Publications


Dissertations
2014

  • "Security Systems Engineering Architectural Model for Assessing Enterprise Networks: Applications for Neural Networks" Charlotte Moorer March 2014

2013

  • "Implementing a Virtual Firewall in A Cloud Environment Using A Software- And Hardware-Based Solution" Arya Golriz Dec 2013

2010

  • "Optimal Investment In IS Security: A Game Theoretical Approach" Jian Hua 2010

Masters Projects
May 2015

  • "A secure architecture for Bluetooth in Telemedicine" - Sekaran Jambursekan

May 2014

  • Introduction to Snort - A Network Intrusion Detection System (IDS) - Saeideh Barazagn

Dec 2013

  • Performing Vector Quantization (VQ) for an Intrusion Detection System (IDS) - Farhad Moazzami

May 2013

  • Distributed Denial of Service Attack and Recovery - Sandarva Khanal

Dec 2012

  • Cyber-security Vulnerability Testing - Cecilia Ayanwale

May 2012

  • Telemetry Network Intrusion Detection System - Nadim Maharjan

Senior Projects
2015

2014

  • Secure Voice Communication with Encryption - Bipin Mainali
  • "Gone in 90 Seconds" Password Security Exploitation - Jayson Glenn 

2013

  • Passwords: Opportunities and Prevention - Sekaran Jambukesan
  • Proposing A Trace back Method for the Deferment of Disturbed Denial of Service - Wangui Macheria
  • Secure Haipe Cryptographic Module using Federal Information Processing Standard (FIPS 140-2) - Shaquel Wade

2012

  • Developing a Cyber Security Test Bed - Farzad Daryl Moten

Peer Reviewed Conference and Journal Publications

2017

2016

2015

2014

2013

2012

2011

  • Hua, J. and S. Bapna (2011). Optimal IS Security Investment: Cyber Terrorism vs. Common Hacking. ICIS 2011, Shanghai, China.
  • Hua, J. and S. Bapna (2011). Who Can We Trust?: The Influence of Insider Threats on IS Security. Proceedings of 42nd Annual Meeting of the Decision Sciences Institute, Atlanta, GA, Decision Sciences Institute. (Best Application Paper Award, Nov. 2011, National Decision Sciences Institute, Boston.)

2010

  • Hua, J. and S. Bapna (2010). How Can We Deter Cyber Terrorism? Proceedings of 41st Annual Meeting of the Decision Sciences Institute, Atlanta, GA, Decision Sciences Institute, 441-446.

2009

  • Hua, J., Patel, S. C. , & Zaveri, J. (2009). Securing Business Information Systems from Cyber-Attacks. Journal of Digital Business, 3 (1,2), 35-53.
  • Hua, J. and S. Bapna (2009). The Impact of Cyber Terrorism on Investment for Information System Security Proceedings of 40th Annual Meeting of the Decision Sciences Institute, Atlanta, GA, Decision Sciences Institute pp:3151-3159. (Best Interdisciplinary Paper Award, Nov. 2009, National Decision Sciences Institute, New Orleans.)

2007

  • Hua , J, Patel, S., and Zaveri, J., "A Framework for IT-based Information Systems Security," Proceedings of the 38th Annual Meeting of the Decision Sciences Institute, Phoenix, AZ , November 1720, 2007, 2301-2306.

 


Book Publications