Skip Ribbon Commands
Skip to main content
Publications (Academic Year 2005-06)
  • G. Jacoby and Luqi, “Critical Business Requirements Model and Metrics for Intranet ROI,” Journal of Electronic Commerce Research, vol. 6, no. 1, pp. 1-30, 2005.
  • S. Krasser, G. Conti, J. Grizzard, J. Gribschaw and H. Owen; "Real-Time and Forensic Network Data Analysis Using Animated and Coordinated Visualization;" IEEE Information Assurance Workshop (IAW); June 2005.
  • K. Abdullah, C. Lee, G. Conti and J. Copeland; "Visualizing Network Data for Intrusion Detection;" IEEE Information Assurance Workshop (IAW); June 2005.
  • G. Hadjichristofi, W. J. Adams, N. Davis, "A Framework for Key Management in a Mobile Ad-Hoc Network," In the International Journal of Information Technology, v11,(2) pp 31-61.
  • G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005.
  • G. Conti, J. Grizzard, M. Ahamad and H. Owen; "Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.
  • K. Abdullah, C. Lee, G. Conti, J. Copeland and J. Stasko; " IDS RainStorm: Visualizing IDS Alarms;" IEEE Symposium on Information Visualization's Workshop on Visualization for Computer Security (VizSEC); October 2005.
  • Jackson, J., Ferguson, A., Cobb, M., “Building a University-wide Automated IA Awareness Exercise: The West Point Carronade”, Frontiers in Education Conference, 19-22 October 2005, pp T2E7-10
  • Ferguson, A., “Duty, Honor, Country and Email Attachments: The West Point Carronade” Educause Quarterly, November 1, 2005, pp 54-57
  • G. Conti and M. Ahamad; "A Taxonomy and Framework for Countering Denial of Information Attacks;" IEEE Security and Privacy. November/December 2005.
  • L. J. Hoffman, R. Dodge, T Rosenberg, and D. J. Ragsdale, “Exploring a National Cybersecurity Exercise for Universities,” IEEE Security and Privacy, September 2005, page. 52-58
  • F. Maymi, P. Manz, “Dismounted soldier Tracking and Strike Warning”, MILCOM 2005, 17-20 October, 2005, Atlantic City, NJ
  • F. Maymi, R. Brown, CPOF Security Assessment Technical Report, October 2005
  • P. Curtiss, M. Miller, J. Hill, and D. Massie "Development of a Neural Network Optimizing Controller for Power Generation," 30 NOV 2005. Final Technical Report for DoE agreement DE-AI26-04NT42202.
  • J. M. D. Hill, D. D. Massie, and L. A. Shay, "Software Architecture of an Intelligent Power Controller for Soldier Systems, Technical Report " 2 SEP 2005 (updated 9 NOV 2005).
  • G. Jacoby and Nathaniel J. Davis IV, “Battery-Based Intrusion Detection: A Focus on Power for Security Assurance,” 2005 Journal of Space and Aeronautical Engineering, vol. 113, pp. 1818-1829, 2005.
  • F. Maymi and P. Manz, "Dismounted Soldier Tracking and Strike Warning", presented at the 25th Army Science Conference, 2006
  • J. James, F. Mabry, L. Shay, and R. Dodge " Network Cognition – Technology Review and Overlay Requirements Analysis," 20 Feb 2006. Interim Technical Report.
  • G. Conti, K. Abdullah, J. Grizzard, J. Stasko, J. Copeland, M. Ahamad, H. Owen and C. Lee;"Countering Security Analyst and Network Administrator Overload Through Alert and Packet Visualization;" IEEE Computer Graphics and Applications (CG&A), March 2006.
  • Daniel E. Castle, Aaron Darensburg, Barak Griffin, Thadeus Hickman, Stuart P. Warders, and Grant A. Jacoby, "Gibraltar: A Mobile Host-Based Intrusion Protection System," National Conference on Undergraduate Research, April 2006.
  • S. Georger, T. Morel, M. Kwinn, R. Dodge, "ANCILE – advanced warning threat indicator," 30 May 2006. Final Technical Report
  • CDT Brian Boyles, CDT Preston Lopez, and CDT Humberto Nieves, NetFires Cadet Technical Report, May 2006
  • CDT Michael D. Miller, CDT Michael Pitulej, CDT V. Nathan Pritchard, Voice over Internet Protocol (VoIP) Security Analysis Technical Report, May 2006
  • CDT D. Drew, CDT D. Meyer, CDT J. Parlee , Project CLADE Cadet Technical Report, May 2006
  • R. Dodge and J. Hill, Military Academy Attack/Defense Network Simulation NSF Technical Report, May 2006
  • Frank J. Mabry, John R. James, Aaron J. Ferguson, Unicode Steganographic Exploits: Maintaining Enterprise Border Security, submitted to the IEEE Security and Privacy, May 2006
  • CDT Ryan E. Collins and CDT Daniel C. Stewart, Voice over Internet Protocol (VoIP) Security Analysis Technical Report, May 2006
  • R. Dodge, A Ferguson, "Using Phishing for User Email Security Awareness", Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), page 454-458, Karlstadt, Sweden, 22-24, May 2006
  • G. Conti, "Countering Network Level Denial of Information Attacks Using Information Visualization," Ph.D. Dissertation, Georgia Institute of Technology, May 2006. (Advisor: Mustaque Ahamad)
  • G. A. Jacoby, CDT T. Hickman, CDT S. P. Warders, CDT B. Griffin, CDT A. Darensburg, and CDT D. E. Castle, “Mobile Intrusion Protection,” Proceedings from The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, June 2006.
  • T. K. Buennemeyer, G. A. Jacoby, R. C. Marchany, and J. G. Tront, "Battery-Sensing Intrusion Protection System," Proceedings of the 7th IEEE SMC 2006 Information Assurance Workshop, June 2006.
  • R. Dodge, Chapter Title: "Configuring and Deploying Honeynet Systems," Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Idea Group Publishing, 2006
  • R Dodge, “The Virtual Guide to Honeynet Deployments”, www.honeynet.org
  • G. Conti (guest editor); "Hacking and Innovation;" Communications of the ACM (CACM), June 2006.
  • Timothy K. Buennemeyer, Grant A. Jacoby, Randolph C. Marchany, and Joseph G. Tront, "Battery-Sensing Intrusion Protection System," Proceedings of the 7th IEEE SMC 2006 Information Assurance Workshop, June 2006.
  • G. Jacoby, Thadeus Hickman, Stuart P. Warders, Barak Griffin, Aaron Darensburg and Daniel E. Castle, “Mobile Intrusion Protection,” Proceedings from The 2006 World Congress in Computer Science, Computer Engineering, and Applied Computing, June 2006.
  • G. White, R. Dodge, “The National Collegiate Cyber Defense Competition,”, page 68-75, 10th Colloquium for Information Systems Security Education Washington, DC, June 5-8, 2006.
  • T. Augustine, R. Dodge, “Cyber Defense Exercise: Meeting Learning Objectives thru Competition,”, page 61-67, 10th Colloquium for Information Systems Security Education Washington, DC, June 5-8, 2006.
  • Proceedings of the Seventh Annual IEEE SMC Information Assurance Workshop, June 15-17 2006, West Point, NY.
  • G. Jacoby and Nathaniel J. Davis IV, “Achieving Mobile Host-Based Security,” ACM Transactions on Information and System Security Journal, 2006.