Research Publications
Brown, Dane
Mayberry, T., Fenske, E., Brown, D., Martin, J., Fossaceca, C., Rye, E.C., Teplov, S. and Foppe, L., 2021, November. Who Tracks the Trackers? Circumventing Apple's Anti-Tracking Alerts in the Find My Network. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society (pp. 181-186).
Brown, D., Walker III, T. O., Blanco, J. A., Ives, R. W., Ngo, H. T., Shey, J., & Rakvic, R. (2021). Detecting firmware modification on solid state drives via current draw analysis. Computers & Security, 102, 102149.
Fenske, E., Brown, D., Martin, J., Mayberry, T., Ryan, P., & Rye, E. (2021). Three years later: A study of mac address randomization in mobile devices and when it succeeds. Proceedings on Privacy Enhancing Technologies, 2021(3), 164-181.
Mondal, R., Ngo, H., Shey, J., Rakvic, R., Walker, O., & Brown, D. (2020, May). Efficient architecture design for the AES-128 algorithm on embedded systems. In Proceedings of the 17th ACM International Conference on Computing Frontiers (pp. 89-97).
Walker, T.O., Blanco, J.A., Rakvic, R., Vanleer, A., Brown, D., Shey, J., Sinsley, G.L., Ngo, H.T. and Ives, R.W., 2020. Classifying proprietary firmware on a solid state drive using idle state current draw measurements. IEEE Access, 8, pp.31869-31881.
Brown, D. A. (2019). Analysis of Firmware Security in Embedded ARM Environments (Doctoral dissertation, Virginia Tech).
Casey, William
Casey, W., Massey, S. E., & Mishra, B. (2021). How signalling games explain mimicry at many levels: From viral epidemiology to human sociology. Journal of the Royal Society Interface, 18(175), 20200689.
Cai, Y., Morales, J. A., Casey, W., Ezer, N., & Wang, S. (2019, July). Perceiving Behavior of Cyber Malware with Human-Machine Teaming. In International Conference on Applied Human Factors and Ergonomics (pp. 97-108). Springer, Cham.
Casey, W., Kellner, A., Memarmoshrefi, P., Morales, J. A., & Mishra, B. (2018). Deception, identity, and security: the game theory of sybil attacks. Communications of the ACM, 62(1), 85-93.
Croteau, Brien
Butchko, D., Croteau, B., & Kiriakidis, K. (2021, June). Cyber-Physical System Security of Surface Ships using Intelligent Constraints. In 2021 IEEE International Conference on Communications Workshops (ICC Workshops) (pp. 1-6). IEEE.
Severson, T. A., Croteau, B., Rodríguez-Seda, E. J., Kiriakidis, K., Robucci, R., & Patel, C. (2020). A resilient framework for sensor-based attacks on cyber–physical systems using trust-based consensus and self-triggered control. Control Engineering Practice, 101, 104509.
Croteau, B. (2020). Attack-Resilient Cyber-Physical Systems (Doctoral dissertation, University of Maryland, Baltimore County).
Dowd, Patrick
Dowd, P. (2014). Engineering Research Equipment: Development of an Asynchronous Transfer Mode (ATM) Based Clustered Platform for Integrated Design.
Chu, J. C., & Dowd, P. W. (2000). Adaptive cache coherence over a high bandwidth broadband mesh network. Parallel Computing, 26(2-3), 285-311.
Dowd, P. W., & McHenry, J. T. (1998). Network security: it's time to take it seriously. Computer, 31(9), 24-28.
Edwards, April
Edwards, A., Sullivan, M.*, Itkowsky, E.*, & Weinberg, D. (2021). TextQ—A User Friendly Tool for Exploratory Text Analysis. Information, 12(12), 508. link
Reilly, B.*, & Edwards, A. (2021, February). Preliminary Analysis on the Recruitment Process for Domestic Violent Extremist Groups. In International Conference on Intelligent Human Systems Integration (pp. 350-356). Springer, Cham. link
Edwards, A., Edwards, L., & Martin, A.* (2020, July). Cyberbullying Perceptions and Experiences in Diverse Youth. In International Conference on Applied Human Factors and Ergonomics (pp. 9-16). Springer, Cham. link
Edwards, April, David Demoll* and Lynne Edwards. (2020). Detecting Cyberbullying Activity Across Platforms. In S. Latifi (eds.), 17th International Conference on Information Technology–New Generations (ITNG 2020), Advances in Intelligent Systems and Computing 1134, https://doi.org/10.1007/978-3-030-43020-7_7 link
Sun, Bo, Richard Igbiriki, Perewari Pere, and April Edwards. (2016). Kizzle- An App For Learning. Proceedings of 2016 International Conference on Interactive Mobile Communication, Technologies and Learning (IMCL). October 2016. San Diego, CA.
Bigelow, Jacob*, April Edwards (Kontostathis), and Lynne Edwards. (2016). Detecting Cyberbullying using Latent Semantic Indexing. In Proceedings of Cybersafety 2016. October 2016. Indianapolis, IN.
Edwards, Lynne, Kontostathis, April, & Fisher, Christina*. (2016). Race, cyberbullying and mental health: A review of the literature. Media and Communication, 4(3), 71-78.
Rink, Matthew*, Nathan Labourdette*, Andy Santiago*, April Kontostathis, and Cathy Chambliss. (2014). TherAPPist: Using Mobile Technology to Aid Therapy. In Proceedings of the 2014 ACM Richard Tapia Celebration of Diversity in Computing. February, 2014. Seattle, WA.
Chambliss, Cathy and April Kontostathis. (2014). Using Mobile Technology to Enhance Psychotherapy for Treatment of Schizophrenia: A Feasibility Study. International Journal of Virtual Worlds and Human Computer Interaction. 2(1), 8-17.
Fenske, Ellis
Travis Mayberry, Ellis Fenske, Dane Brown, Jeremy Martin, Christine Fossaceca, Erik Rye, and Lucas Foppe. Who Tracks the Trackers? Circumventing Apple's Anti-Tracking Alerts in the Find My Network. 20th Workshop on Privacy in the Electronic Society (WPES). November, 2021.
Ellis Fenske, Akshaya Mani, Aaron Johnson, Micah Sherr. Accountable Private Set Cardinality for Distributed Measurement. ACM Transactions on Privacy and Security (TOPS). Accepted. 2021
Ellis Fenske, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, and Erik Rye. Three Years Later: A Study of MAC Address Randomization in Mobile Devices And When It Succeeds. Proceedings on Privacy Enhancing Technologies (PETS). July, 2021.
Jeremy Martin, Douglas Alpuche, Kristina Bodeman, Lamont Brown, Ellis Fenske, Lucas Foppe, Travis Mayberry, Erik Rye, Brandon Sipes, Sam Teplov. Handoff All Your Privacy – A Review of Apple’s Bluetooth Low Energy Continuity Protocol. Proceedings on Privacy Enhancing Technologies (PETS). July, 2019.
Ellis Fenske*, Akshaya Mani*, Aaron Johnson, Micah Sherr. Distributed Measurement with Private Set-Union Cardinality. ACM Conference on Computer and Communications Security (CCS), November 2017. (*Co-First Authors)
Hatfield, Joseph
Gioe, D. V., & Hatfield, J. M. (2021). A damage assessment framework for insider threats to national security information: Edward Snowden and the Cambridge Five in comparative historical perspective. Cambridge Review of International Affairs, 34(5), 704-738.
Gioe, D. V., Hatfield, J. M., & Stout, M. (2020). Can United States intelligence community analysts telework?. Intelligence and National Security, 35(6), 885-901.
Hatfield, J. M. (2019). Virtuous human hacking: The ethics of social engineering in penetration-testing. Computers & Security, 83, 354-366.
Emmersen, T., Hatfield, J. M., Kosseff, J., & Orr, S. R. (2019). The USNA's interdisciplinary approach to cybersecurity education. Computer, 52(3), 48-57.
Kosseff, Jeff
Kosseff, J. (2022). A User's Guide to Section 230, and a Legislator's Guide to Amending It (or Not). Berkeley Technology Law Journal, 37(2).
Kosseff, J. (2022). The United States of Anonymous: How the First Amendment Shaped Online Speech. Cornell University Press.
Kosseff, J. (2019). The twenty-six words that created the Internet. Cornell University Press.
Kosseff, J. (2017). Defining cybersecurity law. Iowa L. Rev., 103, 985.
Kosseff, J. (2016). The gradual erosion of the law that shaped the internet: Section 230's evolution over two decades. Colum. Sci. & Tech. L. Rev., 18, 1.
J. Kosseff, "A New Legal Framework for Online Anonymity: California's Privacy-Based Approach," in IEEE Security & Privacy, vol. 13, no. 6, pp. 66-70, Nov.-Dec. 2015, doi: 10.1109/MSP.2015.140. link
Maasberg, Michele
Choi, H. S., & Maasberg, M. (2021). An empirical analysis of experienced reviewers in online communities: what, how, and why to review. Electronic Markets, 1-18.
Maasberg, M., Van Slyke, C., Ellis, S., & Beebe, N. (2020). The dark triad and insider threats in cyber security. Communications of the ACM, 63(12), 64-80.
Ayaburi, E. W. Y., Maasberg, M., & Lee, J. (2020). Decision Framework for Engaging Cloud-Based Big Data Analytics Vendors. Journal of Cases on Information Technology (JCIT), 22(4), 60-74.
Ayaburi, E. W., Lee, J., & Maasberg, M. (2020). Understanding crowdsourcing contest fitness strategic decision factors and performance: An expectation-confirmation theory perspective. Information Systems Frontiers, 22(5), 1227-1240.
Maasberg, M., Zhang, X., Ko, M., Miller, S. R., & Beebe, N. L. (2020). An Analysis of Motive and Observable Behavioral Indicators Associated With Insider Cyber-Sabotage and Other Attacks. IEEE Engineering Management Review, 48(2), 151-165.
Mayberry, Travis
Mayberry, T., Fenske, E., Brown, D., Martin, J., Fossaceca, C., Rye, E.C., Teplov, S. and Foppe, L., 2021, November. Who Tracks the Trackers? Circumventing Apple's Anti-Tracking Alerts in the Find My Network. In Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society (pp. 181-186).
Blass, E. O., Kerschbaum, F., & Mayberry, T. (2021). Iterative Oblivious Pseudo-Random Functions and Applications. Cryptology ePrint Archive.
Fenske, E., Brown, D., Martin, J., Mayberry, T., Ryan, P., & Rye, E. (2021). Three years later: A study of mac address randomization in mobile devices and when it succeeds. Proceedings on Privacy Enhancing Technologies, 2021(3), 164-181.
Martin, J., Alpuche, D., Bodeman, K., Brown, L., Fenske, E., Foppe, L., Mayberry, T., Rye, E., Sipes, B. and Teplov, S., 2019. Handoff all your privacy–a review of apple’s bluetooth low energy continuity protocol. Proceedings on Privacy Enhancing Technologies, 2019(4), pp.34-53.
Chakraborti, A., Aviv, A. J., Choi, S. G., Mayberry, T., Roche, D. S., & Sion, R. (2019). rORAM: Efficient Range ORAM with O (log2 N) Locality. In NDSS.
Srinivasan, Avinash
Biswas, R., Wu, J., & Srinivasan, A. (2019, November). Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. In 2019 Resilience Week (RWS) (Vol. 1, pp. 57-63). IEEE.
Srinivasan, A., & Ferrese, F. (2019, April). Forensics-as-a-service (FaaS) in the state-of-the-art cloud. In Proc. Security Privacy Digit. Forensics Cloud (pp. 321-337).
Srinivasan, A., & Aldharrab, H. (2019). Xtra—extended bit-torrent protocol for authenticated covert peer communication. Peer-to-Peer Networking and Applications, 12(1), 143-157.
Srinivasan, A., & Gerla, M. (2018). A Conditional Privacy Framework for Crowd-Assisted Community Policing. In Crowd-Assisted Networking and Computing: Everything You Need to Know About Legal and Business Issues in the Game Industry (pp. 199-218). CRC Press.
St. Germain, Ken
St. Germain, K. and F. Kragh, "Physical-Layer Authentication Using Channel State Information and Machine Learning," 2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS), 2020, pp. 1-8, doi: 10.1109/ICSPCS50536.2020.
St. Germain, K. and F. Kragh, "Multi-Transmitter Physical Layer Authentication Using Channel State Information and Deep Learning," 2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS), 2020, pp. 1-8, doi: 10.1109/ICSPCS50536.2020.
St Germain, Ken, and Frank Kragh. "Multi-subcarrier Physical Layer Authentication Using Channel State Information and Deep Learning." Proceedings of the 54th Hawaii International Conference on System Sciences. 2021. https://scholarspace.manoa.
St. Germain, K. and F. Kragh, "Mobile Physical-Layer Authentication Using Channel State Information and Conditional Recurrent Neural Networks," 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, pp. 1-6, doi: 10.1109/VTC2021-Spring51267.
St. Germain, K. and F. Kragh, "Channel Prediction and Transmitter Authentication With Adversarially-Trained Recurrent Neural Networks," in IEEE Open Journal of the Communications Society, vol. 2, pp. 964-974, 2021, doi: 10.1109/OJCOMS.2021.3072569. https://ieeexplore.ieee.org/
