images/random_pagetops/pic-6.jpg; images/random_pagetops/pic-9.jpg;
 

IA Research

This section of the CIFA website contains a listing of journal publications, conference proceedings and invited talks related to information forensics and assurance made by CIFA core members and its affiliates at the University at Albany from 2002 on. This is organized by the following sections:

Journal Publications

  • Goel, S., Pon, D., & Menzies, J. (2007). Managing Information Security: Demystifying the Audit Process for Security Officers. Journal on Information Systems Security (JISSEC), 2(2), 25-45.
  • Goel, S., & Gangolly, J.S. (2006). On Decision Support for Distributed Systems Protection: A Perspective Based on the Human Immune Response System and Epidemiology. International Journal on Information Management, 27(4), 266-278.
  • Becker, W. S., Dale, W. M., Lambert, A., and Magnus, D. (2006). Forensic lab directors’ perceptions of staffing issues, Journal of Forensic Sciences, In Press.
  • Dale, W. M and Becker, W. S. (2006). Managing Intellectual Capital, Forensic Science Communications, In Press.
  • Goel, S., Pon, D., & Bloniarz, P., Bangert-Drowns, R., Berg, G., Delio, V., Iwan, L., Hurbanek, T., Schuman, S., Gangolly, J., Baykal, A., & Hobbs, J. (2006). Innovative Model for Information Assurance Curriculum: A Teaching Hospital. ACM Journal on Educational Resources in Computing, Special Issue on Support for the Computer Security Curriculum, 6(3).
  • Goel, S., Baykal, A., & Pon, D. (2006). Botnets: The Anatomy of a Case. Journal of Information Systems Security (JISSEC), 1(3), 45-60.
  • Bush, S. F., and Goel, S. (2005). The Atropos Framework for Inline Communication Model Self-Assembly. Journal of Special Areas in Communication, Special Issue on Recent Advances in Managing Enterprise Network Services, 23(10), 2049-2057
  • Goel, S., Talya, S., & Sobolewski, M. (2005). Service-Based P2P Overlay Network for Collaborative Problem Solving. Decision Support Systems. In Press.
  • Dale, W. M. and Becker, W. S. A case study of forensic scientist turnover, Forensic Science Communications [Online]. (July 2004). Available: http://www.fbi.gov/hq/lab/fsc/backissu/july2004/index.htm.
  • Dawes, S.S., Cahan, B., Cresswell, A.M., Pardo, T.A., Thompson, F., Tayi, G.K., Harrison, T.M., Stewart, T., Birkland, T. (2004). Turning to Digital Government in a Crisis: Coordinating Government, Business & Nonprofit Services in Response to the World Trade Center Attacks of September 11, 2001. DG.O, 2004
  • R. Haehnle, Murray, N.V. and Rosenthal, E. (2004). Linearity and Regularity with Negation Normal Form. Theoretical Computer Science 328(3), 325-354.
  • Tayi, G. K., Rosenkrantz, D. J., and Ravi, S. S. (2004). Local Base Station Assignment with Time Intervals in Mobile Computing Environments. European Journal of Operational Research, 157(2), 267-285.
  • Goel, S., & Bush, S.F. (December 2004). Biological Models of Security for Virus Propagation in Computer Networks. ;login:, 29(6), 49-56.
  • Barrett, C., Hunt, H. B. III, Marathe, M. V., Ravi, S. S., Rosenkrantz, D. J., and Stearns, R. E., "Reachability Problems for Sequential Dynamical Systems with Threshold Functions", Theoretical Computer Science, 295, 1- 3, Feb. 2003, 41-64.
  • Lauría, E.J.M., and Tayi, G.K. (2003). A Comparative Study of Data Mining Algorithms for Network Intrusion Detection in the Presence of Poor Quality Data. IQ, 2003, 190-201
  • Goel, S., & Bush, S. F., (2003). Kolmogorov Complexity Estimates for Detection of Viruses in Biologically Inspired Security Systems: A Comparison with Traditional Approaches. Complexity Journal 9(2), 54-73.
  • Becker, W. S. and Dale, W. M. Strategic human resource management in the forensic science laboratory, Forensic Science Communications [Online]. (October 2003). Available: http://www.fbi.gov/hq/lab/fsc/backissu/oct2003/index.htm.
  • Dale, W. M. and Becker, W. S. (2003). Strategy for staffing forensic scientists, Journal of Forensic Sciences, 48(2), 465-466.
  • Tam, K., Goel, S., & Gangolly, J. (2003). On the Design of an XML-Schema Based Application for Business Reporting: An XBRL Schema. International Journal of Digital Accounting Research.

Top of page

Conference Proceedings

  • Goel, S., & Baykal, A. (November 4-7, 2007). Information Theoretic Approach for Characterization of Network Traffic. INFORMS Annual Meeting. Seattle, WA.
  • Goel, S. (July 17, 2007). Patrolling the Internet: The New Frontier of Crime. Conference on Information Science Technology and Management (CISTM '07), Osmania University Campus, Hyderabad, India.
  • Goel, S. Brown, C., and Shawky, H. (April 11-12, 2007). Measuring the Impact of Security Breaches on Stock Valuations of Firms. 6th Annual Security Conference. Las Vegas, NY.
  • Goel, S. (Sept. 22-23, 2006). Blueprint of a Security Glossary: A Common Language for Creating International Security Policies. Proceedings of the Advanced Research Workshop: A Process for Developing a Common Vocabulary in the Information, sponsored by NATO-Russia Council Science Committee, Lomonosov University, Russia.
  • Maniatty, W.A., Baykal, A., Aggarwal, V., Brooks, J., Krymer, A., and Maura, S. (2006). A Linux kernel auditing tool for host-based intrusion detection. ACSAC Techblitz 2005, Tucson, AZ, USA. Accepted.
  • Goel, S., & Crnkovic, Y. (May 21-24, 2006). RFID: Risks to the Supply Chain. Proceedings of the Information Resource Management Association (IRMA) International Conference, Washington, D.C. (C)
  • Goel, S., & Chengalur-Smith, IN. (December 10-11, 2005). An Innovative Approach to Security Policy Metric Development: A Foundation for Research in Security Policy Management. Proceedings of SoftWars, Imperial Palace, Las Vegas, NV.
  • Goel, S., & Chen, V. (December 10, 2005). Managing Risks in Business Process Reengineering: A Case Study at General Electric Wind Energy. Proceedings of the Fourth Workshop on e-Business (WeB 2005), The Venetian, Las Vegas, NV.
  • Goel, S., & Allen, MB. (July 10-13, 2005). A Risk Analysis Model to Predict Financial Loss Due to Cyber Attacks. Proceedings of the Symposium on Risk Management and Cyber-Informatics (RMCI'05), Orlando, FL.
  • Goel, S., & Lessner, L. (2005). Epidemiological Models for Computer Virus Spread. Proceedings of the American Statistical Association Conference.
  • Goel, S., & Pon, D. (June 15-17, 2005). Distribution of Patches within Vulnerable Systems: A Distributed Model. In the Proceedings of the 6th IEEE Information Assurance Workshop, USMA, West Point, NY.
  • Goel, S., Talya, S.S., & Sobolewski, M. (July 25-29, 2005). Preliminary Design Using Distributed Service-Based Computing. Proceedings of the 12th ISPE International Conference on Concurrent Engineering: Research and Applications, Fort Worth/Dallas, TX.
  • Rich, E., Martinez-Moyano, I.J., Conrad, S., Cappelli, D.M., Moore, A.P., Shimeall, T.J., Andersen, D.F., Gonzalez, J.J., Ellison, R.J., Lipson, H.F., Mundie, D.A., Sarriegui, J.M., Sawicka, A., Stewart, T. R., Torres, J. M., Weaver, E. A., and Wiik, J. (2005). Simulating Insider Cyber-Threat Risks: A Model-Based Case and a Case-Based Model. Proceedings of the 23rd International Conference of the System Dynamics Society. Boston, MA, July 17-21, 2005.
  • Hobbs, J. (April 2005). Predictors of Online Risk Behaviors for Children and Adolescents. Kelly Conference, Albany, NY.
  • Goel, S. (April 27-28, 2005). Innovative Model for Simplifying Information Security Risk Analysis. In the Proceedings of Working Together: R&D Partnerships in Homeland Security, a R&D Partnering Conference Sponsored by the Department of Homeland Security, Boston, MA.
  • Goel, S. & Chen, V. (May 23-26, 2005). Information Security Risk Analysis - A Matrix-Based Approach. Proceedings of the Information Resource Management Association (IRMA) International Conference, San Diego, CA.
  • Goel, S., & Pon, D. (May 23-26, 2005). An Innovative Model for Information Assurance Curriculum: A Teaching Hospital. Proceedings of the Information Resource Management Association (IRMA) International Conference, San Diego, CA.
  • Rosenkrantz, D., Goel, S., Ravi, S.S., & Gangolly, J. (April 20-22, 2005). Structure-Based Resilience Metrics for Service-Oriented Networks. Proceedings of the 5th European Dependable Computing Conference, Budapest, Hungary.
  • Baykal, A., Goel, S., & Pon, D. (March 30-31, 2005). Botnets: the Anatomy of a Case. Proceedings of the 4th Annual Security Conference, Las Vegas, NV.
  • Gangolly, J. (2004). On Formal Modeling of Accounting Information Systems. Keynote address presented at the International Conference in Digital Accounting Research, University of Huelva (Spain), October 15, 2004.
  • Davidson I., and Goutam, P. (2004). Locating Secret Messages in Images. Research Track, 10th SIGKDD 2004, Seattle.
  • Chundi, P., and Rosenkrantz, D. J. (April 2004). Constructing Time Decompositions for Analyzing Time Stamped Documents. Proc. SIAM Fourth Intl. Conf. on Data Mining, Orlando, FL.
  • Davidson I. et al, A General Approach to Incorporate Data Quality Matrices into Data Mining Algorithms, Industrial Track, 10th SIGKDD 2004, Seattle.
  • Davidson I. (2004). Ensemble Approaches for Stable Learners with Convergence Bounds. 19th AAAI Conference.
  • Yin, K. and Davidson I. (2004). Visually Comparing Clustering Algorithms. 8th PAKDD 2004.
  • Davidson, I., and Aminian, M. (2004). Using The Central Limit Theorem for Belief Network Learning, 8th International Symposium on A.I. and Math.
  • Yin, K., and Davidson I. (2004) Bayesian Model Averaging Across Model Spaces via Compact Encoding. The 8th International Symposium on A.I. and Math.
  • Goel, S., Belardo, S., & Iwan, L. (Jan 5-8, 2004). A Resilient Network that Can Operate Under Duress: To Support Communication between Government Agencies during Crisis Situations, Hawaii International Conference on System Sciences, Big Island, HW.
  • Goel, S., & Sobolewski, M. (December 2003). Trust and Security in Enterprise Grid Computing Environment, Proceedings of the IASTED Conference, New York City, NY.
  • Murray, N.V. and Rosenthal, E. (2003). Tableaux, Path Dissolution, and Decomposable Negation Normal Form for Knowledge Compilation. Proceedings of the International Conference TABLEAUX 2003 - Analytic Tableaux and Related Methods, Rome, Italy, September 2003. In Lecture Notes in Artificial Intelligence, Springer-Verlag, 2796, 165-180.
  • Mullin, L. R., Rosenkrantz, D. J., Hunt, H. B. III, and Luo, X. (March 2003). Efficient Radar Processing Via Array and Index Algebras. First Workshop on Optimizations for DSP and Embedded Systems (ODES), San Francisco, CA.
  • Towards a Computational Theory of Integrity for Accounting Systems: An Exploration, J. Gangolly and B. Curtze. Presented at the Research Symposium of the Artificial Intelligence & Emerging Technologies Section of the American Accounting Association, August, 2003.
  • Goel, S., & Gangolly, J. (August 4-5, 2003). Model for Trust Among Peers in Electronic Multiparty Transactions, Proceedings of the AMCIS Conference, Tampa, FL.
  • Murray, N.V., and Rosenthal, E. (July 2003). Knowledge Compilation: Decomposable Negation Normal Form versus Linkless Formulas. Proceedings of the Workshop on Model Computation - Principles, Algorithms, Applications. At CADE-19, Miami, Florida, July 29, 2003.
  • Kapur, D., Narendran, P., and Wang, L. (2003). An E-unification algorithm for analyzing protocols that use modular exponentiation. Fourteenth International Conference on Rewriting Techniques and Applications, (RTA-03), Valencia, Spain, Jun 9--11, 2003.
  • Davidson, I., and Yin, K. (2003). Semi-Lazy Learning: Combining Clustering and Classifiers to Build More Accurate Models. MLMTA 2003.
  • Davidson, I., and Yin, K. (2003). Message Length Estimators, Model Averaging and Optimal Prediction, In Eds. (Yu, Hansen and Vitanyi), Dimacs Workshop on Complexity and Inference.
  • Berg, G. Davidson, I. Duan, M., and Paul, G. (2003). Searching Hidden Messages: Automatic Detection of Steganography. Proceedings of the Fifteenth Innovative Applications of Artificial Intelligence Conference (IAAI-2003).
  • Haehnle, R., Murray, N.V., and Rosenthal, E. (June 2002). Unit Preference for Ordered Resolution and for Connection Graph Resolution. (Short paper) International Conference TABLEAUX 2002 - Analytic Tableaux and Related Methods, Lyon, France.
  • R. Liu, E. L. Lloyd, M. V. Marathe, R. Ramanathan and S. S. Ravi. (June 2002). Algorithmic Aspects of Topology Control Problems for Ad Hoc Networks, Proc. Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lusanne, Switzerland.
  • Pardo, T.A., Scholl, H.J. (2002). Walking atop the Cliffs--Avoiding Failure and Reducing Risk in Large-Scale E-government Projects. HICSS 2002, 124.
  • Lu, J., Murray, N.V., Radjavi, H., Rosenthal, E. and Rosenthal, P. (2002). Inference for Annotated Logics over Distributive Lattices. Proceedings of the Thirteenth International Symposium on Methodologies for Intelligent Systems, Lyon, France, June 27-29 2002. In Lecture Notes in Artificial Intelligence, Springer-Verlag, 2366, 285-293.
  • Davidson, I., and Satyanarayana, A. (2002). Speeding up k-means Clustering by Bootstrap Averaging, Third IEEE Data Mining Workshop on Clustering Large Data Sets.
  • Davidson, I. (2002). Visualizing Clustering Results. SIAM International Conference on Data Mining.
  • Davidson, I. (2002). Combining Probabilistic Search, Latent Variable Analysis and Classification Models. AAAI Workshop on Probabilistic Search.
  • Meadows, C., and Narendran, P. (Jan 2002). A Unification Algorithm for the Group Diffie-Hellman Protocol. Workshop on Issues in the Theory of Security (WITS-2002), Portland, OR.
Top of page

Books & Book Chapters

  • Goel, S., & Pon, D. (2006).Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital. In N. Sarkar (Ed.), Tools for Teaching Computer Networking and Hardware Concepts.
  • Goel, S., & Baykal, A., & Pon, D. (2006). Botnets: The Anatomy of a Case. In G. Dhillon (Ed.), Principles of IS Security: Text and Cases. In Press.

Top of page

Invited Talks (CIFA Core Members)

  • Goel, S. (December 29, 2007). Creating Security Policies for Information Protection. [Invited Talk]. 5th International Conference on e-Governance (ICEG-2007). University of Hyderabad, Hyderabad, India.
  • Goel, S. (October 26, 2007). The Governance of Internet - Problems of Internationalization. Third International Scientific Conference on Security and Counter Terrorism Issues. Lomonosov Moscow State University, Moscow, Russia.
  • Goel, S. (July 18, 2007). Patrolling the Internet. Conference on Information Science, Technology, and Management (CISTM '07). Osmania University Campus, Hyderabad, India.
  • Goel, S., Brown, C., & Shawky, H. (June 24, 2007). Measuring the Impact of Security Breaches on Stock Valuations of Firms. The 27th International Symposium on Forecasting. Marriott Marquis, Times Square, New York, NY.
  • Goel, S., & Pon, D. (June 6, 2007). Live Hacking Demo. NYS Cyber Security Conference, Empire State Plaza, Albany, NY.
  • Goel, S., & Bush, S.F. (November 1-2, 2006). A Model for Computer Network Pathway Analysis: Analogy from Cellular Regulatory Pathway, SFI Workshop on Adaptive and Resilient Computing Security (ARCS), Santa Fe Institute, Santa Fe, NM.
  • Goel, S., Pon, D., & Brown, C. (June 14, 2006). Hacking in the Air: Is Wireless Secure? NYS Cyber Security Conference, Empire State Plaza, Albany, NY
  • Goel, S., & Bush, S.F. (November 2-3, 2005). RNAi Inspired Model of Computer Network Security. SFI Workshop on Adaptive and Resilient Computing Security (ARCS), Santa Fe Institute, Santa Fe, NM.
  • Hurbanek, T. (October 2005). Computer Crime Trends. Secret Service Working Group, RPI, Rensselear, NY.
  • Hurbanek, T. (October 2005). Computer Forensics and Terrorism Investigations. New York Prosecutors Training Institute and NYS Office of Homeland Security.
  • Baykal, A. (September 19, 2005). Botnets: Detection, Recovery, and Protection. Seventeenth Annual Government Technology Conference (GTC East 2005), Empire State Plaza, Albany, NY.
  • Hurbanek, T. (September 2005). Handling Computer Crime. Hudson Valley Community College.
  • Hurbanek, T. (September 2005). Cybercrime SATCAST. FBI Training Network, FBI Academy.
  • Dale, M., Bloniarz, P., & Goel, S. (July 15, 2005). Latest Trends and Developments in Forensic Science. DAASNY Summer Conference 2005, Otesaga Hotel, Cooperstown, NY.
  • Goel, S., Pon, D., & Brown C. (June 15, 2005). Hackers on the Move: Threats to Wireless Security. 8th Annual NYS Cyber Security Conference, Empire State Plaza, Albany, NY.
  • Goel, S. (June 13, 2005). Botnets: Cyber Drone Armies of the Unscrupulous. SUNY Technology Conference, Hudson Valley Resort & Spa, Kerhonkson, NY.
  • Goel, S. (March 23, 2005). Botnets: Cyber Drone Armies of the Unscrupulous. 6th Annual CERIAS Symposium: Security in Motion, Purdue University, Purdue, IN.
  • Goel, S., & Dark, M. (March 23, 2005). Teaching Hospital: Reaching the Masses through Distance Delivery. 6th Annual CERIAS Symposium: Security in Motion, Purdue University, Purdue, IN.
  • Goel, S., Lodin, S., Soloman, J. (March 24, 2005). Shifting Assets [Panel Discussion]. 6th Annual CERIAS Symposium: Security in Motion, Purdue University, Purdue, IN.
  • Hobbs, J. (March 10, 2005). Predictors for Cyber Security Risk with Children. Albany Consortium for Research in Instructional Design and Theory: Learning and Instruction Forum, University at Albany, Albany, NY.
  • Baykal, A. (January 5, 2005). How a Botnet Works. New York State Monthly Information Security Officer (ISO) Meeting. Colonie, NY.
  • Goel, S., & Bush, S.F. (November 3-4, 2004). Network Security Inspired by Biological Regulatory Networks. SFI Workshop on Adaptive and Resilient Computing Security (ARCS), Santa Fe Institute, Santa Fe, NM.
  • Payne, G., Trapp, R., & Goel, S. (2004). Performing a Cyber Security Risk Assessment: Why? When? and How? National Webcast Initiative Retrieved from http://www.cscic.state.ny.us/msisac/webcasts/8_04/8_26.htm
  • Goel, S., & Prazak, S.(December 2004). Cyber Security: Are We Ready?. Korean Executive Program, University at Albany, Albany, NY.
  • Network Security Inspired by Biological Regulatory Networks. (November 3-4 2004). SFI Workshop on Adaptive and Resilient Computing Security (ARCS) , Sante Fe Institute, Sante Fe, NM.
  • Berg, G. (2004). A Teaching Hospital Approach to Identifying Risks, Research Problems and Teaching Materials in Information Security. Third National Conference on Mathematics and Security of Information Technologies, October 29, 2004, Moscow State University, Moscow, Russia.
  • Gangolly, J. (2004). On Formal Modeling of Accounting Information Systems. Opening keynote address at the International Conference in Digital Accounting Research, University of Huelva (Spain), October 15, 2004.
  • Goel, S., Prazak, S., & Pon, D. (September 2004). Cyber Threats! Live Demonstrations. Sixteenth Annual Government Technology Conference (GTC East 2004), Security Boot Camp, Empire State Plaza, Albany, NY.
  • Goel, S., Prazak, S., & Pon, D. (June 2004). Information Systems Vulnerability and Protection. SUNY Technology Conference, Hudson Valley, NY.
  • Goel, S. (2004). Cyber Attack! Threats and Vulnerabilities. (April 21-22 2004). New York State Cyber Security Conference, Empire State Plaza, Albany, NY.
  • Goel, S., and Bush, S.F. (2003). Kolmogorov Complexity Estimates for Detection of Viruses in Biologically Inspired Security Systems. (November 5-6 2003). SFI Workshop on Adaptive and Resilient Computing Security, Sante Fe Institute, Sante Fe, NM.
  • Goel, S. (2003). Immune/Epidemiology Models for Security. (February 24-25 2003). New York State Cyber Security Symposium, Utica, NY.

Top of page