Expand all | Collapse all
Department of Computer Science Faculty
- Ahamed, Dr. Sheikh Iqbal
- Brylow, Dr. Dennis
- Madiraju, Dr. Praveen
- Perouli, Dr. Debbie
- Rubya, Dr. Sabirat
- Schwarz, Dr. Thomas
- Yahyasoltani, Dr. Nasim
- Zimmer, Dr. Michael
Adjunct Faculty (Computer Science)
- Kliemann, Mr. David
- Bhatia, Mr. Chetan
Selected Publications
- Mubashwir Alam, Sagar Sharma, and Keke Chen “SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications”, Privacy Enhancing Technologies Symposium, 2021
- Sagar Sharma and Keke Chen "Confidential Boosting with Random Linear Classifiers for Outsourced User-generated Data", European Symposium on Research in Computer Security (ESORICS), 2019
- Shreyansh Bhatt, Keke Chen, Valerie Shalin, Amit Sheth and Brandon Minnery, “Who should be the captain this week? Leveraging inferred diversity-enhanced crowd wisdom for a Fantasy Premier League prediction task”, International Conference on Web and Social Media (ICWSM), 2019
- Cebe, M., Akkaya, K., Communication-efficient Certificate Revocation Management for Advanced Metering Infrastructure, Elsevier Future Generation Computer System (Accepted-2020)
- Kurt, A., Erdin, E., Cebe, M., Akkaya, K. and Uluagac, A.S., LNBot: A Covert Hybrid Botnet on Bitcoin Lightning Network, European Symposium on Research in Computer Security (ESORICS) conference, (Accepted-2020
- Erdin, E., Cebe, M., Akkaya, K., Solak, S., Bulut, E. and Uluagac, S, A Bitcoin payment network with reduced transaction fees and confirmation times. Computer Networks, 172, (2020)
- Debbie Perouli, Akshay Verma, and Marta Magiera. "Assessing a Group’s Understanding of Cybersecurity through Collective Concept Maps", In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE ’21), March 13–20, 2021, Virtual Event, USA. ACM, New York, NY, USA, 1 page. DOI: 10.1145/3408877.3439673
- Zhou Wu, Andrew Williams, and Debbie Perouli. "Dependable Public Ledger for Policy Compliance, a Blockchain Based Approach". 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 2019, pp. 1891-1900. DOI: 10.1109/ICDCS.2019.00187
- Justin Wang, Dennis Brylow and Debbie Perouli. "Implementing Cybersecurity into the Wisconsin K-12 Classroom". 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), Milwaukee, WI, USA, 2019, pp. 312-317. DOI: 10.1109/COMPSAC.2019.10225
- Yudong Cao, Shuxian Jiang, Debbie Perouli, Sabre Kais;Solving Set Cover with Pairs Problem using Quantum Annealing. Scientific Reports 6 (2016).
- Debbie Perouli, Olaf Maennel, Iain Phillips, Sonia Fahmy, Randy Bush, Rob Austein. "An Experimental Framework for BGP Security Evaluation," IT - Information Technology 55.4 (2013): 147-15
- Debbie Perouli, Timothy G. Griffin, Olaf Maennel, Sonia Fahmy, Cristel Pelsser, Alexander Gurney, Iain Phillips. "Detecting Unsafe BGP Policies in a Flexible World," International Conference on Network Protocols (ICNP), Austin, TX, USA, November 2012.
- Matthew Roughan, Walter Willinger, Olaf Maennel, Debbie Perouli, Randy Bush. "10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems," IEEE Journal on Selected Areas in Communications (J-SAC) 29.9 (2011): 1810-1821.
- Farzana Rahman, Sheikh Iqbal Ahamed. "Efficient Detection of Counterfeit Products in Large-scale RFID Systems Using Batch Authentication Protocols," Personal and Ubiquitous Computing 18.1 (2014): 177-188
- Mohammad Tanviruzzaman, Sheikh Iqbal Ahamed. "Your Phone Knows You: Almost Transparent Authentication for Smartphones." COMPSAC (2014): 374-383.
- Praveen Madiraju, Srilaxmi Malladi, Janaka Balasooriya, Arthi Hariharan, Sushil K. Prasad, and Anu Bourgeois. "A Methodology for Engineering Collaborative and Ad-hoc Mobile Applications Using SyD Middleware," Journal of Network and Computer Applications, Volume 33, Issue 5, September 2010, pp. 542-555 (Elsevier).
- Thomas Schwarz, S.J.: "Teaching Ethics and Computer Forensics: The Markkula Center for Applied Ethics Approach," In Proceedings, 2005 Information Security Curriculum Development Conference, Kennesaw State University. Published in ACM Digital Library.
- Thomas Schwarz, Peter Tsui, Witold Litwin: "An Encrypted, Content Searchable Scalable Distributed Data Structure," International Workshop on Security and Trust in Decentralized / Distributed Data Structures (STD3S), Atlanta, GA, April 8, 2006.
- Jehan-Francois Paris, Thomas J. Schwarz, Darrell D. E. Long: "Self-Adaptive Disk Arrays," Eighth International Symposium on Stabilization, Safety, and Security of Distributed Systems, Dallas, September 2006.
- Kevin Greenan, Ethan Miller, Thomas Schwarz and Darrell Long: "Disaster Recovery Codes: Increasing Reliability with Large-Stripe Error Correction Codes," 3rd International Workshop on Storage Security and Survivability (StorageSS 2007), Alexandria, Virginia, October 29, 2007.
- Jehan-Francois Paris, Thomas Schwarz, S.J.: "On the Possibility of Small, Service-Free Disk Based Storage Systems," Third International Conference on Availability, Reliability and Security (ARES 2008 - The International Dependability Conference), Barcelona, March 2008.
- Shion Guha, Md. Rifat Rashidujjaman, Syed Ishtiaque Ahmed and Nicola Dell. 2016: "Privacy and Security in HCI4D Research," HCI Across Borders Workshop. CHI 2016
- Syed Ishtiaque Ahmed, Shion Guha and Md. Rashidujjaman Rifat. 2014: "Privacy Concerns in Repairing," In 10th ACM Symposium on Usable Privacy and Security (SOUPS 14)
- Zimmer, M., Kumar, P., Vitak, J., Liao, Y., & Chamberlain Kritikos, K. (2018). ‘There’s Nothing Really They Can Do with This Information’: Unpacking How Users Manage Privacy Boundaries for Personal Fitness Information. Information, Communication & Society.
- Zimmer, M. (2018). Addressing Conceptual Gaps in Big Data Research Ethics: An Application of Contextual Integrity. Social Media + Society, 4(2).
- Zimmer, M. & Kinder-Kurlanda, K. (Eds.). (2017). Internet Research Ethics for the Social Age: New Challenges, Cases, and Contexts. New York: Peter Lang