Skip Navigation
Tuesday, September 17, 2019 RSS Feed
Volgenau School of Engineering
 
 
The B.S. in Information Technology degree program is accredited by the Computing Accreditation Commission of ABET, http://www.abet.org.

George Mason University is designated as a National Center of Academic Excellence in Information Assurance/Cyber Defense Research and Education.

Home » Research » Publications

Publications

Faculty in the department publish papers and articles in several arenas, including peer-reviewed journals, conferences, and popular media. Below you will find a selection of recent publications, as well as technical reports published internally.

Tecuci, G., Meckl, S., Marcu, D., & Boicu, M. (2018). Evidence-based Detection of Advanced Persistent Threats. Computing in Science and Engineering, 20(6-Special Issue on Evidence-based Reasoning and Applications), 54–65. https://doi.org/10.1109/MCSE.2018.2873854
Tecuci, G., Kaiser, L., Marcu, D., Uttamsingh, C., & Boicu, M. (2018). Evidence-based Reasoning in Intelligence Analysis: Structured Methodology and System. Computing in Science and Engineering, 20(6-Special Issue on Evidence-based Reasoning and Applications), 9–21. https://doi.org/10.1109/MCSE.2018.2873852
Venkatesan, S., Albanese, M., Chiang, C.-Y. J., Sapello, A., & Chadha, R. (2018). DeBot: A Novel Network-based Mechanism to Detect Exfiltration by Architectural Stealthy Botnets. Security and Privacy, 1(6). https://doi.org/10.1002/spy2.51
Sugrim, S., Venkatesan, S., Youzwak, J., Chiang, C.-Y., Chadha, R., Albanese, M., & Cam, H. (2018). Measuring the Effectiveness of Network Deception. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2018) (pp. 142–147). Miami, FL, USA: IEEE. https://doi.org/10.1109/ISI.2018.8587326
Albanese, M. (2018). From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. In P. Samarati, I. Ray, & I. Ray (Eds.) (Vol. 11170, pp. 1–23). Springer. https://doi.org/10.1007/978-3-030-04834-1_1
Pham, L. H., Albanese, M., & Priest, B. W. (2018). A Quantitative Framework to Model Advanced Persistent Threats. In Proceedings of the 15th International Conference on Security and Cryptography (SECRYPT 2018) (pp. 282–293). Porto, Portugal: SciTePress. https://doi.org/10.5220/0006872604480459
Albanese, M., Jajodia, S., & Venkatesan, S. (2018). Defending from Stealthy Botnets Using Moving Target Defenses. IEEE Security and Privacy Magazine, 16(1), 92–97. https://doi.org/10.1109/MSP.2018.1331034
Albanese, M., & Jajodia, S. (2018). A Graphical Model to Assess the Impact of Multi-Step Attacks. Journal of Defense Modeling and Simulation, 15(1), 79–93. https://doi.org/10.1177/1548512917706043
Connell, W., Menascé, D. A., & Albanese, M. (2017). Performance Modeling of Moving Target Defenses. In Proceedings of the 4th ACM Workshop on Moving Target Defense (MTD 2017) (pp. 53–63). Dallas, TX, USA: ACM. https://doi.org/10.1145/3140549.3140550
Venkatesan, S., Albanese, M., Shah, A., Ganesan, R., & Jajodia, S. (2017). Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning. In Proceedings of the 4th ACM Workshop on Moving Target Defense (MTD 2017) (pp. 75–85). Dallas, TX, USA: ACM. https://doi.org/10.1145/3140549.3140552
Connell, W., Albanese, M., & Venkatesan, S. (2017). A Framework for Moving Target Defense Quantification. In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017) (pp. 124–138). Rome, Italy: Springer. https://doi.org/10.1007/978-3-319-58469-0_9
Reagle, C., Maggioni, V., Boicu, M., Albanese, M., Joshi, M., Sklarew, D., & Peixoto, N. (2017). From Idea to Prototype: Introducing Students to Entrepreneurship. In Proceedings of the 7th IEEE Integrated STEM Education Conference (ISEC 2017) (pp. 71–75). Princeton, NJ, USA: IEEE. https://doi.org/10.1109/ISECon.2017.7910251
Jajodia, S., & Albanese, M. (2017). Theory and Models for Cyber Situation Awareness. In P. Liu, S. Jajodia, & C. Wang (Eds.) (Vol. 10030, pp. 29–46). Springer. https://doi.org/10.1007/978-3-319-61152-5_2
Albanese, M., Cooke, N., González, C., Hall, D., Healey, C., Jajodia, S., … Yen, J. (2017). Theory and Models for Cyber Situation Awareness. In P. Liu, S. Jajodia, & C. Wang (Eds.) (Vol. 10030, pp. 3–25). Springer. https://doi.org/10.1007/978-3-319-61152-5_1
Wright, M., Venkatesan, S., Albanese, M., & Wellman, M. P. (2016). Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis. In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016) (pp. 93–104). Vienna, Austria: ACM. https://doi.org/10.1145/2995272.2995279
Venkatesan, S., Albanese, M., Cybenko, G., & Jajodia, S. (2016). A Moving Target Defense Approach to Disrupting Stealthy Botnets. In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016) (pp. 37–46). Vienna, Austria: ACM. https://doi.org/10.1145/2995272.2995280
Albanese, M., Battista, E., & Jajodia, S. (2016). Cyber Deception:Building the Scientific Foundation. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.) (pp. 167–199). Springer. https://doi.org/10.1007/978-3-319-32699-3_8
Tecuci, G., Schum, D. A., Marcu, D., & Boicu, M. (2016). Intelligence Analysis as Discovery of Evidence, Hypotheses, and Arguments: Connecting the Dots. Cambridge University Press.
Kun Sun, & Sushil Jajodia. (2014). Protecting enterprise networks through attack surface expansion. In Proc. SafeConfig 2014: Cyber Security Analytics and Automations. Scottsdale, Arizona.
Longquan Li, Sencun Zhu, Don Torrieri, & Sushil Jajodia. (2014). Self-healing wireless networks under insider jamming attacks. In IEEE Conf. on Communications and Network Security (CNS). San Francisco, California.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovannia Liverga, Stefano Paraboschi, & Pierangela Samarati. (2014). Integrity for distributed queries. In IEEE Conf. on Communications and Network Security (CNS). San Francisco, California.
Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, & Valentina Casola. (2014). Manipulating the attacker’s view of a system’s attack surface. In IEEE Conf. On Communications and Network Security (CNS). San Francisco, California.
Albanese, M., Battista, E., Jajodia, S., & Casola, V. (2014). Manipulating the Attacker’s View of a System’s Attack Surface. In Proceedings of the 2nd IEEE Conference on Communications and Network Security. San Francisco, CA.
Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, & Massimiliano Albanese. (2014). Modeling network diversity for evaluating the robustness of networks against zero-day attacks. In Proc. 18th European Symp. on Research in Computer Security (ESORICS), (Vol. Part II, Springer Lecture Notes in Computer Science, Vol. 8713, pp. 494–511). Wroclaw, Poland: Springer.
Wang, L., Zhang, M., Jajodia, S., Singhal, A., & Albanese, M. (2014). Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. In Proceedings of the 19th European Symposium on Research in Computer Security (pp. 494–511). Wroclaw, Poland.
Paulo Shakarian, Damon Paulo, Massimiliano Albanese, & Sushil Jajodia. (2014). Keeping intrudors at large: A graph-theoretic approach to reducing the probability of successful network intrusions. In Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT 2014). Vienna, Austria.
Shakarian, P., Paulo, D., Albanese, M., & Jajodia, S. (2014). Keeping Intruders at Large: A Graph-Theoretic Approach to Reducing the Probability of Successful Network Intrusions. In Proceedings of the 11th International Conference on Security and Cryptography (pp. 19–30). Vienna, Austria.
Aiello, V., Najafi Borazjani, P., Battista, E., & Albanese, M. (2014). Next-Generation Technologies for Preventing Accidental Death of Children Trapped in Parked Vehicles. In Proceedings of the 15th IEEE International Conference on Information Reuse and Integration (pp. 508–513). San Francisco, CA.
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, Vijay Atluri, & Gunther Pernul. (2014). Optimizing integrity checks for join queries in the cloud. In Proc. 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DCSEC 2014) (Vol. Vol. 8566, pp. 33–48). Vienna, Austria: Springer.
Sankardas Roy, Mauro Conti, Sanjeev Setia, & Sushil Jajodia. (2014). Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact, IEEE Trans. on Information Forensics and Security, Vol. 9, 681–694.
L. Wang, m. Albanese, & S Jajodia. (2014). Network hardening - An Automated Approach to Improving Network Security. Springer.
Albanese, M., Molinaro, C., Persia, F., Picariello, A., & Subrahmanian, V. S. (2014). Discovering the Top-k “Unexplained” Sequence in Time-Stamped Observation Data. IEEE Transcations on Knowledge and Data Engineering, 26(3), 577–594.
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, & Steven Noel. (2014). k-Zero day safety: A network security metric for measuring the risk of unknown vulnerabilities, IEEE Trans. on Dependable and Secure Computing, Vol. 11, No. 1, 3–18.
Wang, Y. D. (2014). Building trust in e-learning. Athens Journal of Education, 1(1), 9–18.
Tecuci, G., Schum, D. A., Marcu, D., & Boicu, M. (2014). Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis (Vol. 5).
Wang, Y. D. (2014). Building student trust in online learning environments. Distance Education, 35(3), 345–359.
Wang, Y. D. (2014). Applying constructivist instructional strategies to e-learning: A case study of Web development course. International Journal on E-Learning, 13(3), 375–406.
Meixing Le, krishna Kant, & Sushil Jajodia. (2014). Consistency and enforcement of access rules in cooperative data sharing environment, Computers and Security, Vol. 41, 3–18.
M. Albanese, S. Jajodia, R. Jhawar, & V. Piuri. (2014). Securing Mission-Centric Operations in the Cloud. In Secure Cloud Computing (pp. 239–259). Springer.
M. albanese, R. F. Erbacher, S Jajodia, C. Molinaro, F. persia, A. Picariello, … V. S. Subrahmanian. (2014). Recognizing Unexplained Behavior in Network Traffic. In Network science and Cybersecurity (Vol. 55, pp. 39–62). Springer.
V. Casola, A. De Benedictis, & m. Albanese. (2014). A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. In Integration of Reusable Systems (Vol. 263, pp. 299–324). Springer.
m. Albanese, & S. Jajodia. (2014). Formation of Awareness. In Cyber Defense and Situational Awareness. Springer Advances in Information Technology.
S. Deliri, & m. Albanese. (2014). Security and Privacy issues in Social Networks. In Data Management in Pervasive Systems. Springer.
M. Albanese, & S Jajodia. (2014). Technological Solutions for Improving Cyber Security Performance. In The Psychosocial Dynamics of Cyber Security. Springer.
M. Albanese, H. Cam, & S jajodia. (2014). Automated Cyber Situation Awareness Tools for Improving Analyst Performance. In Cybersecurity Systems for Human Cognition Augmentation. Springer.
Liu, X., Wang, G., Johri, A., Zhou, M., & Fan, W. (2014). Harnessing global expertise: A comparative study of expertise profiling methods for online communities. Information Systems Frontiers, 16(4), 715–727.
Johri, A., Teo, H. J., Lo, J., Dufour, M., & Schram, A. (2014). Millennial engineers: Digital media and information ecology of engineering students. Computers in Human Behavior, 33(2014), 286–301.
Rytikova, I., & Boicu, M. (2014). A methodology for personalized competency-based learning in undergraduate courses. In Proceedings of the 15th Annual Conference on Information Technology Education. Atlanta, GA.
Albanese, M., Molinaro, C., Persia, F., Picariello, A., & Subrahamanian, V. S. (2014). Discovering the top-k “unexplained” sequences in time-stamped observation data. IEEE Transactions on Knowledge and Data Engineering, 26(3), 577–594.
Albanese, M., De Benedictis, A., Jajodia, S., & Torrieri, D. (2014). A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks, 14(2014), 84–94.