical Computers Performance and Scaling Limitations.” International Journal of Business Research.Volume 17, Issue 4, 2017, pp 101-110.
- Chen, Q. Jim and Allen Benusa, “HIPAA Security Compliance Challenges: the Case for Small Healthcare Providers,” International Journal of Healthcare Management, Jan. 12, 2017, Vol 10, No. 2, pp. 135-146.http://dx.doi.org/10.1080/20479700.2016.1270875
2016
- Chang, L.H., Jim Q. Chen, “A Scenario Based Exploratory Study of Cognitive Moral Developments in Information Ethics," International Journal of Information Systems and Change Management. Vol. 8, No. 1, 2016, pp. 60-78.
- Benusa, Allen; Shajive Jeganathan; and Mark B. Schmidt. “Forensic Analysis Challenges: Shifting from HDD To SSD Storage.”Journal of Information Systems Security. Volume 12, Issue 3, 2016.
- Guster, Dennis C.; Mark B. Schmidt; and Paidi Karthik. "Identifying and Remediating Rogue Services Within A Cloud Based Virtual Machine." International Journal of Distributed and Cloud Computing. Volume 4, Issue 1, 2016, pp 23-33.
2014
- Guster, Dennis C.; Mark B. Schmidt; and Erich P. Rice. “An Empirical Assessment of Performance and Scalability of Decentralized Disk Storage for Real-Time Business Applications.” Journal of International Business Disciplines. Volume 9 Issue 1 2014, pp. 49-60.
2013
- Chen, Q. Jim, Ruidong Zhang, Jaejung Lee, “A Cross-culture Empirical Study of Mobile Commerce Privacy Concerns,” Journal of Internet Commerce,Volume 12, Issue 4, 2013, pp. 348-364.
- Zhang, R. Jim Q. Chen, Jaejung Lee, “Mobile Commerce and Consumer Privacy Concerns,” Journal of Computer Information Systems, Volume 53, Number 4, 2013.
2012
- Phan, Dien D.; Mark B. Schmidt; and Larry Roth. “Natural Intelligence Applications for Business Intelligence in Online and Catalog Retailing Firms: A Case study.” International Journal of Information Systems and Change Management.Volume 6 Issue 1 2012, pp. 68-83.
- Crosby, G., Ghosh, T., Murimi, R., Chin, C., Wireless Body Area Network for Healthcare: A Survey. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), vol. 3(3), June 2012.
- Pope, Michael Brian, Merrill Warkentin, Ernst Bekkering, and Mark B. Schmidt. “Digital Steganography: An Introduction to Techniques and Tools,” Communications of the AIS. Volume 30, Issue 1, Article 22, June 2012, pp. 347-366.
- Dennis C. Guster, Olivia F. Lee, Dustin C. Rogers (2011). Pitfalls of Devising a Security Policy in Virtualized Hosts. Journal of Information Security Research. 2(2), 75-83.
2011
- Schmidt, Mark B. and Michael J. Condon. “Computer Forensics: Examining the Effectiveness of File Deletion.” Journal of Information Systems Security. Volume 7, Issue 3, 2011.
2010
- Hemminger, Corey, Dustin C. Rogers and Dennis Guster (2010). “Planning and Managing the Data Center to Green Computing,” International Journal of Business Research, 10(4), 105-113.
- Lee, Olivia F., Dennis C. Guster (2010), “Virtualized Disaster Recovery Model for Large Scale Hospital and Healthcare Systems,” International Journal of Healthcare Information Systems and Informatics, 5(3), 69-81. DOI: 10.4018/jhisi.2010070105.
2009
- Kirmani, E. and Hood, C. “Analysis of a Scanning Model of Worm Propagation,” Journal in Computer Virology, Volume 5, Number 1, February 2009.
- Lee, O. F., Guster, D. C., Schmidt, M. B., & McCann, B. (2009). Applying the Scale-Free Distribution Algorithm to Assess Communication Complexity and Failure Points in Disaster Recovery Models. Journal of Information Technology Management, 20(2), 35-46.
- Guster, Dennis C.; Mark B. Schmidt; Charles Hall; and Chris Brown. "Evaluating Performance and Scalability Issues in Distributed Data Mining: A Fist Level Analysis" International Journal of Business, Marketing, and Decision Sciences. Volume 2, Issue 1, 2009.
- Ma, Qingxiong; Mark B. Schmidt; J. Michael Pearson. “An Integrated Framework for Information Security Management.” Review of Business. Volume 30, Issue 1, 2009, pp. 58-69.
- Guster, Dennis C.; Mark B. Schmidt; Charles Hall; and Chris Brown. “Evaluating Performance and Scalability Issues in Distributed Data Mining: A First Level Analysis” International Journal of Business, Marketing, and Decision Sciences. January 2009.
- Schmidt, Mark B.; Jim Q. Chen; Dien D. Phan; and Kirk P. Arnett. “Security Perceptions of E-Commerce Users,” Journal of Internet Commerce. Accepted for publication. Tentatively scheduled for Volume 8, Issue 1, Spring 2009.
- Guster, Dennis C.; Mark B. Schmidt; and Erich B. Bergiel. “Distributed Clusters and the Effects of Switch Configuration and Line Speed” Business Research Yearbook. Volume 16, No. 1, 2009, pp. 139 – 144.
- Lee, Olivia F.; Dennis C. Guster; and Mark B. Schmidt. “WAN Line Speed and its Implications for the Support of Globally Remote Replicas in a Disaster Recovery Model,” Business Research Yearbook. Volume 16, No. 1, 2009, pp. 349 – 354.
2008
- You, L., Guster, D. C., & Sundheim, R. A. (2008). Using the packet analysis method to teach secure communications in client/server computing. Journal of Informatics Education Research, 10(1), 1-35.
- Chen, Jim Q.; Mark B. Schmidt; Dien D. Phan; and Kirk P. Arnett. “E-Commerce Security Threats: Awareness, Trust, and Practice.” International Journal of Information Systems and Change Management. Volume 3, No. 1, 2008, pp. 16 – 32.
- Schmidt, Mark B.; Allen C. Johnston; Kirk P. Arnett; Jim Q. Chen, and Li Suicheng. “Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness,” Journal of Global Information Management. Volume 16, No 2, April – June, 2008, pp. 91-103.
- Warkentin, Merrill, Ernst Bekkering, and Mark B. Schmidt. "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law, Vol. 3, No. 2 2008 pp. 17-34.
- Weber, James E; Dennis Guster; Paul Safonov; and Mark B. Schmidt. “Weak Password Security: An Empirical Study.” Information Systems Security: A Global Perspective. Volume 17, Issue 1, January 2008.
- Olagunju, A. O. (2009). Harmonizing the Interests of Free Speech, Obscenity, and Child Pornography in Cyberspace: The New Roles of Parents, Technology, and Legislation for Internet Safety. Scientific World Journal, 9, 1260-1272.
- Herath, S. Herath, A., Kachur, R. (2008). An Interdisciplinary Accounting Forensics Course to Improve Computer Science Enrollments. Journal for Computing Sciences in Colleges, 74-81.
- Herath, S., Herath, A., Goonatilake, R., Herath, J. (2008). Cryptographic Algorithms to Spatial Circuit Transformation in An Active Learning Module to Enhance the Information Assurance and Security Curriculum. Journal for Computing Sciences in Colleges 2008, 23-29.
- Olagunju, A. O. (2008). A Computational Exploration of the Chinese Remainder Theorem. Journal of Applied Mathematics and Informatics, 26(1), 307-317.
2007
- Arnett, Kirk P.; Mark B. Schmidt; Allen C. Johnston; Jongki Kim; and HaJin Hwang. “Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions.” International Journal of Information Security and Privacy. Volume 1, Issue 4, October – December 2007. P. 75-86.
- Goonatilake, R., Herath, A., Herath, S., Herath, J. (2007). Intrusion Detection using the Chi-square Goodness-of-fit Test for Information Assurance, Network, Forensics and Software security. The Journal of Computing Sciences in Colleges, 23(1), 255-263.
- Herath, A., Herath, S., Goonatilake, R., Herath, J. (2007). Designing Computer Forensics Courses using Case Studies to Enhance Computer Security Curricula. The Journal of Computing Sciences in Colleges, 23(1), 264-272.
- Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “US and Korean Perspectives on Malware: A Closer Look.” Business Research Yearbook. Volume 14, 2007, pp. 506-512.
- Johnston, Allen C.; Mark B. Schmidt; Kirk P. Arnett; and Jeff Thomas. “Getting to the Root of the Problem.” Journal of Internet Commerce. Volume 6, Issue 1, Spring 2007 pp 1-12.
- Schmidt, M. B., Johnston, A. C., & Arnett, K. P. (2007). US and Korean Perspectives on Malware: A Closer Look. Business Research Yearbook, 14.
- Johnston, A. C., Schmidt, M. B., Arnett, K. P., & Thomas, J. (2007). Getting to the Root of the Problem. Journal of Internet Commerce, 6 (1).
2006
- Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “An Empirical Investigation of Rootkit Awareness.” Business Research Yearbook. Volume 13, 2006, pp. 153-158.
- Schmidt, Mark B.; Mark D. Nordby; and Dennis C. Guster. “Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch.” Business Research Yearbook. Volume 13, 2006, pp. 147-152.
- Guster, D., Safonov, P., Sundheim, R., & Sultanov, R. (2006). Determining the Effectiveness of Using Linux Operating System Demonstrations to Illustrate Message Digest Concepts and Vulnerabilities. Journal of Informatics Education Research, 8(3), 81-105.
- Safonov, P., Guster, D., Sultanov, R., & Podkorytov, D. (2006). Processor type and its relationship to performance in the application of distributed processing to determine vulnerabilities in password files. Issues in Information System, 7(2), 33-37.
2005
- Arnett, Kirk P. and Mark B. Schmidt. “Busting the Ghost in the Machine.” Communications of the ACM. vol. 48 no. 8. August, 2005. pp. 92-95.
- Schmidt Mark B. and Kirk P. Arnett. “Spyware: A Little Knowledge is a Wonderful Thing.” Communications of the ACM. vol. 48 no. 8. August, 2005. pp. 67-70.
- Maskey, S., Jansen, B., Guster, D., & Hall, C. A Basic Firewall Configuration Strategy for the protection of Development Related Computer Networks and Subnetworks. Information Systems Security, 16(5), 281-290.
- Parnerkar, A., Herath, J., & Guster, D. C. Secret Key Distribution Protocol using Public Key Cryptography. The Journal of Computing Sciences in Colleges, 19 (1).
- Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mobile Networks and Applications, 10(6), 985–995.
2004
- Arnett, K. P., Schmidt, M. B., & Johnston, A. C. (2004). Wireless Networks in Small Town Mississippi. Mississippi Business Journal.
- Chok, O.-S., Herath, J., & Herath, S. (2004). Computer Security Learning Laboratory: Implementation of DES and AES Algorithm Using Spreadsheets. International Journal of Effective Management, 1(2).
- Ghosh, T., Makki, K., & Pissinou, N. (2004). An Overview of Security Issues for Multihop Mobile Ad Hoc Networks. International Engineering Consortium Network Security: Technology Advances, Strategies, and Change Drivers, ISBN: 0-931695-25-3.
- Guster, D. C., & Hall, C. (2001). A Firewall Configuration Strategy for the Protection of Computer Networked Labs in a College Setting. Journal of Computing in Small Colleges (17:1), 181-187.
Proceedings and conference presentations
2024
- Wang, Jieyu, Schmidt, Mark B., and Kuikel, Raunak, “User trust and credibility of conversational agents,” Proc. of 23rd Annual Security Conference. Las Vegas, Nevada, United States, April 3-4, 2024.
2023
- Chen, Jim, “Information Security and National Cultures,” A presentation at the 28th ACPSS International Conference, Tacoma, WA, U.S.A, October 20, 2023.
- Wang, Jieyu, Chen, Qingjun J., Kang, Dingfang, Abu Hussein, Abdullah, Collen, Lynn A., Designing a Conversational Agent for Education: A Personality-based Approach, in Proceedings of the Eighteenth Midwest Association for Information Systems Conference, Saint Paul, Minnesota, May 19-20, 2023
- KC, K., Jim Chen, “HIPAA Security and Privacy Compliance – A Case Study,” Proceedings of West Decision Science Institute Annual Meeting, Portland, OR. April 3 - 7, 2023.
- Chapin A Johnson, Sharveen Paramiswaran, and Akalanka Mailewa, Discovering Vulnerabilities in Web Browser Extensions Contained by Google Chrome, In Midwest Instruction and Computing Symposium (MICS), at the University of Northern Iowa, Cedar Falls, Iowa, USA, April 2023 [Best Paper Award]
- Roger G Massmann, Nick M Grantham, and Akalanka Mailewa, Quantum Computing: An Assessment into the Impacts of Post-Quantum Cryptography, In Midwest Instruction and Computing Symposium (MICS), at the University of Northern Iowa, Cedar Falls, Iowa, USA, April 2023
- Tristan L Moore, Samuel S Conlon, Anushka U Hewarathna, Thivanka P B M Dissanayaka, and Akalanka Mailewa, Encryption Methods and Key Management Services for Secure Cloud Computing: A Review, In Midwest Instruction and Comput-ing Symposium (MICS), at the University of Northern Iowa, Cedar Falls, Iowa, USA, April 2023
- Mailewa, Akalanka and Khan, Shehram “Detecting Network Transmission Anomalies using Autoencoders-SVM Neural Network on Multi-class NSL-KDD Dataset.” Submitted to the IEEE 13th Annual Computing and Communication Workshop and Conference (IEEE CCWC 2023) and acceptance notice will be send on FEB/2023.
2022
- Schmidt, Mark B. “Sustaining Successful Interventions for Underrepresented Students in STEM: Institutional Challenges: Beneficial Spinoffs to the Institutions and its Students Computer Security Summer Camps for High School Students.” This was part of Robert Johnson’s session at the 52nd Annual International Society for Educational Planning (ISEP) Conference, Online, October, 2022.
- Schmidt, Mark B. “Biometrics as a Part of a Multifactor Authentication Strategy.” The 21 st Annual Security Conference, Las Vegas, Nevada. May, 2022.
- Sorensen, Michael J. and Mark B. Schmidt. “Cybersecurity Strategy: Comparing Iceland and the USA.” The 21 stAnnual Security Conference, Las Vegas, Nevada. May, 2022.
- Samantha Collen, Bert Noble, Craig Overboe, and Akalanka Mailewa, Risks, Privacy and Responsibility of Social Media use in the Workplace: a Review, At the 22nd Annual Security Conference (ASC) in MAY 2022, Las Vegas, USA
- Nidika Bandara, Larissa Marques, Mawuli Martey, and Akalanka Mailewa, Analysis of Recent Randsomware Attacks and Preventable Measures, At the 22nd Annual Security Conference (ASC) in MAY 2022, Las Vegas, USA
- Anita Adhikaria, Rishab Sharma, and Akalanka Mailewa, Recent Advances of Security in IoT: a Survey, At the 22nd Annual Security Conference (ASC) in MAY 2022, Las Vegas, USA
- Jairu, Pankaj, and Akalanka B. Mailewa. "Network Anomaly Uncovering on CICIDS-2017 Dataset: A Supervised Artificial Intelligence Approach." In 2022 IEEE International Conference on Electro Information Technology (eIT), pp. 606-615. IEEE, May 2022. (DOI:10.1109/eIT53891.2022.9814045)
- Khan, Muhammad Maaz Ali, Enow Nkongho Ehabe, and Akalanka B. Mailewa. "Discovering the Need for Information Assurance to Assure the End Users: Methodologies and Best Practices." In 2022 IEEE International Conference on Electro Information Technology (eIT), pp. 131-138. IEEE, May 2022. (DOI:10.1109/eIT53891.2022.9813791)
- Ndri, Anna, Divya Bellamkonda, and Akalanka B. Mailewa. "Applications of Block-Chain Technologies to Enhance the Security of Intrusion Detection/Prevention Systems: A Review." In Midwest Instruction and Computing Symposium (MICS), vol. 2, p. 4. April 2022.
- Olaosebikan, Ayodeji, Thivanka PBM Dissanayaka, and Akalanka B. Mailewa. "Security & Privacy Comparison of NextCloud vs Dropbox: A Survey." In Midwest Instruction and Computing Symposium (MICS). April 2022.
- Zhang, R,. T. Reineck, Jim Q. Chen, “FinTech Regulations: What We Can Learn From The Collapse of Wirecard,” Proceedings of Western Decision Science Institute 50th Annual Meeting, the Big Island, Waikoloa Village, Hawaii, April 5-8, 2022.
- Schmidt, Mark B. Invited Talk: “Making the Most of Your Doctoral Program.” Mississippi State University, Starkville, MS. March, 2022.
- Schmidt, Mark B. “Hashcat Software for Advanced Password Recovery.” (presentation) Leech Lake Tribal College. February 2022, Cass Lake, MN.
- Schmidt, Mark B. and Erich Rice. “Hashcat Password Recovery Demo.”(presentation) Leech Lake Tribal College. March 2022, Cass Lake, MN.
- Schmidt, Mark B. “Biometric Authentication.” (presentation) Leech Lake Tribal College. April 2022, Cass Lake, MN.
- Schmidt, Mark B. “Forensics Lab Development through the DoD Cyber Scholarship Program (CySP.)” (abstract) International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2022, Orlando, FL.
2021
- Schmidt, Mark B. “Introduction to Digital Forensics using the Forensic Air-Lite VII.” (presentation) Leech Lake Tribal College. December 2021, Cass Lake, MN.
- Schmidt, Mark B. and Erich Rice. “Section 230: A Good Samaritan or an Impediment to Free Speech.” (abstract) International Academy of Business and Public Administration Disciplines (IABPAD) Conference. October 2021, Las Vegas, NV.
- Schmidt, Mark B. “Exploring the Frontiers of Steganography.” The 20th Annual Security Conference, Scheduled for Las Vegas, Nevada. March, 2021 – was moved to an online conference due to COVID 19.
2020
- Al-Rousan, Suhaib. Abuhussein, Abdullah. , Alsubaei, Faisal, Collen, L. , and Shiva, S., Ads-Guard: Detecting Scammers in Online Classified Ads , in 2020 IEEE Symposium Series on Computational Intelligence (SSCI)At: Canberra, Australia, December 2020.
- Suman Thapa, Akalanka Mailewa Dissanayaka, "THE ROLE OF INTRUSION DETECTION/PREVENTION SYSTEMS IN MODERN COMPUTER NETWORKS: A REVIEW", At Midwest Instruction and Computing Symposium (MICS), Milwaukee School of Engineering and Northwestern Mutual, Milwaukee, Wisconsin, April 2020
- Foka Ngniteyo Arsene, Hilary Mazi, Akalanka Mailewa Dissanayaka, "THE INFLUENCE OF BLACK MARKET ACTIVITIES THROUGH DARK WEB ON THE ECONOMY: A SURVEY", At Midwest Instruction and Computing Symposium (MICS), Milwaukee School of Engineering and Northwestern Mutual, Milwaukee, Wisconsin, April 2020
- Akalanka Mailewa Dissanayaka, Susan Mengel, Lisa Gittner, Hafiz Khan, "Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux Containers", At the 4th International Conference on Compute and Data Analysis-2020 (ICCDA-2020) Conference, International Technological University, Silicon Valley, San Jose, CA, USA, March 2020
- Kuznia, Jodi L. and Mark B. Schmidt. “Where is the Money? A Beginners’ Guide to Grant Applications.” The 19th Annual Security Conference, Scheduled for Las Vegas, Nevada. March, 2020 – was moved to an online conference due to COVID 19.
- Volkmuth, Brian G. and Mark B. Schmidt. “ATM Ethernet Traffic Identification to Target Forensics Detection if IP Packets.” The 19th Annual Security Conference, Scheduled for Las Vegas, Nevada. March, 2020 – was moved to an online conference due to COVID 19.
- Schmidt, Mark B. “The Development of a Digital Forensics Lab and Projects for Graduate Students.” National Business and Economics Society Conference, Puerto Vallarta, Mexico. Accepted & scheduled for March, 2020. Travel cancelled per SCSU due to COVID 19.
- Albulayhi, K., Abuhussein, A., Alsubaei, F., & Sheldon, F. T. (2020, January). Fine-grained access control in the era of cloud computing: An analytical review. In 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0748-0755). IEEE.
- Putta, Swapnika Reddy, Abdullah Abuhussein, Faisal Alsubaei, Sajjan Shiva, and Saleh Atiewi. "Security benchmarks for wearable medical things: stakeholders-centric approach." In Fourth International Congress on Information and Communication Technology: ICICT 2019, London, Volume 2, pp. 405-418. Springer Singapore, 2020.
- Al-Rousan, Suhaib, Abdullah Abuhussein, Faisal Alsubaei, Lynn Collen, and Sajjan Shiva. "Ads-Guard: Detecting Scammers in Online Classified Ads." In 2020 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1492-1498. IEEE, 2020.
- Al Makdi, Khalid, Frederick T. Sheldon, and Abdullah Abu Hussein. "Trusted security model for IDS using deep learning." In 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS), pp. 1-4. IEEE, 2020.
- Aleisa, Mohammed, Abdullah Abu Hussein, Faisal Alsubaei, and Frederick T. Sheldon. "Performance analysis of two cloud-based iot implementations: Empirical study." In 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 276-280. IEEE, 2020.
- Al-Rousan, Suhaib, Abdullah Abuhussein, Faisal Alsubaei, Ozkan Kahveci, Hazem Farra, and Sajjan Shiva. "Social-guard: Detecting scammers in online dating." In 2020 IEEE International Conference on Electro Information Technology (EIT), pp. 416-422. IEEE, 2020.
2019
- Alsubaei, Faisal, Abdullah Abuhussein, and Sajjan Shiva. "A framework for ranking IoMT solutions based on measuring security and privacy." In Proceedings of the Future Technologies Conference (FTC) 2018: Volume 1, pp. 205-224. Springer International Publishing, 2019.
- Mahfouz, Ahmed M., Abdullah Abuhussein, Deepak Venugopal, and Sajjan G. Shiva. "Network intrusion detection model using one-class support vector machine." In Advances in Machine Learning and Computational Intelligence: Proceedings of ICMLCI 2019, pp. 79-86. Springer Singapore, 2021.
- Darknet and Black Market Activities against the Cybersecurity: A Survey on Apr 5, 2019 at Midwest Instruction and Computing Symposium (MICS) - 2019 by Mojolaoluwa Akintaro and Akalanka Mailewa Dissanayaka et. al.
- Security Threats/Attacks via Botnets and Botnet Detection & Prevention techniques in Computer Networks: A Review on Apr 5, 2019 at Midwest Instruction and Computing Symposium (MICS) - 2019 Mojolaoluwa Akintaro and Akalanka Mailewa Dissanayaka et. al.
2018
- Akalanka Mailewa Dissanayaka, Susan Mengel, Lisa Gittner, Hafiz Khan, “Dynamic and Portable Vulnerability Assessment Testbed with Linux Containers to Ensure the Security of MongoDB in Singularity LXCs”, At Supercomputing-2018 (SC18) Conference, Kay Bailey Hutchison Convention Center, Dallas, Texas, USA, November 2018
- Krzenski Kira, Andrew Erickson, Leena Radeke, Dennis C. Guster, and Mark B. Schmidt. “Quantum Algorithms on Classical Parallel Computing Systems Performance and Scaling Limitations.” (abstract) International Academy of Business and Public Administration Disciplines (IABPAD) Conference. October 2018, Las Vegas, NV.
- Alsubaei, Faisal, Abdullah Abuhussein, and Sajjan Shiva. "Quantifying security and privacy in Internet of Things solutions." In NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, pp. 1-6. IEEE, 2018.
- Atiewi, Saleh, Abdullah Abuhussein, and Mohammad Abu Saleh. "Impact of virtualization on cloud computing energy consumption: empirical study." In Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control, pp. 1-7. 2018.
2017
- Akalanka Mailewa Dissanayaka, Roshan Ramprasad Shetty, Samip Kothari, Susan Mengel, Lisa Gittner, Ravi Vadapalli, “A Review of MongoDB and Singularity Container Security in regards to HIPAA Regulations”, At ACM UCC/BDCAT Conference, University of Texas, Austin, Texas, USA, December 2017
- Akalanka Mailewa Dissanayaka, Roshan Ramprasad Shetty, Susan Mengel, Lisa Gittner, Ravi Vadapalli, Hafiz Khan, “Secure NoSQL Based Medical Data Processing and Retrieval: The Exposome Project”, At ACM UCC/BDCAT Conference, University of Texas, Austin, Texas, USA, December 2017
- Chen, Q Jim, Alex Polacco, “Security Issues in Managing Unstructured Data,” Proceedings of the 2017 Western Decision Science Institute Annual Meeting, Vancouver, Canada. April 4 – 8, 2017.
- Schmidt, Mark B. Invited Talk: “Workshop: Basic Steganography.” The 16th Annual Security Conference, Las Vegas, Nevada. April, 2017.
- Smith, William; Mark B. Schmidt, and Ernest Foo. “Geographic Correlation to Password Complexities and Cyber Security Awareness.” The 16th Annual Security Conference, Las Vegas, Nevada. April, 2017.
2016
- Ghosh, Tirthankar; Mark B. Schmidt; Shanna Simmons, and Chris Lannen. "SCSU GenCyber Lessons Learned (poster session)" GenCyber Meeting. Boston, MA. September, 2016
- Ghosh, Tirthankar and Mark B. Schmidt. “GenCyber Planning and Risk Management @ St. Cloud State University.” (presentation) Fall GenCyber Meeting. September, 2016. Boston, MA.
- Kamal, Parves and Jim Q. Chen, “Trust in Sharing Economy,” Proceedings of the 20th Pacific Asia Conference on Information Systems ISBN number: June 27 – July 1, 2016, Chiayi, Republic of China (Taiwan).
- Guster, Dennis C.; Mark B. Schmidt; and Paidi Karthik. “Identifying and Remediating Rogue Services within a Cloud Based Virtual Machine.” International Academy of Business Disciplines (IABD) Conference. April 2016, Las Vegas, NV.
- Benusa, Allen D.; Shajive S. Jeganathan; and Mark B. Schmidt. “Forensic Analysis Challenges: Shift from HDD to SSD Storage.” Proceedings of the 2016 Security Conference, March 2016, Las Vegas, NV.
- Virnig, Michael and Mark B. Schmidt. “Improving Cyber Awareness through Community Outreach.” Proceedings of the 2016 Security Conference, March 2016, Las Vegas, NV.
- Abuhussein, Abdullah, Faisal Alsubaei, Sajjan Shiva, and Frederick T. Sheldon. "Evaluating security and privacy in cloud services." In 2016 IEEE 40th annual computer software and applications conference (COMPSAC), vol. 1, pp. 683-686. IEEE, 2016.
- Abuhussein, Abdullah, Sajjan Shiva, and Frederick T. Sheldon. "CSSR: cloud services security recommender." In 2016 IEEE world congress on services (SERVICES), pp. 48-55. IEEE, 2016.
2015
- Guster, Dennis C.; Mark B. Schmidt, and Paidi Karthik. “Auditing Complex Cloud Based Services With Inodes to Trace the Origins of Potentially Rogue Processes Within a Linux Host (Virtual Machine).” International Academy of Business and Public Administration Disciplines (IABPAD) Conference. October 2015, Las Vegas, NV.
- French, Aaron, Mark B. Schmidt, John Guo, and J.P. Shim. “An Exploratory Study on BYOD in Class: Opportunities and Concerns.” Proceedings of the 2015 Americas Conference on Information Systems (AMCIS). August 2015, Fajardo, Puerto Rico.
- Benusa, Allen, Jim Q. Chen, “HIPAA Compliance Challenges: A Case Study of a Small Healthcare Provider,” Proceedings of the 5th International Conference on IS Management and Evaluation. May 28, 2015, Xian, China, pp. 161-168.
- Mailewa, Akalanka, Jayantha Herath, and Susantha Herath. "A Survey of Effective and Efficient Software Testing" In The Midwest Instruction and Computing Symposium. Retrieved from http://www.micsymposium.org/mics2015/ProceedingsMICS_2015/ pdf. 2015.
2014
- Mailewa, Akalanka, and Jayantha Herath. "Operating Systems Learning Environment with VMware" In The Midwest Instruction and Computing Symposium. Retrieved from http://www.micsymposium.org/mics2014/ProceedingsMICS_2014/mics2014_s bmission_14.pdf. 2014 .
- Phan, Dien D.; Mark B. Schmidt; and Kim Phan. “Information Security Management Policies and Processes: A Total Security Model.” (research abstract),” Proceedings of the National Decision Sciences Institute (DSI) Conference.November 2014, Tampa, FL.
- Guster, Dennis C.; Mark B. Schmidt, and Erich Rice. “Decentralized Disk Storage: An Evaluation of Performance and Scalability to Ascertain their Appropriateness for Real-Time Business Applications.” International Academy of Business Disciplines (IABD) Conference. April 2014, San Diego, CA.
- Tomović, Aleksandar, "Path Planning Algorithm for Robot Operating System", MICS2014, Verona, WI, USA, April 2014
- Tomović, Aleksandar, "Introduction to ROS", Saint Cloud State University, Saint Cloud, MN, USA, April 2014 https://www.micsymposium.org/mics2014/ProceedingsMICS_2014/mics2014_submission_2.pdf
2013
- Chen, Q. Jim, Ruidong Zhang, Jaejung Lee, “Mobile Commerce Privacy Concerns: A Preliminary Study on Korea and US Consumers,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2013, Baltimore, Maryland, pp. 661800 (1-6).
- Guster, Dennis, O'Brien, Andres and Lebentritt, Laura, Can A Decentralized Storage System Structure Such As Cassandra Provide An Effective Means Of Speeding Up Web Access Times? Proc. of Midwest Instruction and Computing Symposium, Wisconsin, USA, April 19-20, 2013.
2012
- Chin, C. Crosby, G., Ghosh, T., Murimi, R., Advances and Challenges of Wireless Body Area Networks for Healthcare Applications. Proc. of International Conference on Computing, Networking and Communications, Hawaii, USA, Jan 30 – Feb 2, 2012.
- Schmidt, Mark B. and Kate Mooney . “Discovering and Investigating Corporate Fraud at the MBA level: A Team Teaching Approach.” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2012, Orlando, FL.
- Lee, Jaejung, Chen, Jim Q., and Zhang, Ruidong, “M-commerce and Information Privacy Concerns,” Proc. of Pan-Pacific Business the 29th Annual International Conference Haikou, Hainan Island, China, May 24-26, 2012.
2011
- Ghosh, T., Hou, T., Experimenting with Watchdog Implementation on a Real-life Ad-Hoc Network: Monitoring Selfish Behavior. Proc. of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE ’11), December 3-12, 2011.
- Guster, D., Lee, O. F., and Rogers, D. (2011). Virtualized hosting: Devising a security policy through log analysis. Proceedings of the 4th International Conference on the Application of Digital Information and Web Technologies.
- Chen, Q. Jim, Ruidong Zhang, Bruce Busta, “Information Security and Compliance Management,” Proc. of Pan-Pacific Business XXVIII International Conference, Daejun, South Korea, May 2011.
- Guster, Dennis C., Olivia F. Lee, Dustin C. Rogers and Cynthia Nitsch “Security Policy Concerns in a Virtualized Network Environment,” Submitted conference paper and under review for the Midwest Instructional Computing Symposium, Duluth, MN, April 6-9, 2011.
- McCann, Brandon; Mark B. Schmidt; and Dennis C. Guster.“Reverse TCP Attacks: Analysis and Prevention,” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2011, Orlando, FL.
2010
- M.A.B. Mailewa, S.P.J. Perera, A. NIZAM, "Natural Angular Coordinate System for Visual Space", in Proceedings of the Peradeniya University Research Sessions (PURSE) 2010, Sri Lanka, Vol. 15, pp 633-634, December 2010
- Guster, Dennis C., Olivia F. Lee, Cynthia Nitsch and Carl Robman (2010), “Scaling Performance of Virtualized Servers Deployed In a Health Care Setting,” 2010 41th Decision Sciences Institute (DSI) Annual Meeting in San Diego, November 20-23, 2010.
- Guster, Dennis, Brown, Christopher, Sultanov, Renat (2010). Enhancing Key Confidentiality by Distributing Portions of the Key Across Multiple Hosts, Midwest Instructional Computing Symposium Annual Meeting in Eau Claire, WI, April 16-17, 2010.
- Condon Michael J. and Mark B. Schmidt. "Is that File Really Gone? Computer Forensics to Recover the Unrecoverable," Proceedings of the 2010 Security Conference, April 2010, Las Vegas, NV.
2009
- Schmidt, Mark B. Invited Panel Session: "Current Status and Issues in Wireless/Mobile and Virtual Networks: Cell Phone Spyware and Viruses," Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2009, New Orleans, LA.
- Schmidt, Mark B.; Dennis C. Guster; Olivia F. Lee; and Brandon McCann. “Disaster Recovery Planning, Analyzing the Dilemma: In-house vs. Outsourced with Special Consideration to the WAN Resources Required,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2009, New Orleans, LA.
- Lee, Olivia F.; Dennis C. Guster; and Mark B. Schmidt. “A First Approach in the Assessment of the Complexity of Disaster Recovery Models for SMEs,” Proceedings of the 2009 Americas Conference on Information Systems (AMCIS). August 2009, San Francisco, CA.
- Schmidt, Mark B.; David A. Dampier; and Dennis C. Guster. “A Multi-University Resource Allocation Approach to Provide Computer Forensics Education for Law Enforcement Agents,” Proceedings of the 2009 Security Conference, April 2009, Las Vegas, NV.
- Jacobson-Schulte,P.; Mark B. Schmidt; and Gary Yoshimoto. “The use and Security of Data in the Higher Education Environment,” American Society of Business and Behavioral Sciences. February 2009, Las Vegas, NV.
- Schmidt, Mark B.; James E. Weber; Dennis C. Guster, and Paul I. Safonov. “Training Users to Develop Stronger Passwords,” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2009, Orlando, FL.
2008
- M.A.B. Mailewa, S.P.J. Perera, C.A. Munasinghe and T.D.B. Weerasinghe, "Types and Modes Combined Algorithm for Data Encryption and Decryption", in Proceedings of the Peradeniya University Research Sessions (PURSE) 2008, Sri Lanka, Vol. 13, pp 181-182, December 2008
- Schmidt, Mark B. Invited Panel Session: “Current Status of Usage and Applications of Mobile Alert, WiBro, Cellular TV, and Web 2.0,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2008, Baltimore, MD.
- Ghosh, T., Zhu, H., Modeling Trust in Wireless Ad-Hoc Networks. Novel Algorithms and Techniques in Telecommunications and Networking, by T. Sobh (Ed.). Springer, DOI: 10.1007/978-90-481-3662-9_37, pp. 217-221, 2010. (Initial results presented in the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE ’08), December 5-13, 2008).
- Kirmani, E. and Hood, C. "A New Approach to Analysis of Interval Availability,” Proceedings of the Third International Conference on Availability, Security and Reliability ((ARES 2008), Edited by S. Jakoubi, S. Tjoa, and E.R. Weippl), pp.479-483; IEEE, Piscataway, NJ; 2008.
- Schmidt, Mark B.; Debjani Das; Vijay Kumar; and Ernst Bekkering. “A Proposed Study and Analysis of User Perceptions of Biometric Acceptance,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2008, Baltimore, MD.
- Guster, D. C., & Herath, S. (2008). Analysis of Vulnerabilities in a Global Authentication System in a University Based Distributed Processing Laboratory. Omaha, Nebraska: Proceedings of the 3rd International Conference on Information Warfare and Security.
- Guster, Dennis C.; Mark B. Schmidt; Charles Hall; and Chris Brown. “A Preliminary Analysis of Web Accessible Distributed Data Mining: Performance and Scalability,” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2008, Orlando, FL.
- Dennis Guster, C. H., Herath, S., Jansen, B., & Mikluch, L. (2008). A Comparison of Popular Global Authentication Systems. A Comparison of Popular Global Authentication Systems” A paper presented at the Third The International Conference on Information Warfare and Security (ICIW). Omaha, NE.
- Herath, S. (2008, August 08). Contingency Planning for Secure Information Systems. Presentation at the Information Security, Aizu Wakamatsu, Fuskushima.
- Herath, S. (2008, August 08). Policies for Information System Security. Presentation at the Information Security, Aizu Wakamatsu, Fukushima.
- Herath, S. (2008, June 24). Information Security and IT Risk Management. Presentation at the Risk Management, Iizuka, Fukuoka.
2007
- Ghosh, T., & Pratt, B. (December, 2007). Routing Table Instability in Real-world Ad-Hoc Network Testbed. Proc. International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007).
- You, L., & Guster, D. (2007). A Secure communication protocol to support client and server computing. Southwestern Decision Sciences Conference. San Diego, CA.
- Schmidt, M. B. (November, 2007). Invited Panel Session: “Mobile Wireless Services and Business: Present and Future,. Proceedings of the National Decision Sciences Institute (DSI) Conference. Phoenix, AZ.
- Chen, Jim Q.; Mark B. Schmidt; Dien D. Phan; and Kirk P. Arnett. “E-commerce Security Threats, Awareness, Trust, and Security Practices: An Assessment of Perceptions,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2007, Phoenix, AZ.
- Schmidt, Mark B.; Jim Q. Chen; Dien D. Phan; and Kirk P. Arnett. “Comparing Security Perceptions of E-Commerce Users,” Proceedings of the 2007 Americas Conference on Information Systems (AMCIS). August 2007, Keystone, CO. Nominee for Best Paper Award.
- Schmidt, Mark B. and Kirk P. Arnett. “Synthesis and Analysis of Moore and Benbasat’s PCI and Witte’s Susceptibility and Severity of Threat Scales,” Proceedings of the 2007 Americas Conference on Information Systems (AMCIS). August 2007, Keystone, CO.
- Schmidt, Mark B.; Allen C. Johnson; and Kirk P. Arnett. “US and Korean Perspectives on Malware: A Closer Look.” International Academy of Business Disciplines (IABD). April 2007, Orlando, FL.
- McDermott, Sherry; Mark B. Schmidt; and Gary Yoshimoto. “NSA Electronic Surveillance Database,” American Society of Business and Behavioral Sciences. February 2007, Las Vegas, NV.
2006
- Schmidt, Mark B.; Dennis C. Guster; and Richard Sundheim. “An Empirical Analysis of Network Packet Traffic Protocols,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2006, San Antonio, TX.
- Schmidt, Mark B. Invited Panel Session: “Current Status of Usage and Applications of Podcasting, Weblog, Camtasia, RFID, and Mobile TV,” “Wireless Security for RFID & Other Devices.” National Decision Sciences Institute (DSI) Conference. November 2006, San Antonio, TX.
- Schmidt, Mark B.; Mark D. Nordby; and Dennis C. Guster. “Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch,” International Academy of Business Disciplines (IABD). April 2006, San Diego, CA.
- Schmidt, Mark B.; Jim Q. Chen; James E. Weber. “An Analysis of Data Warehousing to Promote National Security,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2006, San Antonio, TX.
- Shropshire, Jordan; Merrill Warkentin; Allen C. Johnston; and Mark B. Schmidt. “Personality and IT Security: An Application of the Five-factor Model,” Proceedings of the 2006 Americas Conference on Information Systems (AMCIS). August 2006, Acapulco, Mexico.
- Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “An Empirical Investigation of Rootkit Awareness,”International Academy of Business Disciplines (IABD). April 2006, San Diego, CA.
- Ghosh, T.; Pissinou, N. Makki; K., Farhat, A.; “A Framework for Computing Trust in Mobile Ad Hoc Networks”, in Proc. WSPWN’06, Miami, Florida, March 15-16, 2006.
- Herath, A., Herath, S. (2006). Case Studies for Learning Software Security Engineering. Aizu Wakamatsu, Japan: 9th International Conference on Humans and Computers Proceedings.
- Weber, J., Guster, D., & Safonov, P. (2006). Password Security and Weak Passwords: A Developmental Perspective. Mountain Plains Management Conference. Orem, UT.
2005
- Guster, D., Safonov, P., & Sultanov, R. (2005). Using the Linux Operating System to Illustrate Message Digest Concepts and Vulnerabilities. Midwest Instructional Computing Symposium Conference. Eau Claire, WI.
- Kirmani, E. and Hood, C. “Random Scanning Models of Worm Propagation with Constant and Nonhomogenous Contact Rates,” Proceedings of the Network/Computer Security Workshop, Lehigh University, August 4-5, 2005, Bethlehem, PA.
- Guster, D., Safonov, P., Podkorytov, D., & Sultanov, R. (2005). Tightening Computer Security by Automating OS Attribute Configuration. Midwest Instructional Computing Symposium Conference. Eau Claire, WI.
- Herath, S. (2005, November 1). Computer Forensics, Information Security and Law: A Case Study. Presentation at the 2005 Digital Forensic Engineering International Workshop.
2004
- Guster, D., Safonov, P., Podkorytov, D., & Hall, C. (2004). Business Computer Information Systems Security Against Hacking Attacks: Application of Distributed Processing and Software Modifiers in Defense of Password Files. Academy of Business Administration National Conference. Las Vegas, NV.
- Kirmani, E. and Hood, C. “Diagnosing Network States Through Intelligent Probing,” Proceedings of the 2004 IEEE/IFIP Network Operations and Management Symposium (NOMS 2004), Volume 1, pp. 147-160; IEEE, Piscataway, NJ; 2004.
- Guster, D., Safonov, P., Podkorytov, D., & Rudenko, A. (2004). Development of an Enhanced Security Strategy for Linux Hosts. Midwest Instructional Computing Symposium Conference. Morris, MN.
- Herath, S. (2004). Application of Computer Forensics in Information Security and Law. Aizu Wakamatsu, Japan: 7th International Conference on Humans and Computers Proceedings.
- Schmidt, Mark B; Allen C. Johnston; and Kirk P. Arnett. "Wireless Network Security in Hospitality SMEs," Proceedings of the 2004 Americas Conference on Information Systems (AMCIS). August 2004, New York, NY.
- Ghosh, T.; Pissinou, N.; Makki, K.; “Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad Hoc Networks”, in Proceedings of the 29th IEEE Annual Conference on Local Computer Networks (LCN), Nov 16-18, Tampa, USA, 2004.
- Pissinou, N.; Ghosh, T.; Makki, K.; “Collaborative Trust-based Secure Routing in Multihop Ad Hoc Networks”, in Proceedings of The Third IFIP-TC6 Networking Conference (Networking '04), Athens, Greece, May 9-14, 2004.
- Schmidt, Mark B. “Steganography: New Techniques for an Ancient Practice,” Proceedings of the 2004 Security Conference, April 2004, Las Vegas, NV.
- Warkentin, Merrill; Mark B. Schmidt; Allen C. Johnston; and Matthew Boren. "IS Security Management Framework: A Comprehensive Life Cycle Perspective," Proceedings of the 2004 Information Resources Management Association (IRMA). May 2004, New Orleans, LA.
- Schmidt, Mark B.; Ernst Bekkering; and Merrill Warkentin. "On the Illicit Use of Steganography and Its Detection," Proceedings of the 2004 ISOneWorld International Conference. April 2004, Las Vegas, NV.
- Johnston, Allen C.; Mark B. Schmidt; and Ernst Bekkering. "IT Security Management Practices: Successes and Failures in Coping with Blaster and Sobig.F," Proceedings of the 2004 ISOneWorld International Conference. April 2004, Las Vegas, NV.
2003
- Warkentin, Merrill and Mark B. Schmidt. "Evaluating Executive Perceptions of IS Security Threats and Responses: A Post 9/11 Critique,” Proceedings of the 2003 ISOneWorld International Conference, April 2003, Las Vegas, NV.
- Schmidt, Mark B. and Allen C. Johnston. "Biometric Controls Used to Secure Access at Mississippi State University," Proceedings of the 2003 Security Conference, April 2003, Las Vegas, NV.
- Bekkering, Ernst and Mark B. Schmidt. "A Discussion of Biometric Security Trade-offs," Proceedings of the 2003 Security Conference, April 2003, Las Vegas, NV.
- Guster, D., Al-Hamamah, A., & Safonov, P. (2003). Network Security Log Information: A Preliminary Analysis. Midwest Instructional Computing Symposium. Duluth, MN.
2002
- Herath, S., Herath, J., Herath, A. (2002, June 24). Information Security Courses based on Applications of Management Techniques in Digital Systems for B. Presentation at the Security and Management, Las Vegas, NV.
2001
- Guster, D., & Krivulin, N. (2001). Modeling and Performance Evaluation of Computer Systems Security Operation. 4th St. Petersburg Workshop on Simulation. St. Petersburg, Russia.
1997
- Tomović, Aleksandar,"Industry Automation: Processing Dimensional Stone", IFAC-Belfort France,Control of Industrial Systems, May 20-22,1997,pp.210..215
Book chapters
2018
- Alsubaei, Faisal, Abdullah Abuhussein, and Sajjan Shiva. "An overview of enabling technologies for the Internet of Things." Internet of Things A to Z: Technologies and Applications (2018): 77-112.
- Volkmuth, B., Abuhussein, A. , Electronic Payment Methods: Security, Privacy, and Trust, Book Chapter, Book Title: E-commerce data security with Cloud Computing , by Ramon Sanguino and Dennis Guster, Publisher: Cambridge Scholar, August, 2018.
- Guster, Dennis C. and Olivia F. Lee “Effective Infrastructure Protection Through Virtualization,” ICT Ethics and Security in the 21st Century: New Developments and Applications. IGI Global Publisher, In press.
2010
- Ghosh, Tirthankar and H. Xu. "Modeling Trust in Wireless Ad-Hoc Networks," in Novel Algorithms and Techniques in Telecommunications and Networking, by T. Sobh (Ed.). Springer, DOI: 10.1007/978-90-481-3662-9_37, pp. 217-221, 2010.
- Schmidt, Mark B.; Allen C. Johnston; Kirk P. Arnett; Jim Q. Chen, and Li Suicheng. “Discovering Computer Security Awareness Among U.S. and Chinese Computer Users.” ICTs Technological Advancement in Developed and Developing Countries: Discoveries in Global Information Management” (Advances in Global Information Management series).
2009
- Guster, Dennis; Mark B. Schmidt; Renat Sultanov; and Charles Hall. “Analyzing bandwidth usage in a distributed processing environment.” In Selected Topics in Communication Networks and Distributed Systems, edited by Dr. Sudip Misra, Dr. Subhas C. Misra and Dr. Issac Woungang. Singapore: World Scientific. 2009.
- Arnett, Kirk P.; Mark B. Schmidt; Allen C. Johnston; Jongki Kim; and HaJin Hwang. “Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions,” in Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical and Human Issues, Hamid R. Nemati (Ed.), IGI Global, 2009.
2008
- Warkentin, Merrill; Mark B. Schmidt; and Ernst Bekkering. "Steganography," in Cyber Warfare and Cyber Terrorism, Lech J. Janczewski, and Andrew M. Colarik (Eds.), Hershey, PA: Information Science Reference, 2008, Chapter VII, pp. 50-56.
2007
- Warkentin, Merrill; Mark B. Schmidt, and Ernest Bekkering. “Steganography and Steganalysis,” in Intellectual Property Protection for Multimedia Information Technology, Sasaki, Hidevasu (Ed.), IGI Global, 2007, Chapter XIX, pp. 374-380. This chapter is a reprint of an earlier book chapter with the same title.
- Hanson, Jan M. and Mark B. Schmidt. “Secure Automated Clearing House Transactions” in Encyclopedia of Information Ethics and Security, Marion Quigley (Ed.), Information Science Reference (formerly Idea Group Reference), Hershey, PA: 2007.
- Becker, Reggie G.; Mark B. Schmidt; and Allen C. Johnston. “Mitigation of Identity Theft in the Information Age” in Encyclopedia of Information Ethics and Security, Marion Quigley (Ed.), Information Science Reference (formerly Idea Group Reference), Hershey, PA: 2007.
- Ghosh, T.; Pissinou, N.; Makki, K.; Farhat, A.; “A Framework for Computing Trust in Mobile Ad Hoc Networks”, Mobile and Wireless Network Security and Privacy, ed. by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0. July 2007.
- Ghosh, T.; Pissinou, N.; Makki, K.; Farhat, A.; “A Framework for Computing Trust in Mobile Ad Hoc Networks”, Mobile and Wireless Network Security and Privacy, ed. by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0. July 2007.
- Reiher, R.; Makki, S.K.; Pissinou, N.; Makki, K.; Burmester, M.; Van, T.L.; Ghosh, T. “Security and Privacy for Mobile and Wireless Networks”, Mobile and Wireless Network Security and Privacy, ed. by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0 July 2007.
2006
- Warkentin, Merrill; Mark B. Schmidt; and Ernst Bekkering. “Steganography, and Steganalysis,” Chapter XVII, p 287-25, in Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Merrill Warkentin and Rayford B. Vaughn (Eds.), Hershey, PA: Idea Group Publishers, 2006.
2004
- Pissinou, N.; Ghosh, T.; Makki, K.; “ Collaborative Trust-based Secure Routing in Multihop Ad Hoc Networks”, Springer Verlag, Series:Lecture Notes in Computer Science, vol 3042, pp 1446 - 1451, ISBN: 978-3-540-21959-0. April 2004.
Other publications
2021
- Tomović, Aleksandar, "Engagement Theory based Interpretative Phenomenological Analysis of Computer Science Students’ Perceptions of Their Learning Engagement Using Mobile Devices" (2021). Culminating Projects in Higher Education Administration. 52.
https://repository.stcloudstate.edu/hied_etds/52
2014
- Tomović, Aleksandar, "Implementing Lensless Cameras in Autonomous Robotic Systems" (2014). Culminating Projects in Computer Science and Information Technology. 1.
https://repository.stcloudstate.edu/csit_etds/1
2004
- Kirmani, E. “Modeling of Fault Diagnosis, Dependability, and Performability of Computer Systems,” Technical Report TR-NSL-04-01, Department of Computer Science, Illinois Institute of Technology, Chicago, Illinois, 98 pages, 2004.
2003
- Schmidt, Mark B. Book Review. Byte Wars: the Impact of September 11 on Information Technology by Edward Yourdon. Journal of End User Computing, Volume 15, NO. 3, July-September 2003.
- Kirmani, E. “Modeling Fault Management in Communication Networks,” Technical Report TR-NSL-03-01, Department of Computer Science, Illinois Institute of Technology, Chicago, Illinois, 83 pages, 2003.
Student Research Colloquium
2013
Can a Distributed Key System Broken up Over Multiple Nodes Provide Greater Security Robustness While Meeting System Performance Requirements?
by James Redman, Erich Rice, Sen Han, Richard Anderson, Ben Paulson, and Joel Schwarting
Faculty Sponsor: Dennis Guster
Analysis of Used Hard Drives Using Computer Forensics Tool
by Dipendra Tripathi and Badri Paudel
Faculty Sponsor: Mark Schmidt
Computer Crime Analysis Using Digital Forensics
by Kasun Abeykoon and Thusith Abeykoon
Faculty Sponsor: Mark Schmidt
Solving a Virtual Crime Using Digital Forensics Tools
by Michael Biehl and Bashar Shehadeh
Faculty Sponsor: Mark Schmidt
Computer Forensics Project
by Zepu Chen and Liheng Xu
Faculty Sponsor: Mark Schmidt
Fictitious Crime Investigation Using Digital Forensics
by Dibesh Tuladhar and Priyanka Tamanag
Faculty Sponsor: Mark Schmidt
Computer Forensics Case Solutions
by Venkata Tetali and Rachel Robarge
Faculty Sponsor: Mark Schmidt
Mobile Forensics Analysis
by Subash Adhikari and Evans Ofori-Amoah
Faculty Sponsor: Mark Schmidt
Digital Tracing: Revolutionary Methods for Crime Scene Investigation
by Sai Mohit Muddu and Koushik Chilukuri
Faculty Sponsor: Mark Schmidt
A Digital Forensic Quandary: Who Done it?
by Erich Rice and Deepak G.C.
Faculty Sponsor: Mark Schmidt
Analysis of Solid State Drive
by Sandesh Malla and James Redman
Faculty Sponsor: Mark Schmidt
I Have No Idea What is Installed in my Machine
By Alassane Ba
Faculty Sponsor: Susantha Herath
Vivid-Pass: A Dual Layer Authentication Method With Custom-Made Security Features
by Bashar Shehadeh
Faculty Sponsor: Qingjun Chen
2012
Analyzing Behavior of Operating Systems to Crafted Packets Using Scapy
by Kasun Abeykoon and Thusith Abeykoon
Faculty Sponsor: Tirthankar Ghosh
TCP/IP Packet Manipulation
by Jonathan Ray, Bachar Chehada and Michael Biehl
Faculty Sponsor: Tirthankar Ghosh
Comparison Between Two Computer Forensic Programs
by Feras Al-Mansour
Faculty Sponsor: Mark Schmidt
Spam Forensics
by Prabkhar Neupane
Faculty Sponsor: Mark Schmidt
2011
Is Your Data Really Gone?
by Antony Forster
Faculty Sponsor: Mark Schmidt
Virtual Machine Forensics
by Michael J. Condon
Faculty Sponsor: Mark Schmidt
Bermuda Triangle: Computer Forensics to Solve a Fictitious Murder Case
by Eric Owen and Rashmi Rai
Faculty Sponsor: Mark Schmidt
I Know What you did – Your Hard Drive Told me
by Mandeep Pradhan and Sagun Sthapit
Faculty Sponsor: Mark Schmidt
Revealing Encrypted Data for use in Digital Forensics
by Dustin Rogers
Faculty Sponsor: Mark Schmidt
What was Lost can now be Found: A look into Data Recovery with Digital Forensics
by Jonathan Ray
Faculty Sponsor: Mark Schmidt
Computer Forensics: A Fictitious Case Study
by Tenashe Mubvumbi and Menna Tesfaye
Faculty Sponsor: Mark Schmidt
Digital Forensics in the Real World
by Larry Sundberg
Faculty Sponsor: Mark Schmidt
The Importance of Forensics Tools in Modern Computer Forensics
by Charitha Hettiarachchi and Imali Arthanayaka
Faculty Sponsor: Mark Schmidt
A Practical Approach to Computer Forensic Investigations
by Kyaw H. Thaung
Faculty Sponsor: Mark Schmidt
2010
High Performance/Green Computing
by Corey Hemminger and Dustin Rogers
Faculty Sponsor: Dennis Guster
The Cell Phone. A criminals best friend or worst enemy
by Steve Minkler
Faculty Sponsor: Mark Schmidt
2009
BCRL Global Authentication Using LDAP with Kerberos
by Corey Hemminger , Joseph T. Meunier, and Christopher Schroeder
Faculty Sponsor: Dennis Guster
Using Virtual Hosts to Reduce Complexity and Foster “Green” Computing in an Instructional/Research Oriented Computer Domain
by Corey Hemminger, Joseph T. Meunier, and Christopher Schroeder
Faculty Sponsor: Dennis Guster
Computer Forensics: Data Retrieval Methodologies
by Condon, Michael
Faculty Sponsor: Mark Schmidt
Hard Drive Analysis
by Dangol, Sabina, and Khan, Aneeqa
Faculty Sponsor: Mark Schmidt
A Proposed Study and Analysis of User Perceptions of Biometric Acceptance
by Das, Debjani
Faculty Sponsor: Mark Schmidt
Live Forensics
by Guragain, Rekha
Faculty Sponsor: Mark Schmidt
Data Aquisition and Analysis in Computer Forensics: Acquiring an Image and Analyzing the Digital Information of a Hard Drive
by Hou, Tian
Faculty Sponsor: Mark Schmidt