Journal Proceedings (reverse chronological order)

  1. S. Haque and T. Atkison, "An Evolutionary Approach of Attack Graph to Attack Tree Conversion," International Journal of Computer Network and Information Security (IJCNIS), vol. 9, no. 11, 2017, pp. 1-16.
  2. T. Atkison, S. Ponomarev, R. Smith, and B. Chen, "Feature Extraction Optimization for Network Intrusion Detection in Control System Networks," International Journal of Network Security (IJNS), 2017. (Accepted)
  3. S. Haque and T. Atkison, "A Forensic Enabled Data Provenance Model for Public Cloud," The International Journal of Electronic Security and Digital Forensics (IJESDF), 2017. (Submitted)
  4. N. Wallace and T. Atkison, "A Power Grid Incident Identification Based on Physically Derived Cyber-Event Detection," Journal of Digital Forensics, Security and Law, vol. 12, no. 2, 2017, pp. 5-18.
  5. N. Wallace, and T. Atkison, "On the Detection of Cyber-Events in the Grid Using PCA," International Journal of Critical Infrastructures, vol. 13, no. 2/3, 2017, pp. 96-112.
  6. S. Ponomarev, and T. Atkison, "Industrial Control System Network Intrusion Detection by Telemetry Analysis," IEEE Transaction on Dependable and Secure Computing, vol. 13, no. 2, 2016, pp. 252-260.
  7. J. Durand, J. Flores, N. Kraft, R. Smith, and T. Atkison, "Using Executable Slicing to Improve Rogue Software Detection Algorithms," International Journal of Secure Software Engineering, vol. 2. no. 2, 2011, pp. 53-64.


Conference Proceedings (reverse chronological order)

  1. S. Kim, M. Keffeler, T. Atkison, and A. Hainen, " Using Time Series Forecasting for Adaptive Traffic Signal Control," The 13th International Conference on Data Mining (DMIM'17), Las Vegas, NV, July 2017.
  2. M. Leeds, M. Keffeler, and T. Atkison, " Examining Features for Android Malware Detection ," The 2017 International Conference on Security and Management (SAM'17), Las Vegas, NV, July 2017.
  3. S. Haque, M. Keffeler, and T. Atkison, " An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling," The 2017 International Conference on Security and Management (SAM'17), Las Vegas, NV, July 2017.
  4. M. Leeds, M. Keffeler and T. Atkison, "A Comparison of Features for Android Malware Detection," The 2017 ACM Southeast Conference, Kennesaw, GA, April 2017.
  5. M. Leeds and T. Atkison, "Preliminary Results of Applying Machine Learning Algorithms to Android Malware Detection," The 2016 International Symposium on Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
  6. S. Ponomarev and T. Atkison, "Session Duration Based Feature Extraction for Network Intrusion Detection in Control System Networks," The 2016 International Symposium on Mobile Computing, Wireless Networks, and Security (CSCI-ISMC), Las Vegas, NV, December 2016.
  7. N. Wallace, S. Semple, and T. Atkison, "Identification of State Parameters for Stealthy Cyber-Events in the Power Grid Using PCA," IEEE Power and Engineering Society General Meeting, National Harbor, MD, July 2014.
  8. N. Wallace, S. Ponomarev, and T. Atkison, " Identification of Compromised Power System State Variables," The 2014 International Conference on Information and Knowledge Engineering (IKE'14), Las Vegas, NV, July 2014. (26% acceptance)
  9. S. Ponomarev, N. Wallace, and T. Atkison, "Fourier Transform as Feature Extraction for Malware Classification," The 2014 International Conference on Security and Management (SAM'14), Las Vegas, NV, July 2014.
  10. S. Ponomarev, N. Wallace, and T. Atkison, "Detection of SSH Host Spoofing in Control Systems Through Network Telemetry Analysis," The 9th Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014.
  11. N. Wallace, S. Ponomarev, and T. Atkison, "A Dimensional Transformation Scheme for Power Grid Cyber Event Detection," The 9th Cyber and Information Security Research Conference, ORNL, Oak Ridge, TN, April 2014. Best Paper Award
  12. N. Wallace and T. Atkison, "Detecting Cyber-Incidents in the Power Grid Using Principal Component Analysis," The 3rd Annual Graduate Research Conference College of Engineering and Science, Louisiana Tech University, October, 2013.
  13. S. Ponomarev, J. Durand, N. Wallace, and T Atkison, " Evaluation of Random Projection for Malware Classification," The 7th International Conference on Software Security and Reliability, Washington, DC, June 2013.
  14. N. Wallace and T. Atkison, " Observing Industrial Control System Attacks Launched Via Metaspliot Framework," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  15. J. Poore, J. Flores, and T. Atkison, "Evolution of Digital Forensics in Virtualization by Using Virtual Machine Introspection," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  16. S. Semple, S. Ponomarev, J. Durand, and T. Atkison, "Applying Static Analysis to High-Dimensional Malicious Application Detection," The 51st ACM Southeast Conference, Savannah, GA, April 2013.
  17. N. Wallace and T. Atkison, “Industrial Control System Security Concerns and Measures,” In Louisiana Scientist, Grambling, LA, Vol 4, No 1. March, 2013.
  18. J. Durand and T. Atkison, "Applying Random Projection to the Classification of Malicious Applications using Data Mining Algorithms," The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
  19. J. Flores and T. Atkison, "Evolution of Traditional Digital Forensics in Virtualization," The 50th ACM Southeast Conference, Tuscaloosa, AL, March 2012.
  20. J. Durand and T. Atkison, "Using Randomized Projection Techniques to Aid in Detecting High-Dimensional Malicious Applications," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
  21. J. Flores and T. Atkison, "Digital Forensics on a Virtual Machine," The 49th ACM Southeast Conference, Kennesaw, GA, March 2011.
  22. T. Atkison, " Aiding Prediction Algorithms in Detecting High-Dimensional Malicious Applications Using a Randomized Prediction Technique," The 48th ACM Southeast Conference, Oxford, MS, April 2010, ACM.


Presentations (reverse chronological order)

  1. Abigail Payne gave a presentation titled “A Review of Popular Reverse Engineering Tools from a Novice Perspective” at the 16th International Conference on Software Engineering Research and Practice (SERP '18) in Las Vegas, NV.
  2. Abigail Payne gave a presentation titled “An Approach to Analyze Power Consumption on Apps for Android OS based on Software Reverse Engineering” at the 16th International Conference on Software Engineering Research and Practice (SERP '18) in Las Vegas, NV.
  3. Abigail Payne gave a presentation titled “TTExTS: A Dynamic Framework to Reverse UML Sequence Diagrams From Execution Traces” at the 16th International Conference on Software Engineering Research and Practice (SERP '18) in Las Vegas, NV.
  4. Abigail Payne gave a presentation titled “Algorithms in Law Enforcement: Toward Optimal Patrol and Deployment Algorithms” at the 17th International Conference on Information and Knowledge Engineering (IKE'18) in Las Vegas, NV.
  5. Abigail Payne gave a presentation titled “Improving the Permission Model to Protect the Smartphone Users' Privacy and Applying it on Android” at the 17th International Conference on Security and Management (SAM'18) in Las Vegas, NV.
  6. Abigail Payne gave a presentation titled "Increasing Optical Character Recognition by Adding Localization Algorithms" at the 2018 URCA conference in Tuscaloosa, AL.
  7. Shariful Haque gave a presentation titled “Causes, Impacts, and Detection Approaches of Code Smell: A Survey” at the 2018 ACM Southeast Conference in Richmond, KY.
  8. Shariful Haque gave a presentation titled “Testing Vulnerabilities in Bluetooth Low Energy” at the 2018 ACM Southeast Conference in Richmond,KY.
  9. Abigail Payne gave a presentation titled "Increasing Optical Character Recognition by Adding Localization Algorithms" during the 2018 CBHLive! Broadcast in Tuscaloosa, AL.
  10. Miclain Keffeler gave a presentation titled “Using Time Series Forecasting for Adaptive Traffic Signal Control” at the 13th International Conference on Data Mining(DMIM’17) in Las Vegas, NV.
  11. Miclain Keffeler gave a presentation titled “Examining Features for Android Malware Detection” at the 2017 International Conference on Security and Management(SAM’17) in Las Vegas, NV.
  12. Miclain Keffeler gave a presentation titled “An Evolutionary Approach of Attack Graphs and Attack Trees: A Survey of Attack Modeling,” The 2017 International Conferenceon Security and Management (SAM’17) in Las Vegas, NV.
  13. Matthew Leeds gave a presentation titled “A Comparison of Features for Android Malware Detection” at the 2017 ACM Southeast Conference in Kennesaw, GA.
  14. Miclain Keffeler gave a presentation titled “A Comparison of Fuzzy Hashes: Evaluation, Guidelines, and Future Suggestions” at the 2017 ACM Southeast Conference in Kennesaw, GA.
  15. Dr. Atkison gave a presentation titled “An Overview of Emerging Privacy Issuesin the Internet of Things” at the 2016 International Symposium on Internet of Things and Internet of Everything (CSCI-ISOT)in Las Vegas, NV.
  16. Dr. Atkison gave a presentation titled “Preliminary Results of Applying Machine Learning Algorithms to Android Malware Detection” at the 2016 International Symposium on Mobile Computing, Wireless Networks, and Security (CSCI-ISMC) in Las Vegas, NV.
  17. Dr. Atkison gave a presentation titled “Session Duration Based Feature Extraction for Network Intrusion Detection in Control System Networks,” at the 2016 International Symposiumon Mobile Computing, Wireless Networks, and Security (CSCI-ISMC) in Las Vegas, NV.
  18. Dr. Atkison was invited to present “Digital Forensics” at the Analysis and Investigation through Cyber-Based Scenarios cyber camp at the University of Central Arkansas.
  19. Sean Semple gave a presentation titled “Identification of State Parameters for Stealthy Cyber-Events in the Power Grid Using PCA” at the IEEE Power and Engineering Society General Meetingin National Harbor, MD.
  20. Stan Ponomarev gave a presentation titled “Identification of Compromised Power System State Variables” The 2014 International Conference on Information and Knowledge Engineering (IKE’14) inLas Vegas, NV, July 2014.
  21. Stan Ponomarev gave a presentation titled “Fourier Transform as a Feature Extraction for Malware Classification” at the 2014 International Conference on Security and Management (SAM’14) in Las Vegas, NV.
  22. Dr. Atkison, Nathan Wallace and Stan Ponomarev were invited to present “Case Study: Use of Digital Forensics in Credit Card Fraud Case” at the Louisiana Forgery and Fraud Investigators Training Conference in Ruston.
  23. Dr. Atkison, Nathan Wallace and Stan Ponomarev were invited to present “Overview of Cyber Security and Digital Forensics” at the Louisiana Forgery and Fraud Investigators Training Conference in Ruston.
  24. Stan Ponomarev gave a presentation titled “Detection of SSH Host Spoofing in Control Systems Through Network Telemetry Analysis” at the 9th Cyber and Information Security Research Conference, ORNL in Oak Ridge, TN.
  25. Nathan Wallace gave a presentation titled “A Dimensional Transformation Scheme for Power Grid Cyber Event Detection” at the 9th Cyber and Information Security Research Conference, ORNL in Oak Ridge, TN.
  26. Nathan Wallace gave a presentation titled “Detecting Cyber-Incidents in the Power Grid Using Principal Component Analysis” at the 3rd Annual Graduate Research Conference College of Engineering and Scienceat Louisiana Tech University.
  27. Sean Semple gave a presentation titled “Evaluation of RandomProjection for Malware Classification” at the 7th International Conference on Software Security and Reliability in Washington, DC.
  28. Nathan Wallace gave a presentation titled “Observing Industrial Control System Attacks Launched Via Metasploit Framework” at the 51st ACM Southeast Conferencein Savannah, GA.
  29. James Poore gave a presentation titled “Evolution of Digital Forensics in Virtualization by Using Virtual Machine Introspection” at the 51st ACM Southeast Conference in Savannah, GA.
  30. Sean Semple gave a presentation titled “Applying Static Analysis to High-Dimensional Malicious Application Detection” at the 51st ACM Southeast Conference in Savannah, GA.
  31. Nathan Wallace gave a presentation titled “Industrial Control System Security Concerns and Measures” at the Louisiana Academy of Sciences in Grambling, LA.
  32. Dr. Atkison was invited to present “Control System Security” at the Cyber Engineering Conference in Shreveport.
  33. Jan Durand gave a presentation titled “Applying Random Projection to the Classification of Malicious Applications using Data Mining Algorithms” at the 50th ACM Southeast Conference in Tuscaloosa, AL.
  34. Juan Flores gave a presentation titled “Evolution of Traditional Digital Forensics in Virtualization” at the 50th ACM Southeast Conference in Tuscaloosa, AL.
  35. Jan Durand gave a presentation titled “Using Randomized Projection Techniques to Aid in Detecting High-Dimensional Malicious Applications” at the 49th ACM Southeast Conference in Kennesaw, GA.
  36. Dr. Atkison gave a presentation titled “Aiding Prediction Algorithms in Detecting High-Dimensional Malicious Applications Using a Randomized Prediction Technique” at the 48th ACM Southeast Conference in Oxford, MS.