Skip Ribbon Commands
Skip to main content
Publications (Academic Year 2006-07)
  • S. Dehney, RFID Security Primer Technical Report, August 2006
  • G. Jacoby and J. Blair, “An Undergraduate Success Story: A Computer Science and Electrical Engineering Integrative Experience,” IEEE Pervasive Computing, August 2006.
  • G. Jacoby and Nathaniel J. Davis IV, “Mobile Host-Based Intrusion Detection and Attack Identification,” IEEE Wireless Communications Journal, Fall 2006.
  • G. Jacoby, Randy Marchany and Nathaniel J. Davis IV, “Using Battery Constraints Within Mobile Hosts To Improve Network Security,” IEEE Security & Privacy Magazine, September 2006.
  • S. Ransbottom and G. Jacoby, “Mobile Triage in Support of Effective Reporting (ER),” Military Communications Conference (MILCOM06), 23-25 October 2006.
  • G. Conti; "Googling Considered Harmful;" New Security Paradigms Workshop; October 2006.
  • G. Jacoby and N. J. Davis IV, “Mobile Host-Based Intrusion Detection and Attack Identification,” IEEE Wireless Communications Journal, Fall 2006.
  • G. Jacoby and N. J. Davis IV, “Achieving Mobile Host-Based Security,” ACM Transactions on Information and System Security Journal, 2006.
  • G. Jacoby, R. Marchany, and N. J. Davis IV, “Using Battery Constraints Within Mobile Hosts To Improve Network Security,” IEEE Security & Privacy Magazine, September 2006.
  • S. Ransbottom and G. Jacoby, “Mobile Triage in Support of Effective Reporting (ER),” Military Communications Conference (MILCOM06), 23-25 October 2006
  • R. Dodge, C. Carver, and A. Ferguson, “Phishing for user security awareness,” Computers and Security, Computers & Security, Volume 26, pages 73-80, February, 2007
  • E. Sobiesk and G. Conti; "The Cost of Free Web Tools;" IEEE Security and Privacy, May/June 2007.
  • R. Dodge, and D. Ragsdale, " Remote Virtual Information Assurance Network," Proceedings of the 22nd IFIP International Information Security Conference, Sandton, South Africa, May, 2007.
  • G. Jacoby and N. Davis, “Mobile Host-Based Intrusion Detection and Attack Identification,” IEEE Wireless Communications Journal, vol. 14, no. 3, pp. 1-15, June, 2007.
  • S. Mosley, M. Potasznik, K. Davis, R. Stevens, M. Ballmann, B. Ancheta, and G. Jacoby, “FLIP - Forward Looking Intrusion Protection for Mobile Devices via Snort-Inline Hardware Implementation,” Proceedings from The 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing, June 2007.
  • Proceedings of the Seventh Annual IEEE SMC Information Assurance Workshop, West Point, NY. June 15-17, 2007.
  • E. Sobiesk and G. Conti, "The Cost of Free Web Tools;" IEEE Security and Privacy, May/June 2007.
  • G. Conti. “Satellite Imagery Analysis,” DEFCON, July 2007.
  • G. Conti and E. Sobiesk; "An Honest Man Has Nothing to Fear: User Perceptions on Web-based Information Disclosure;" Symposium on Usable Privacy and Security (SOUPS); July 2007.