Cyber Research Center

 

CRC Supported Publications

 
Academic Year 2017 - 2018

Carley, Kathleen M & Morgan, Geoffrey & Lanham, Michael. (2017). Deterring the Development and Use of Nuclear Weapons: A Multi-Level Modeling Approach. Journal of Defense Modeling and Simulation, 14, 95-105.

Rivera, J., (2017). Cyber Defense via Event-Based Modeling. 28th Annual IEEE Software Technology Conference (STC 2017), Gaithersburg, MD, USA.

Rivera, J., (2017). Cyber Security via Formal Methods. International Conference on Cyber Conflict U.S. (2017 CyCon U.S.), Washington, D.C., USA.

David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli. "A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.

Gregory Conti, John Nelson, and David Raymond. "Towards a Cyber Common Operating Picture." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.

Lisa Shay, Gregory Conti, and Woodrow Hartzog. "Beyond Sunglasses and Spray Paint: A Taxonomy of Countermeasures Against Overly-Intrusive Surveillance." IEEE International Symposium on Technology and Society (ISTAS), Toronto, June 2013.

P Shakarian, Jana Shakarian, Andrew Ruef; Introduction to Cyber-Warfare: A Multidisciplinary Approach, Syngress/Elsevier; 2013.

Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti. "Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm." We Robot, Stanford, April 2013. (24% selection rate) datasets Ars Technica, Slashdot, and San Francisco Chronicle coverage.

Matthew Miller, Jonalan Brickey, and Gregory Conti, " Why Your Intuition About Cyber Warfare is Probably Wrong ," Small Wars Journal, 29 Novermber 2012. SWJ coverage

Lisa Shay, Gregory Conti, Dominic Larkin and John Nelson. "A Framework for Analysis of Quotidian Exposure in an Instrumented World." IEEE Carnahan Conference on Security Technology, Boston, October 2012.

J. Brickey, J. Cox, and J. Nelson, G. Conti, " The Case For Cyber ;" Small Wars Journal, September 13, 2012.

Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Alex Farmer, Cory Kirk, Patrick Shaffer, and Kyle Stammer; "Unintended, Malicious, and Evil Applications of Augmented Reality;" InSecure, Issue 35, September 2012, pp. TBD. (Accepted, to be published)

"A Probabilistic Framework for the Localization of Attackers in MANETs. " Massimilano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian, 17th European Symposium on Research in Computer Security (ESORICS 2012), accepted, to be presented in Sep. 2012.

Paulo Shakarian," Stuxnet: Revolucion de la Ciberguerra en los Asuntos Militares ." Air and Space Power Journal, Edicion en Espanol; Vol. 24, No.3, Third Quarter, 2012.

Academic Year 2016 - 2017

K. M. Carley, G. P. Morgan, and M. J. Lanham, "Deterring the Development and Use of Nuclear Weapons: A Multi-Level Modeling Approach," Journal of Defense Modeling and Simulation, vol. 14, p. 95, 2016.

Academic Year 2015 - 2016

N/A

Academic Year 2014 - 2015

N/A

Academic Year 2013 - 2014

W. M. Petullo, X. Zhang, J. A. Solworth, D. J. Bernstein, and T. Lange, "MinimaLT: minimal-latency networking through better security," presented at the Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, 2013.

Academic Year 2012 - 2013

Massimilano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian, " A Probabilistic Framework for the Localization of Attackers in MANETs ," 17th European Symposium on Research in Computer Security (ESORICS 2012), accepted, to be presented in Sep. 2012.

J. Brickey, J. Cox, and J. Nelson, G. Conti, " The Case For Cyber ;" Small Wars Journal, September 13, 2012.

Gregory Conti, John Nelson, and David Raymond. "Towards a Cyber Common Operating Picture." http://www.airpower.au.af.mil/apjinternational/apj-s/2012/2012-3/2012_3_06_shakarian_s.pdf International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.

Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Alex Farmer, Cory Kirk, Patrick Shaffer, and Kyle Stammer; "Unintended, Malicious, and Evil Applications of Augmented Reality;" InSecure, Issue 35, September 2012, pp. TBD. (Accepted, to be published)

Matthew Miller, Jonalan Brickey, and Gregory Conti, " Why Your Intuition About Cyber Warfare is Probably Wrong ," Small Wars Journal, 29 Novermber 2012. SWJ coverage

David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli. "A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.

P Shakarian, Jana Shakarian, Andrew Ruef; Introduction to Cyber-Warfare: A Multidisciplinary Approach, Syngress/Elsevier; 2013.

Paulo Shakarian,"Stuxnet: Revolucion de la Ciberguerra en los Asuntos Militares." Air and Space Power Journal, Edicion en Espanol; Vol. 24, No.3, Third Quarter, 2012.

Lisa Shay, Gregory Conti, Dominic Larkin and John Nelson. "A Framework for Analysis of Quotidian Exposure in an Instrumented World." IEEE Carnahan Conference on Security Technology, Boston, October 2012.

Lisa Shay, Gregory Conti, and Woodrow Hartzog. "Beyond Sunglasses and Spray Paint: A Taxonomy of Countermeasures Against Overly-Intrusive Surveillance." IEEE International Symposium on Technology and Society (ISTAS), Toronto, June 2013.

Adam Waksman and Simha Sethumadhaven and Julianna Eum. "Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property." IEEE Design & Test, May 2013.

Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti. "Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm." We Robot, Stanford, April 2013. (24% selection rate) datasets Ars Technica, Slashdot, and San Francisco Chronicle coverage.

Academic Year 2011 - 2012

Greg Conti, Lisa Shay, and Woody Hartzog. " Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement ." DEFCON 20, Las Vegas, July 2012.  Bloomberg coverage .

Lisa Shay and Greg Conti. "Countermeasures: Proactive Self-Defense Against Ubiquitous Surveillance." HOPE, New York City, July 2012. Off the Hook and Computerworld coverage.

Robert Fanelli and Gregory Conti. " A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict ." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2012.

Thomas Cook, Gregory Conti, and David Raymond. " When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat ." Colloquium for Information Systems Security Education, June 2012

Lisa Shay, Woodrow Hartzog, John Nelson, Dominic Larkin and Gregory Conti. " Confronting Automated Law Enforcement ." We Robot, Miami, April 2012.

David Raymond and Gregory Conti, "Preventing a Digital Pearl Harbor," West Point, Spring 2012.

James Caroland and Greg Conti. " Lessons of the Kobayashi Maru: Cheating is Fundamental ." Shmoocon, January 2012. (April 2012 SOURCE Boston Extented Version)  PDF Slides

Gregory Conti, "Stone Turnings of Baghdad." American Woodturner Journal,December 2011, Vol. 26, No. 6, pp. 43-45.

Gregory Conti, James Caroland, Thomas Cook, and Howard Taylor; " Self-Development for Cyber Warriors ;" Small Wars Journal, 10 November 2011.

Academic Year 2010 - 2011

D. Aucsmith, G. Conti, D. Dagon, et al., "The Evolving Nature of Cyber Security Threats." Georgia Tech Security Summit, 7 October 2010.

G. Conti and J. Caroland; "Embracing the Kobayashi Maru - Why You Should Teach Your Students to Cheat;" IEEE Security and Privacy, July/August 2011.

G. Conti, T. Babbitt, and J. Nelson; " Hacking Competitions and Their Untapped Potential for Security Education ;" IEEE Security and Privacy, May/June 2011.

G. Conti, S. Bratus, B. Sangster, R. Ragsdale, M. Supan, A. Lichtenberg, R. Perez and A. Shubina; "Automated Mapping of Large Binary Objects Using Primitive Fragment Type Classification; Digital Forensics Research Conference (DFRWS); August 2010.

G. Conti and D. Raymond; " Leadership of Cyber Warriors: Enduring Principles and New Directions ;" Small Wars Journal, 11 July 2011.

R. Fanelli, T. OConnor; "Experiences with Practice-Focused Undergraduate Security Education", Cyber Security Experimentation and Test Workshop, USENIX Security, Aug 2010.

R. Fanelli, J. Henbest, D. Manson, et al., "The Value and Challenges of Cybersecurity Competitions." Department of Homeland Security / Stanford Research Institute Infosec Technology Transition Council (ITTC) Meeting, 29 September 10.

G. Johnson, P. Shakarian, N. Gupta, A. Agrawala. " Towards Shrink-Wrapped Security: A Logic Based Framework for the Dynamic Adaptation of Permission ." Intl. Symposium on Frontiers in Ambient and Mobile Systems(FAMS-2011); 2011.

T. OConnor "Detecting and Responding to Data Link Layer Attacks." Submitted to SANS Reading Room for GIAC Gold Intrusion Analyst Certification, 11 Oct 2010.

Rivera, J., Auguston, M., Finkbine, R. (2011) Modeling Methodology for Validation and Verification of System Architecture Designs, 23rd Annual Systems & Software Technology Conference (SSTC 2011), Salt Lake City, Utah.

M. Weigand, B. Haines; "Wireless Mayhem From the Skies"; DEFCON 18 Presentation; August 2010.

Academic Year 2009 - 2010

G. Conti, S. Bratus, A. Shubina, A. Lichtenberg, R. Ragsdale, R. Perez-Alemany, B. Sangster, and M. Supan; "A Visual Study of Binary Fragment Types"; Black Hat USA; White Paper; July 2010.

J. Doty J, T. OConnor, Gelineau J.; "Technology's limits: The best leader is a human, not a machine" Armed Forces Journal, September 2009.

T. OConnor; "Grow Your Own Tools: A Taxonomy of Python Libraries Helpful for Forensic Analysis", submitted to SANS Library for GIAC Gold Forensic Analyst Certification

T. OConnor, J. Doty; "We Need Teams of Cyber Warriors" Army Magazine, January 2010.

T. OConnor, B. Sangster, E. Dean; "Using Hacking To Teach Computer Science Fundamentals", American Society for Engineering Education (ASEE) Presentation, March 2010.

T. OConnor, B. Sangster; "HoneyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices," WISEC 2010 Conference Proceedings, 2010 ACM Conference on Wireless Network Security, March 2010

J. Rivera, "Applying Architecture Modeling Methodology to the Naval Gunship Software Safety Domain". ACM/IEEE 13th International Conference on Model Driven Engineering Language and Systems. Oslo, Norway, 2010.

B. Sangster, R. Ragsdale, G. Conti; "Automated Mapping of Large Binary Objects; Shmoocon; Work in Progress Talk; February 2009.M. Weigand; "Build Your Own Predator at a 99% discount"; ShmooCon Presentation; February 2010.

B. Sangster, T. OConnor, T. Cook, R. Fanelli, E. Dean, W. Adams, C. Morrell, G. Conti; "Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets," 2nd Workshop on Cyber Security Experimentation and Test, Aug. 2009.

Academic Year 2008 - 2009

J. Doty, T. OConnor; "Leadership Versus Information Technology Management-Where Do We Go From Here?" Army Magazine, pp. 20-22, February 2009.

T. OConnor, D. Reeves; "Bluetooth Network-Based Misuse Detection," ACSAC 2008 Conference Proceedings, pp.377-391, 2008 Annual Computer Security Applications Conference, December 2008

G. Conti, E. Dean, M. Sinda, and B. Sangster; "Visual Reverse Engineering of Binary and Data Files;" Workshop on Visualization for Computer Security (VizSEC); September 2008.

G. Conti. “Could Googling Take Down a President, a Prime Minister, or an Average Citizen?” DEFCON, August 2008. (accepted for presentation)

G. Conti and E. Dean. “Visual Forensic Analysis and Reverse Engineering of Binary Data,” Black Hat USA, August 2008. (accepted for presentation)

Academic Year 2007 - 2008

W. J. Adams and N. J. Davis, IV, “Validating a Trust-based Access Control System,” In the Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2007), Moncton, NB, 29 July – 3 August 2007

G. Conti; Security Data Visualization, No Starch Press; September 2007.

K. Abdullah, G. Conti and E. Sobiesk; " Self-monitoring of Web-based Information Disclosure ;" Workshop on Privacy in the Electronic Society; October 2007.

G. Jacoby and S. Mosley, “Mobile Security Using Separated Deep Packet Inspection,” 5th IEEE Consumer Communications and Networking Conference (CCNC08), January 2008.

G. Conti, “Could Googling Take Down a President,” Communications of the ACM, January 2008.

S. Abbott-McCune, A. Newtson, R. Ross, R. Ware, and G. Conti. “Free visualization tools for security analysis and network monitoring.” INSECURE, Issue 15, February 2008, pp. 18-25.

P. Renals, J. Chamberlin, and G. Jacoby, "Skype-Snype – Defending the Network," Final Technical Report, April 2008.

S. Mosley and G. Jacoby, "A Reconfiguration of Mobile Clustering Architecture for Enhanced and Reliable Small Unit Computing,” IEEE Canadian Conference on Electrical and Computer Engineering (CCECE08), May 2008.

K. Abdullah, G. Conti, and R. Beyah. “A Visualization Framework for Self-monitoring of Web-based Information Disclosure.” IEEE International Conference on Communications (ICC), May 2008.

G. Conti. “Evil Interfaces: Violating the User.” Hackers of Planet Earth: The Last HOPE, July 2008. (accepted for presentation)

Academic Year 2006 - 2007

S. Dehney, RFID Security Primer Technical Report, August 2006

G. Jacoby and J. Blair, “An Undergraduate Success Story: A Computer Science and Electrical Engineering Integrative Experience,” IEEE Pervasive Computing, August 2006.

G. Jacoby and Nathaniel J. Davis IV, “Mobile Host-Based Intrusion Detection and Attack Identification,” IEEE Wireless Communications Journal, Fall 2006.

G. Jacoby, Randy Marchany and Nathaniel J. Davis IV, “Using Battery Constraints Within Mobile Hosts To Improve Network Security,” IEEE Security & Privacy Magazine, September 2006.

S. Ransbottom and G. Jacoby, “Mobile Triage in Support of Effective Reporting (ER),” Military Communications Conference (MILCOM06), 23-25 October 2006.

G. Conti; " Googling Considered Harmful ;" New Security Paradigms Workshop; October 2006.

G. Jacoby and N. J. Davis IV, “Mobile Host-Based Intrusion Detection and Attack Identification,” IEEE Wireless Communications Journal, Fall 2006.

G. Jacoby and N. J. Davis IV, “Achieving Mobile Host-Based Security,” ACM Transactions on Information and System Security Journal, 2006.

G. Jacoby, R. Marchany, and N. J. Davis IV, “Using Battery Constraints Within Mobile Hosts To Improve Network Security,” IEEE Security & Privacy Magazine, September 2006.

S. Ransbottom and G. Jacoby, “Mobile Triage in Support of Effective Reporting (ER),” Military Communications Conference (MILCOM06), 23-25 October 2006

R. Dodge, C. Carver, and A. Ferguson, “Phishing for user security awareness,” Computers and Security, Computers & Security, Volume 26, pages 73-80, February, 2007

E. Sobiesk and G. Conti; "The Cost of Free Web Tools;" IEEE Security and Privacy, May/June 2007.

R. Dodge, and D. Ragsdale, " Remote Virtual Information Assurance Network," Proceedings of the 22nd IFIP International Information Security Conference, Sandton, South Africa, May, 2007.

G. Jacoby and N. Davis, “Mobile Host-Based Intrusion Detection and Attack Identification,” IEEE Wireless Communications Journal, vol. 14, no. 3, pp. 1-15, June, 2007.

S. Mosley, M. Potasznik, K. Davis, R. Stevens, M. Ballmann, B. Ancheta, and G. Jacoby, “FLIP - Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline Hardware Implementation,” Proceedings from The 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing, June 2007.

Proceedings of the Seventh Annual IEEE SMC Information Assurance Workshop, West Point, NY. June 15-17, 2007.

E. Sobiesk and G. Conti, "The Cost of Free Web Tools;" IEEE Security and Privacy, May/June 2007.

G. Conti. “Satellite Imagery Analysis,” DEFCON, July 2007.

G. Conti and E. Sobiesk; " An Honest Man Has Nothing to Fear: User Perceptions on Web-based Information Disclosure ;" Symposium on Usable Privacy and Security (SOUPS); July 2007.

Academic Year 2005 - 2006

G. Jacoby and Luqi, “Critical Business Requirements Model and Metrics for Intranet ROI,” Journal of Electronic Commerce Research, vol. 6, no. 1, pp. 1-30, 2005. 

S. Krasser, G. Conti, J. Grizzard, J. Gribschaw and H. Owen; "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization;" IEEE Information Assurance Workshop (IAW); June 2005.

K. Abdullah, C. Lee, G. Conti and J. Copeland; "Visualizing Network Data for Intrusion Detection;" IEEE Information Assurance Workshop (IAW); June 2005.

G. Hadjichristofi, W. J. Adams, N. Davis, "A Framework for Key Management in a Mobile Ad-Hoc Network," In the International Journal of Information Technology, v11,(2) pp 31-61.

G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005.

G. Conti, J. Grizzard, M. Ahamad and H. Owen; "Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.

K. Abdullah, C. Lee, G. Conti, J. Copeland and J. Stasko; " IDS RainStorm: Visualizing IDS Alarms;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.

Jackson, J., Ferguson, A., Cobb, M., “Building a University-wide Automated IA Awareness Exercise: The West Point Carronade”, Frontiers in Education Conference, 19-22 October 2005, pp T2E7-10

Ferguson, A., “Duty, Honor, Country and Email Attachments: The West Point Carronade” Educause Quarterly, November 1, 2005, pp 54-57

G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. November/December 2005.

L. J. Hoffman, R. Dodge, T Rosenberg, and D. J. Ragsdale, “Exploring a National Cybersecurity Exercise for Universities,” IEEE Security and Privacy, September 2005, page. 52-58

F. Maymi, P. Manz, “Dismounted soldier Tracking and Strike Warning”, MILCOM 2005, 17-20 October, 2005, Atlantic City, NJ

F. Maymi, R. Brown, CPOF Security Assessment Technical Report, October 2005

P. Curtiss, M. Miller, J. Hill, and D. Massie "Development of a Neural Network Optimizing Controller for Power Generation," 30 NOV 2005. Final Technical Report for DoE agreement DE-AI26-04NT42202.

J. M. D. Hill, D. D. Massie, and L. A. Shay, "Software Architecture of an Intelligent Power Controller for Soldier Systems, Technical Report " 2 SEP 2005 (updated 9 NOV 2005).

G. Jacoby and Nathaniel J. Davis IV, “Battery-Based Intrusion Detection: A Focus on Power for Security Assurance,” 2005 Journal of Space and Aeronautical Engineering, vol. 113, pp. 1818-1829, 2005.

F. Maymi and P. Manz, "Dismounted Soldier Tracking and Strike Warning", presented at the 25th Army Science Conference, 2006

J. James, F. Mabry, L. Shay, and R. Dodge " Network Cognition – Technology Review and Overlay Requirements Analysis," 20 Feb 2006. Interim Technical Report.

G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. Copeland, M. Ahamad, H. Owen and C. Lee;"Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization;" IEEE Computer Graphics and Applications (CG&A), March 2006.

Daniel E. Castle, Aaron Darensburg, Barak Griffin, Thadeus Hickman, Stuart P. Warders, and Grant A. Jacoby, "Gibraltar: A Mobile Host-Based Intrusion Protection System," National Conference on Undergraduate Research, April 2006.

S. Georger, T. Morel, M. Kwinn, R. Dodge, "ANCILE – advanced warning threat indicator," 30 May 2006. Final Technical Report

CDT Brian Boyles, CDT Preston Lopez, and CDT Humberto Nieves, NetFires Cadet Technical Report, May 2006

CDT Michael D. Miller, CDT Michael Pitulej, CDT V. Nathan Pritchard, Voice over Internet Protocol (VoIP) Security Analysis Technical Report, May 2006

CDT D. Drew, CDT D. Meyer, CDT J. Parlee , Project CLADE Cadet Technical Report, May 2006

R. Dodge and J. Hill, Military Academy Attack/Defense Network Simulation NSF Technical Report, May 2006

Frank J. Mabry, John R. James, Aaron J. Ferguson, Unicode Steganographic Exploits: Maintaining Enterprise Border Security, submitted to the IEEE Security and Privacy, May 2006

CDT Ryan E. Collins and CDT Daniel C. Stewart, Voice over Internet Protocol (VoIP) Security Analysis Technical Report, May 2006

R. Dodge, A Ferguson, "Using Phishing for User Email Security Awareness", Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), page 454-458, Karlstadt, Sweden, 22-24, May 2006

G. Conti, "Countering Network Level Denial of Information Attacks Using Information Visualization," Ph.D. Dissertation, Georgia Institute of Technology, May 2006. (Advisor: Mustaque Ahamad)

G. A. Jacoby, CDT T. Hickman, CDT S. P. Warders, CDT B. Griffin, CDT A. Darensburg, and CDT D. E. Castle, “Mobile Intrusion Protection,” Proceedings from The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, June 2006.

T. K. Buennemeyer, G. A. Jacoby, R. C. Marchany, and J. G. Tront, "Battery-Sensing Intrusion Protection System," Proceedings of the 7th IEEE SMC 2006 Information Assurance Workshop, June 2006.

R. Dodge, Chapter Title: "Configuring and Deploying Honeynet Systems," Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Idea Group Publishing, 2006

R Dodge, “The Virtual Guide to Honeynet Deployments”, www.honeynet.org

G. Conti (guest editor); "Hacking and Innovation;" Communications of the ACM (CACM), June 2006.

Timothy K. Buennemeyer, Grant A. Jacoby, Randolph C. Marchany, and Joseph G. Tront, "Battery-Sensing Intrusion Protection System," Proceedings of the 7th IEEE SMC 2006 Information Assurance Workshop, June 2006.

G. Jacoby, Thadeus Hickman, Stuart P. Warders, Barak Griffin, Aaron Darensburg and Daniel E. Castle, “Mobile Intrusion Protection,” Proceedings from The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, June 2006.

G. White, R. Dodge, “The National Collegiate Cyber Defense Competition,”, page 68-75, 10th Colloquium for Information Systems Security Education Washington, DC, June 5-8, 2006.

T. Augustine, R. Dodge, “Cyber Defense Exercise: Meeting Learning Objectives thru Competition,”, page 61-67, 10th Colloquium for Information Systems Security Education Washington, DC, June 5-8, 2006.

Proceedings of the Seventh Annual IEEE SMC Information Assurance Workshop, June 15-17 2006, West Point, NY.

G. Jacoby and Nathaniel J. Davis IV, “Achieving Mobile Host-Based Security,” ACM Transactions on Information and System Security Journal, 2006.