Skip to main content Skip to footer site map
Cyber Science Department

Research Publications

Brown, Dane

Mayberry, T., Fenske, E., Brown, D., Martin, J., Fossaceca, C., Rye, E.C., Teplov, S. and Foppe, L., 2021, November. Who Tracks the Trackers? Circumventing Apple's Anti-Tracking Alerts in the Find My Network. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society (pp. 181-186).

Brown, D., Walker III, T. O., Blanco, J. A., Ives, R. W., Ngo, H. T., Shey, J., & Rakvic, R. (2021). Detecting firmware modification on solid state drives via current draw analysis. Computers & Security, 102, 102149.

Fenske, E., Brown, D., Martin, J., Mayberry, T., Ryan, P., & Rye, E. (2021). Three years later: A study of mac address randomization in mobile devices and when it succeeds. Proceedings on Privacy Enhancing Technologies, 2021(3), 164-181.

Mondal, R., Ngo, H., Shey, J., Rakvic, R., Walker, O., & Brown, D. (2020, May). Efficient architecture design for the AES-128 algorithm on embedded systems. In Proceedings of the 17th ACM International Conference on Computing Frontiers (pp. 89-97).

Walker, T.O., Blanco, J.A., Rakvic, R., Vanleer, A., Brown, D., Shey, J., Sinsley, G.L., Ngo, H.T. and Ives, R.W., 2020. Classifying proprietary firmware on a solid state drive using idle state current draw measurements. IEEE Access, 8, pp.31869-31881.

Brown, D. A. (2019). Analysis of Firmware Security in Embedded ARM Environments (Doctoral dissertation, Virginia Tech).

Casey, William

Casey, W., Massey, S. E., & Mishra, B. (2021). How signalling games explain mimicry at many levels: From viral epidemiology to human sociology. Journal of the Royal Society Interface, 18(175), 20200689.

Cai, Y., Morales, J. A., Casey, W., Ezer, N., & Wang, S. (2019, July). Perceiving Behavior of Cyber Malware with Human-Machine Teaming. In International Conference on Applied Human Factors and Ergonomics (pp. 97-108). Springer, Cham.

Casey, W., Kellner, A., Memarmoshrefi, P., Morales, J. A., & Mishra, B. (2018). Deception, identity, and security: the game theory of sybil attacks. Communications of the ACM, 62(1), 85-93.

Croteau, Brien

Butchko, D., Croteau, B., & Kiriakidis, K. (2021, June). Cyber-Physical System Security of Surface Ships using Intelligent Constraints. In 2021 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1-6). IEEE.

Severson, T. A., Croteau, B., Rodríguez-Seda, E. J., Kiriakidis, K., Robucci, R., & Patel, C. (2020). A resilient framework for sensor-based attacks on cyber–physical systems using trust-based consensus and self-triggered control. Control Engineering Practice, 101, 104509.

Croteau, B. (2020). Attack-Resilient Cyber-Physical Systems (Doctoral dissertation, University of Maryland, Baltimore County).

Dowd, Patrick

Dowd, P. (2014). Engineering Research Equipment: Development of an Asynchronous Transfer Mode (ATM) Based Clustered Platform for Integrated Design.

Chu, J. C., & Dowd, P. W. (2000). Adaptive cache coherence over a high bandwidth broadband mesh network. Parallel Computing, 26(2-3), 285-311.

Dowd, P. W., & McHenry, J. T. (1998). Network security: it's time to take it seriously. Computer, 31(9), 24-28.

Edwards, April

Edwards, A., Sullivan, M.*, Itkowsky, E.*, & Weinberg, D. (2021). TextQ—A User Friendly Tool for Exploratory Text Analysis. Information, 12(12), 508. link

Reilly, B.*, & Edwards, A. (2021, February). Preliminary Analysis on the Recruitment Process for Domestic Violent Extremist Groups. In International Conference on Intelligent Human Systems Integration (pp. 350-356). Springer, Cham. link

Edwards, A., Edwards, L., & Martin, A.* (2020, July). Cyberbullying Perceptions and Experiences in Diverse Youth. In International Conference on Applied Human Factors and Ergonomics (pp. 9-16). Springer, Cham. link

Edwards, April, David Demoll* and Lynne Edwards. (2020). Detecting Cyberbullying Activity Across Platforms. In S. Latifi (eds.), 17th International Conference on Information Technology–New Generations (ITNG 2020), Advances in Intelligent Systems and Computing 1134, https://doi.org/10.1007/978-3-030-43020-7_7 link

Sun, Bo, Richard Igbiriki, Perewari Pere, and April Edwards. (2016). Kizzle- An App For Learning. Proceedings of 2016 International Conference on Interactive Mobile Communication, Technologies and Learning (IMCL). October 2016. San Diego, CA.

Bigelow, Jacob*, April Edwards (Kontostathis), and Lynne Edwards. (2016). Detecting Cyberbullying using Latent Semantic Indexing. In Proceedings of Cybersafety 2016. October 2016. Indianapolis, IN.

Edwards, Lynne, Kontostathis, April, & Fisher, Christina*. (2016). Race, cyberbullying and mental health: A review of the literature. Media and Communication, 4(3), 71-78.

Rink, Matthew*, Nathan Labourdette*, Andy Santiago*, April Kontostathis, and Cathy Chambliss. (2014). TherAPPist: Using Mobile Technology to Aid Therapy. In Proceedings of the 2014 ACM Richard Tapia Celebration of Diversity in Computing. February, 2014. Seattle, WA.

Chambliss, Cathy and April Kontostathis. (2014). Using Mobile Technology to Enhance Psychotherapy for Treatment of Schizophrenia: A Feasibility Study. International Journal of Virtual Worlds and Human Computer Interaction. 2(1), 8-17.

Fenske, Ellis

Travis Mayberry, Ellis Fenske, Dane Brown, Jeremy Martin, Christine Fossaceca, Erik Rye, and Lucas Foppe. Who Tracks the Trackers? Circumventing Apple's Anti-Tracking Alerts in the Find My Network. 20th Workshop on Privacy in the Electronic Society (WPES). November, 2021.

Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Accountable Private Set Cardinality for Distributed Measurement. ACM Transactions on Privacy and Security (TOPS). Accepted. 2021

Ellis Fenske, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, and Erik Rye. Three Years Later: A Study of MAC Address Randomization in Mobile Devices And When It Succeeds. Proceedings on Privacy Enhancing Technologies (PETS). July, 2021.

Jeremy Martin, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, Sam Teplov. Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol. Proceedings on Privacy Enhancing Technologies (PETS). July, 2019.

Ellis Fenske*, Akshaya Mani*, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality. ACM Conference on Computer and Communications Security (CCS), November 2017. (*Co-First Authors)

Hatfield, Joseph

Gioe, D. V., & Hatfield, J. M. (2021). A damage assessment framework for insider threats to national security information: Edward Snowden and the Cambridge Five in comparative historical perspective. Cambridge Review of International Affairs, 34(5), 704-738.

Gioe, D. V., Hatfield, J. M., & Stout, M. (2020). Can United States intelligence community analysts telework?. Intelligence and National Security, 35(6), 885-901.

Hatfield, J. M. (2019). Virtuous human hacking: The ethics of social engineering in penetration-testing. Computers & Security, 83, 354-366.

Emmersen, T., Hatfield, J. M., Kosseff, J., & Orr, S. R. (2019). The USNA's interdisciplinary approach to cybersecurity education. Computer, 52(3), 48-57.

Kosseff, Jeff

Kosseff, J. (2022). A User's Guide to Section 230, and a Legislator's Guide to Amending It (or Not). Berkeley Technology Law Journal, 37(2).

Kosseff, J. (2022). The United States of Anonymous: How the First Amendment Shaped Online Speech. Cornell University Press.

Kosseff, J. (2019). The twenty-six words that created the Internet. Cornell University Press.

Kosseff, J. (2017). Defining cybersecurity law. Iowa L. Rev., 103, 985.

Kosseff, J. (2016). The gradual erosion of the law that shaped the internet: Section 230's evolution over two decades. Colum. Sci. & Tech. L. Rev., 18, 1.

J. Kosseff, "A New Legal Framework for Online Anonymity: California's Privacy-Based Approach," in IEEE Security & Privacy, vol. 13, no. 6, pp. 66-70, Nov.-Dec. 2015, doi: 10.1109/MSP.2015.140. link

Maasberg, Michele

Choi, H. S., & Maasberg, M. (2021). An empirical analysis of experienced reviewers in online communities: what, how, and why to review. Electronic Markets, 1-18.

Maasberg, M., Van Slyke, C., Ellis, S., & Beebe, N. (2020). The dark triad and insider threats in cyber security. Communications of the ACM, 63(12), 64-80.

Ayaburi, E. W. Y., Maasberg, M., & Lee, J. (2020). Decision Framework for Engaging Cloud-Based Big Data Analytics Vendors. Journal of Cases on Information Technology (JCIT), 22(4), 60-74.

Ayaburi, E. W., Lee, J., & Maasberg, M. (2020). Understanding crowdsourcing contest fitness strategic decision factors and performance: An expectation-confirmation theory perspective. Information Systems Frontiers, 22(5), 1227-1240.

Maasberg, M., Zhang, X., Ko, M., Miller, S. R., & Beebe, N. L. (2020). An Analysis of Motive and Observable Behavioral Indicators Associated With Insider Cyber-Sabotage and Other Attacks. IEEE Engineering Management Review, 48(2), 151-165.

Mayberry, Travis

Mayberry, T., Fenske, E., Brown, D., Martin, J., Fossaceca, C., Rye, E.C., Teplov, S. and Foppe, L., 2021, November. Who Tracks the Trackers? Circumventing Apple's Anti-Tracking Alerts in the Find My Network. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society (pp. 181-186).

Blass, E. O., Kerschbaum, F., & Mayberry, T. (2021). Iterative Oblivious Pseudo-Random Functions and Applications. Cryptology ePrint Archive.

Fenske, E., Brown, D., Martin, J., Mayberry, T., Ryan, P., & Rye, E. (2021). Three years later: A study of mac address randomization in mobile devices and when it succeeds. Proceedings on Privacy Enhancing Technologies, 2021(3), 164-181.

Martin, J., Alpuche, D., Bodeman, K., Brown, L., Fenske, E., Foppe, L., Mayberry, T., Rye, E., Sipes, B. and Teplov, S., 2019. Handoff all your privacy–a review of apple’s bluetooth low energy continuity protocol. Proceedings on Privacy Enhancing Technologies, 2019(4), pp.34-53.

Chakraborti, A., Aviv, A. J., Choi, S. G., Mayberry, T., Roche, D. S., & Sion, R. (2019). rORAM: Efficient Range ORAM with O (log2 N) Locality. In NDSS.

Srinivasan, Avinash

Biswas, R., Wu, J., & Srinivasan, A. (2019, November). Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. In 2019 Resilience Week (RWS) (Vol. 1, pp. 57-63). IEEE.

Srinivasan, A., & Ferrese, F. (2019, April). Forensics-as-a-service (FaaS) in the state-of-the-art cloud. In Proc. Security Privacy Digit. Forensics Cloud (pp. 321-337).

Srinivasan, A., & Aldharrab, H. (2019). Xtra—extended bit-torrent protocol for authenticated covert peer communication. Peer-to-Peer Networking and Applications, 12(1), 143-157.

Srinivasan, A., & Gerla, M. (2018). A Conditional Privacy Framework for Crowd-Assisted Community Policing. In Crowd-Assisted Networking and Computing: Everything You Need to Know About Legal and Business Issues in the Game Industry (pp. 199-218). CRC Press.

St. Germain, Ken

St. Germain, K. and F. Kragh, "Physical-Layer Authentication Using Channel State Information and Machine Learning," 2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS), 2020, pp. 1-8, doi: 10.1109/ICSPCS50536.2020.9310070. https://ieeexplore.ieee.org/document/9310070

St. Germain, K. and F. Kragh, "Multi-Transmitter Physical Layer Authentication Using Channel State Information and Deep Learning," 2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS), 2020, pp. 1-8, doi: 10.1109/ICSPCS50536.2020.9310034. https://ieeexplore.ieee.org/document/9310034

St Germain, Ken, and Frank Kragh. "Multi-subcarrier Physical Layer Authentication Using Channel State Information and Deep Learning." Proceedings of the 54th Hawaii International Conference on System Sciences. 2021. https://scholarspace.manoa.hawaii.edu/bitstream/10125/71467/0688.pdf

St. Germain, K. and F. Kragh, "Mobile Physical-Layer Authentication Using Channel State Information and Conditional Recurrent Neural Networks," 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, pp. 1-6, doi: 10.1109/VTC2021-Spring51267.2021.9448652. https://ieeexplore.ieee.org/document/9448652

St. Germain, K. and F. Kragh, "Channel Prediction and Transmitter Authentication With Adversarially-Trained Recurrent Neural Networks," in IEEE Open Journal of the Communications Society, vol. 2, pp. 964-974, 2021, doi: 10.1109/OJCOMS.2021.3072569. https://ieeexplore.ieee.org/document/9404266

go to Top