Research Interests

My primary research interests lie in the broad domains of cybersecurity, digital forensics, and the application of artificial intelligence and machine learning to these areas. Specifically, my work focuses on network security and forensics, security and forensics in cyber-physical systems, covert channels, information hiding and steganography, and memory forensics. To date, I have published XX peer-reviewed papers in leading conferences and journals, including IEEE TIFS, IEEE INFOCOM, IEEE ICDCS, and ACM SAC. I have served as both Principal Investigator (PI) and Co-Principal Investigator (Co-PI) on several research grants funded by agencies such as the DOD, ONR, DHS, NSF, DOJ, and ED.

I welcome the opportunity to collaborate with Midshipmen who are interested in pursuing independent research or capstone projects in any of the aforementioned areas. I am also open to discussing new research ideas that align with your interests. If you are interested in working with me, please feel free to reach out via email (see contact page) to arrange a time to discuss further.

Recent Publications [2022-Present]

  1. [Paper to be Uploaded] B. J. Croteau, C. B. Landis, and A. Srinivasan (2026). Zero Trust at Sea: Security Gains and the Risk of Operational Disruption Without Fallback Mechanisms. Accepted to appear in Special Issue on Maritime Cybersecurity, Journal of Information Warfare (JIW). Tentative publication date: May/June 2026.
  2. [Read PDF] J. Lee, M. E. H. Eimon, A. Srinivasan, and H. Kalva (2026). Byte-level Generative Predictions for Multimedia Forensics Carving. Accepted to appear in SPIE Defense + Security: Machine Learning from Challenging Data 2026, April 27–28, 2026, National Harbor, MD, USA.
  3. [Read PDF] A. Srinivasan (2025). Security and Forensics—Is Solid State Drive a Friend or a Foe? In Proceedings of the 12th International Symposium on Memory Systems (MEMSYS ’25), September 21–23, 2025, Washington, DC, USA.
  4. [Read PDF] A. Srinivasan, L. Irizarry, T. Schleining, and H. Dong (2025). PrintWatchDog: Lightweight Open-Architecture Framework for Printer Data Loss Prevention. In Proceedings of the 7th IEEE International Conference on Smart Applications, Communications and Networking (SmartNets), July 22–24, 2025, Istanbul, Türkiye.
  5. [Read PDF] N. Niknami, A. Srinivasan, and J. Wu (2024). Cyber-AnDe: Cybersecurity Framework with Adaptive Distributed Sampling for Anomaly Detection on SDNs. IEEE Transactions on Information Forensics and Security, vol. 19, pp. 9245–9257.
  6. [Read PDF] A. Srinivasan, C. Rose, and J. Wu (2024). SlackFS: Resilient and Persistent Information Hiding Framework. International Journal of Security and Networks, vol. 19, no. 2, pp. 77–91.
  7. [Read PDF] A. Srinivasan, G. Morewood, K. Simmons-Massey, and Y. Li (2024). SAFE-CARE: Reversible Privacy-Preserving Physician Feedback Framework to Improve Patient Care Quality. In Proceedings of the 2024 IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Guangzhou, China, pp. 131–138.
  8. [Read PDF] M. J. De Lucia and A. Srinivasan (2024). Artificial Intelligence and Machine Learning for Network Security: Quo Vadis? In Y. Chen, J. Wu, P. Yu, and X. Wang (eds.), Network Security Empowered by Artificial Intelligence, Advances in Information Security, vol. 107, Springer, Cham.
  9. [Read PDF] N. Niknami, A. Srinivasan, K. St. Germain, and J. Wu (2023). Maritime Communications: Current State and Future Potential with SDN and SDR. Network, 3(4), pp. 563–584.
  10. [Read PDF] A. Srinivasan and B. Pieper (2022). Steganography with FileSystem-in-SlackSpace. In Proceedings of the 16th IEEE International Conference on Networking, Architecture, and Storage (NAS 2022), October 3–4, 2022, Philadelphia, PA, USA.
  11. Refreed Publications [Full List] (Total 0)

    Journal Publications (0 total)

    1. B. J. Croteau, C. B. Landis, and A. Srinivasan (2026). Zero Trust at Sea: Security Gains and the Risk of Operational Disruption Without Fallback Mechanisms. Accepted to appear in Special Issue on Maritime Cybersecurity, Journal of Information Warfare (JIW). Tentative publication date: May/June 2026.
    2. N. Niknami, A. Srinivasan, and J. Wu (2024). Cyber-AnDe: Cybersecurity Framework with Adaptive Distributed Sampling for Anomaly Detection on SDNs. IEEE Transactions on Information Forensics and Security, vol. 19, pp. 9245–9257. [Read PDF]
    3. A. Srinivasan, C. Rose, and J. Wu (2024). SlackFS: Resilient and Persistent Information Hiding Framework. International Journal of Security and Networks, vol. 19, no. 2, pp. 77–91. [Read PDF]
    4. N. Niknami, A. Srinivasan, K. St. Germain, and J. Wu (2023). Maritime Communications: Current State and Future Potential with SDN and SDR. Network, 3(4), pp. 563–584. [Read PDF]
    5. A. Srinivasan and H. Aldharrab (2019). XTRA: Extended BitTorrent Protocol for Authenticated Covert Peer-to-Peer Communication. Peer-to-Peer Networking and Applications, vol. 12, pp. 143–157.
    6. A. Srinivasan and H. Dong (2018). SURE-FIT: Secure and Adaptive Framework for Information Hiding with Fault Tolerance. Journal of Cyber Security and Mobility, vol. 6, no. 4, pp. 427–456 (Article No. 3).
    7. A. Srinivasan and J. Wu (2018). VOUCH-AP: Authentication Mechanism for Preserving User Privacy in Open-Access 802.11 Public Hotspots with Co-located Evil Twin Access Points. International Journal of Security and Networks (IJSN), vol. 13, pp. 153–168.
    8. A. Srinivasan, J. Wu, and J. Shi (2017). Secure Android Covert Channel with Robust Survivability to Service Provider Restrictions. International Journal of Security and Networks (IJSN), vol. 12, no. 1.
    9. J. Medsger, A. Srinivasan, and J. Wu (2015). Information Theoretic and Statistical Drive Sanitization Models. Journal of Information Privacy and Security, Special Issue: Secured Communication in Wireless and Wired Networks, vol. 11, no. 2, pp. 97–117.
    10. A. Srinivasan, S. Kolli, and J. Wu (2013). Steganographic Information Hiding that Exploits a Novel File System Vulnerability. International Journal of Security and Networks (IJSN), vol. 8, no. 2, pp. 82–93.
    11. F. Li, J. Wu, and A. Srinivasan (2012). Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks. IEICE Transactions on Information and Systems, Special Section on Trust, Security and Privacy in Computing and Communication Systems, vol. E95-D, no. 1, pp. 12–19.
    12. A. Srinivasan, J. Wu, and J. Teitelbaum (2011). Distributed Reputation-Based Secure Localization in Sensor Networks. LNCS Transactions on Autonomic and Trusted Computing, Springer.
    13. A. Srinivasan (2011). SecLoc: Secure Localization in WSNs Using CDS. Security and Communication Networks, vol. 4, no. 7, pp. 763–770.
    14. A. Srinivasan, F. Li, and J. Wu (2010). Secure Reputation Monitoring System: A Novel Connected Dominating Set-Based Framework for WSNs. International Journal of Security and Communication Networks, Special Issue on Trusted Computing and Communications, pp. 95–108, Wiley.
    15. A. Srinivasan and J. Wu (2009). Secure and Reliable Broadcasting in Wireless Sensor Networks Using Multi-Parent Trees. International Journal of Security and Communication Networks, vol. 2, no. 3, pp. 239–253.
    16. A. Srinivasan, F. Li, J. Wu, and M. Li (2008). Secure Clique-Based Group Key Assignment in Wireless Sensor Networks. International Journal of Security and Networks (IJSN), vol. 3, no. 4, pp. 226–239.
    17. F. Li, A. Srinivasan, and J. Wu (2008). PVFS: A Probabilistic Voting-Based Filtering Scheme in Wireless Sensor Networks. International Journal of Security and Networks (IJSN), vol. 3, no. 3, pp. 173–182.

    Conference Publications (0 total)

    1. J. Lee, M. E. H. Eimon, A. Srinivasan, and H. Kalva (2026). Byte-Level Generative Predictions for Multimedia Forensics Carving. Accepted to appear in SPIE Defense + Security: Machine Learning from Challenging Data 2026, April 27–28, 2026, National Harbor, MD, USA.
    2. A. Srinivasan (2025). Security and Forensics—Is Solid State Drive a Friend or a Foe? In Proceedings of the 12th International Symposium on Memory Systems (MEMSYS ’25), September 21–23, 2025, Washington, DC, USA. [Read PDF]
    3. A. Srinivasan, L. Irizarry, T. Schleining, and H. Dong (2025). PrintWatchDog: Lightweight Open-Architecture Framework for Printer Data Loss Prevention. In Proceedings of the 7th IEEE International Conference on Smart Applications, Communications and Networking (SmartNets), July 22–24, 2025, Istanbul, Türkiye. [Read PDF]
    4. A. Srinivasan, G. Morewood, K. Simmons-Massey, and Y. Li (2024). SAFE-CARE: Reversible Privacy-Preserving Physician Feedback Framework to Improve Patient Care Quality. In Proceedings of the 2024 IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Guangzhou, China, pp. 131–138. [Read PDF]
    5. A. Srinivasan and B. Pieper (2022). Steganography with FileSystem-in-SlackSpace. In Proceedings of the 16th IEEE International Conference on Networking, Architecture, and Storage (NAS 2022), October 3–4, 2022, Philadelphia, PA, USA. [Read PDF]
    6. J. Benin and A. Srinivasan (2019). Transition to Object-Oriented Programming (TOOP): An Innovative and Hands-On Introduction to Linux, OOP in C++, and Arduinos Using EMoRo. In ASEE Zone 1 Conference, April 11–13, 2019, Niagara Falls, NY, USA.
    7. R. Biswas, J. Wu, and A. Srinivasan (2019). Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack. In Resilience Week 2019, pp. 57–63, November 4–7, 2019, San Antonio, TX, USA.
    8. B. Alsulami, A. Srinivasan, H. Dong, and S. Mancoridis (2017). Lightweight Behavioral Malware Detection for Windows Platforms. In Proceedings of the 12th IEEE International Conference on Malicious and Unwanted Software (MALCON 2017), pp. 75–81, October 11–14, 2017, Puerto Rico, USA.
    9. A. Srinivasan and H. Dong (2017). FROST: Anti-Forensics Digital Dead-Drop Information Hiding Robust to Detection and Data Loss with Fault Tolerance. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ACM ARES 2017), Article No. 82, pp. 1–8, August 29 – September 1, 2017, Reggio Calabria, Italy.
    10. W. Zhang, S. Zhou, A. Srinivasan, J. Wu, and Y. Lin (2016). Detecting Attacks Smartly in Vehicle Cloud Computing. In Proceedings of the 13th IEEE International Conference on Ubiquitous Intelligence and Computing, July 18–21, 2016, Toulouse, France.
    11. A. Srinivasan, J. Wu, R. Joy, and H. Aldharrab (2016). SURREAL: Secure Covert Peer Communication over BitTorrent Protocol. In IEEE ICC 2016: Communication and Information Systems Security Symposium, May 23–27, 2016, Kuala Lumpur, Malaysia.
    12. A. Srinivasan, A. Nguyen, and R. Tarlecki (2015). STUMP: Stalling Offline Password Attacks Using Pre-Hash Manipulations. In Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015), December 14–17, 2015, Melbourne, Australia.
    13. A. Srinivasan, J. Wu, and J. Shi (2015). Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss. In 8th ACM International Conference on Mobile Multimedia Communications (MobiMedia 2015), May 25–27, 2015, Chengdu, China.
    14. A. Srinivasan, P. Santhalingam, J. Zamanski, and J. Wu (2014). DeadDrop-in-a-Flash: Information Hiding at SSD NAND Flash Memory Physical Layer. In Proceedings of the 8th International Conference on Emerging Security Information Systems and Technologies (SECURWARE 2014), November 16–20, 2014, Lisbon, Portugal.
    15. A. Srinivasan, J. Wu, and W. Zhu (2014). SAFE: Secure and Big Data Adaptive Framework for Efficient Cross-Domain Communication. In ACM CIKM Workshop: 1st International Workshop on Privacy and Security of Big Data (PSBD 2014), November 7, 2014, Shanghai, China.
    16. W. Zhu, L. Vizenor, and A. Srinivasan (2014). Towards a Reference Architecture for Service-Oriented Cross-Domain Security Infrastructure. In Proceedings of the 7th International Conference on Internet and Distributed Computing Systems (IDCS 2014), September 22–24, 2014, Calabria, Italy.
    17. H. Kalva, A. Parikh, and A. Srinivasan (2013). Accelerating Video Carving from Unallocated Space. In IS&T/SPIE Electronic Imaging 2013: Media Watermarking, Security, and Forensics, SPIE Proceedings, vol. 8665, February 3–7, 2013, Burlingame, CA, USA.
    18. A. Srinivasan, S. Thirthahalli, and A. Stavarou (2013). HIDEINSIDE: A Novel Randomized and Encrypted Anti-Forensic Information Hiding Technique. In International Conference on Computing, Networking and Communications (ICNC 2013), January 28–31, 2013, San Diego, CA, USA.
    19. [Best Paper Award] J. Medsger and A. Srinivasan (2012). ERASE: Entropy-Based Sanitization of Sensitive Data for Privacy Preservation. In 7th International Conference for Internet Technology and Secured Transactions (ICITST 2012), pp. 427–432, December 10–12, 2012, London, UK.
    20. M. Alhusseini, A. Srinivasan, and D. Wijesekera (2012). Forensic Filesystem with Cluster-Level Identifiers for Efficient Data Recovery. In 7th International Conference for Internet Technology and Secured Transactions (ICITST 2012), pp. 411–415, December 10–12, 2012, London, UK.
    21. A. Srinivasan and J. Wu (2012). SafeCode: Safeguarding Security and Privacy of User Data on Stolen iOS Devices. In 4th International Symposium on Cyberspace Safety and Security (CSS 2012), LNCS vol. 7672, pp. 11–20, December 12–13, 2012, Melbourne, Australia.
    22. A. Srinivasan and L. Chenupatti (2012). Robust Authentication of Public Access Points Using Digital Certificates: A Novel Approach. In 4th International Symposium on Cyberspace Safety and Security (CSS 2012), LNCS vol. 7672, pp. 153–164, December 12–13, 2012, Melbourne, Australia.
    23. J. Spaulding, A. Krauss, and A. Srinivasan (2012). Exploring an Open WiFi Detection Vulnerability as a Malware Attack Vector on iOS Devices. In 7th IEEE International Conference on Malicious and Unwanted Software (Malware 2012), pp. 87–93, October 16–18, 2012, Fajardo, PR, USA.
    24. A. Srinivasan and J. Wu (2011). Duplicate File Names: A Novel Steganographic Data Hiding Technique. In International Workshop on Identity, Security, Management and Applications (ID 2011), July 22–24, 2011, Kochi, India.
    25. A. Telidevara, V. Chandrasekaran, A. Srinivasan, R. Mukkamala, and S. Gampa (2010). Similarity Coefficient Generator for Network Forensics. In IEEE International Workshop on Information Forensics and Security (WIFS 2010), December 12–15, 2010, Seattle, WA, USA.
    26. K. Yadav and A. Srinivasan (2010). ITrust: An Integrated Trust Framework for Wireless Sensor Networks. In Proceedings of the ACM Symposium on Applied Computing (SAC 2010), pp. 1466–1471, March 22–26, 2010, Sierre, Switzerland.
    27. A. Srinivasan and J. Wu (2009). A Novel Connected Dominating Set-Based Secure Localization Model for WSNs. In International Conference on Next Generation Wireless Systems (NGWS 2009), October 12–14, 2009, Melbourne, Australia.
    28. F. Li, A. Srinivasan, and J. Wu (2009). Thwarting Blackhole Attacks in Disruption-Tolerant Networks Using Encounter Tickets. In IEEE INFOCOM 2009, pp. 2428–2436, April 20–25, 2009, Rio de Janeiro, Brazil.
    29. R. Thanawala, J. Wu, and A. Srinivasan (2009). Efficient Resource Discovery in Mobile Ad Hoc Networks. In IEEE International Conference on Communications (ICC 2009), pp. 363–367, June 14–18, 2009, Dresden, Germany.
    30. A. Srinivasan and J. Wu (2008). TRACK: A Novel Connected Dominating Set-Based Sink Mobility Model for WSNs. In 17th International Conference on Computer Communications and Networks (ICCCN 2008), pp. 1–8, 2008, Virgin Islands, USA.
    31. A. Srinivasan, F. Li, and J. Wu (2008). A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. In 28th International Conference on Distributed Computing Systems Workshops, pp. 364–369, June 17–20, 2008, Beijing, China.
    32. A. Srinivasan and J. Wu (2007). A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks. In IEEE International Conference on Communications (ICC 2007), pp. 1497–1502, June 24–28, 2007, Glasgow, Scotland.
    33. A. Srinivasan, F. Li, J. Wu, and M. Li (2007). CAGE: Clique-Based Assignment of Group Key. In International Conference on Communications and Networking in China (ChinaCom 2007), August 22–24, 2007, Shanghai, China.
    34. F. Li, A. Srinivasan, M. Lu, and J. Wu (2007). Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks. In IEEE Global Communications Conference (GLOBECOM 2007), pp. 427–431, November 26–30, 2007, Washington, DC, USA.
    35. A. Srinivasan, J. Teitelbaum, and J. Wu (2006). DRBTS: Distributed Reputation-Based Beacon Trust System. In 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2006), pp. 277–283, September 29 – October 1, 2006, Indianapolis, IN, USA.
    36. A. Srinivasan and K. Govindarajan (2003). Biometrics in Information Security: Face Recognition. Presented at Norwalk Community College Information Security Demo (Honorable Mention), Norwalk, CT, USA.

    Book Chapters (0 total)

    1. M. J. De Lucia and A. Srinivasan (2024). Artificial Intelligence and Machine Learning for Network Security: Quo Vadis? In Y. Chen, J. Wu, P. Yu, and X. Wang (eds.), Network Security Empowered by Artificial Intelligence, Advances in Information Security, vol. 107, Springer, Cham. [Read PDF]
    2. A. Srinivasan and F. Ferrese (2019). Forensics-as-a-Service (FaaS) in the State-of-the-Art Cloud. In Security, Privacy, and Digital Forensics in the Cloud, Wiley, pp. 321–337. doi: 10.1002/9781119053385.ch16.
    3. A. Srinivasan and M. Gerla (2018). A Conditional Privacy Framework for Crowd-Assisted Community Policing. In Crowd Assisted Networking and Computing, pp. 199–218, CRC Press.
    4. A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei (2009). Reputation and Trust-Based System for Ad Hoc and Sensor Networks. In A. Boukerche (ed.), Algorithms and Protocols for Wireless Ad Hoc and Sensor Networks, pp. 375–402, Wiley.
    5. A. Srinivasan and J. Wu (2007). A Survey on Secure Localization in Wireless Sensor Networks. In Encyclopedia of Wireless and Mobile Communications, p. 126, CRC Press, Taylor & Francis Group.
    6. F. Li, A. Srinivasan, and J. Wu (2006). Security Issues in Sensor Surveillance. In L. T. Yang and M. K. Denko (eds.), Handbook on Mobile Ad Hoc and Pervasive Communications, American Scientific Publishers.