Publications

DIGITAL FORENSICS

CyberPhysical Systems

  1. Yuan Hong , Sanjay Goel and WenMing Liu. “An Efficient and Privacy Preserving
    Scheme for Energy Exchange among Smart Microgrids.” International Journal of
    Energy Research (IJER), Vol. 40(3), pp. 313-331, March 2016, Wiley. [Impact
    Factor: 2.529]
  2. Yuan Hong , Wen Ming Liu and Lingyu Wang. “Poster: Privacy-preserving
    Smart Meter Streaming against Inference Attacks.” In the 37th IEEE Symposium
    on Security and Privacy (Oakland ’16) , San Jose, CA,May 23-25, 2016. [Poster ]
  3. Mingxuan Yue, Liyue Fan , Cyrus Shahabi. \Inferring Tra_c Incident Start Time
    with Loop Sensor Data." In CIKM , 2016 (to appear)
  4. Bush, S. F. & Goel, S. (2013). Persistence length as a metric for modeling and simulation of nanoscale communication networks. IEEE Journal of Selected Areas in Communication – 2013 Special Issue on Emerging Technologies in Communications. 31 (12), 815-824.
  5. Goel, S., (2011, Aug.). Cyber Warfare: Connecting the dots in cyber intelligence. Communications of the ACM, 54(8), 132-140.
  6. Rosenkrantz, D., Goel, S., Ravi, S.S., & Gangolly, J. (2009). Resilience Metrics for Service-Oriented Networks: A Service Allocation Approach. IEEE Transactions on Services Computing. 2(3), 183-196.
  7. Goel, S. (2009). Turbine Airfoil Optimization Using Quasi-3D Analysis Codes, International Journal of Aerospace Engineering, 2009, Article ID 531358, 13 pages. Doi:10.1155/2009/531358.
  8. Goel, S., Talya, S.S., Sobolewski, M. (2008). Mapping Engineering Design Processes onto a Service-Grid: Turbine Design Optimization. International Journal of Concurrent Engineering: Research & Applications, 16(2), 139-147.
  9. Goel, S., & Gangolly, J. S. (2006). On Decision Support for Distributed Systems Protection: A Perspective Based on the Human Immune Response System and Epidemiology. International Journal of Information Management, 27(4), 266-278.
  10. Bush, S. F., and Goel, S. (2005). An Active Model-Based Prototype for Predictive Network Management. IEEE Journal on Selected Areas in Communications, Special Issue on Recent Advances in Managing Enterprise Network Services, 23(10), 2049-2057.
  11. Goel, S., Talya, S.S., & Sobolewski, M. (2007). Service-Based P2P Overlay Network for Collaborative Problem Solving. Decision Support Systems, 43(2), 547-568.
  12. Goel, S., & Bush, S. F., (2003). Kolmogorov Complexity Estimates for Detection of Viruses in Biologically Inspired Security Systems: A Comparison with Traditional Approaches. Wiley Interscience Complexity Journal 9(2), 54-73.
  13. Goel, S., & Hajela, P. (2002). A Classifier Based Optimization Technique for Designing Turbine Airfoils. Engineering Optimization, 34,195-218.
  14. Goel, S., & Hajela, P. (1996). Identification of Parameter Couplings in Turbine Design using Neural Networks, AIAA Journal of Propulsion and Power, 12(3), 75-102.

Peer-Reviewed Books

  1. Goel, S., Hong, Y., Papakonstantinou, V., and Kaloza, D., (2015). Security Challenges in Smart Grid Implementation, Springer, London, ISBN 978-1-4471-6662-7, pp. 1-110, 2015.
  2. Goel, S., Bush, S. F. & Bakken, D. (Eds.). (2013). IEEE Vision for Smart Grid Communications: 2030 and Beyond. IEEE Press, pp. 1-390.
  3. Bush, S. F., Goel, S., & Simard, G. (Eds.), (2013). IEEE Vision for Smart Grid Communications: 2030 and Beyond Reference Model," IEEE Press, pp.1-11 (Extension for Book in #2).

Peer-Reviewed Book Chapters

  1. Goel, S., and Hong, Y., (2015). Cyber War Games: Strategic Jostling Among Traditional Adversaries (Chapter 1)” in “Cyber Warfare: Building the Scientific Foundation”, Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V., Wang, C. (Eds.), Springer, Berlin, ISBN 978-3-319-14038-4, 2015.

Conference Proceedings

  1. Califano, A., Dincelli, E. and Goel, S. (2015). Using Features of Cloud Computing to Defend Smart Grid against DDoS Attacks, 10th Annual Symposium On Information Assurance (Asia '15), June 2-3, 2015, Albany, NY.
  2. Goel, S., Bush, S.F., and Ravindranathan, K., (2014). Self-Organization Of Traffic Lights For Minimizing Vehicle Delays, International Conference on Connected Vehicles and Expo, Vienna, Austria, Nov. 3-7, 2014.
  3. Goel. S., Dincelli, E., Parker, A., Sprissler, E., (2014). Enabling a Self-Organized Traffic System in Existing Legacy Hardware, International Conference on Connected Vehicles and Expo, Vienna, Austria, Nov. 3-7, 2014.
  4. Warkentin, M., Goel, S. & Menard, P. (June 4-5, 2013). Consumer adoption of smart metering technology. Proceedings of the ASIA ’13: 8th Annual Symposium on Information Assurance, June 4-5, 2013, Empire State Plaza, Albany, NY. pp. 23-24. 
  5. Goel, S. (2010). Cyber Threats to the Critical Infrastructure. The Annual Security Conference, April 7-8, 2010, The Orleans, Las Vegas, NV.
  6. Bush, S.F., & Goel, S. (2009). The Impact of Persistence Length on the Communication Efficiency of Microtubules and CNT’s, Accepted June 2009 for Proceedings of the Fourth International ICST Conference on Nano-Networks (Nano-Net 2009), October 18-20, 2009, Luzern, Switzerland.
  7. Bush S. F., & Goel, S., (Sept. 14-16, 2006). Graph Spectra of Carbon Nanotube Networks. Proceedings of the First International Conference on Nano-Networks. Lausanne, Switzerland.
  8. Goel, S., & Crnkovic, Y. (May 21-24, 2006). RFID: Risks to the Supply Chain. Proceedings of the Information Resource Management Association (IRMA) International Conference, Washington, D.C.
  9. Lessner, L. & Goel, S., (August 7-11, 2005). Modeling a Computer Virus Epidemic. Proceedings of the American Statistical Association Joint Statistical Meetings (JSM).
  10. Goel, S., & Pon, D. (June 15-17, 2005). Distribution of Patches within Vulnerable Systems: A Distributed Model. Systems, Man and Cybernetics (SMC). Proceedings from the Sixth Annual IEEE Information Assurance Workshop, USMA, West Point, NY, 458- 460.
  11. Goel, S., Talya, S.S., & Sobolewski, M. (July 25-29, 2005). Preliminary Design Using Distributed Service-Based Computing. Proceedings of the 12th ISPE International Conference on Concurrent Engineering: Research and Applications, Fort Worth/Dallas, TX.
  12. Rosenkrantz, D., Goel, S., Ravi, S.S., & Gangolly, J. (April 20-22, 2005). Structure-Based Resilience Metrics for Service-Oriented Networks. Proceedings of the 5th European Dependable Computing Conference, Budapest, Hungary.
  13. Goel, S., Belardo, S., & Iwan, L. (Jan. 5-8, 2004). A Resilient Network that Can Operate Under Duress: To Support Communication between Government Agencies during Crisis Situations. Hawaii International Conference on System Sciences, Big Island, HW.
  14. Goel, S., & Sobolewski, M. (December 2003). Trust and Security in Enterprise Grid Computing Environment. Proceedings of the IASTED Conference on Communication, Network, and Information Security (CNIS 2003), New York City.
  15. Goel, S., & Gangolly, J. (August 4-5, 2003). Model for Trust Among Peers in Electronic Multiparty Transactions.Proceedings of the AMCIS Conference. Tampa, FL.
  16. Maughan, J.R., Hill, J.M., Willey, L.D., & Goel, S. (July 23-26 2000). Development of the Densepack Steam Turbine: A New Design Methodology for Increased Efficiency. International Joint Power Generation Conference, FL.
  17. Goel, S., Cofer, J.I., & Singh H. (June 10-13 1996). Turbine Airfoil Design Optimization. International Gas Turbine and Aeroengine Congress and Exposition, Birmingham, UK.
  18. Goel, S., & Lamson, S. (November 12-17 1995). Automating the Design Process for 3D Turbine Blades. (ME 1995) International Mechanical Engineering Congress and Exposition, San Francisco, CA.
  19. Goel, S., & Hajela, P. (September 7-9 1994). Identification of Parameter Couplings in Turbine Design using Neural Networks. 5th AIAA/USAF/NASA/ISSMO Symposium on Multidisciplinary Analysis and Optimization, Panama City Beach, FL.
  20. Goel S., & Lamson, S.H. (April 1994). Knowledge-Based System for Detailed Blade Design of Turbines. Applications of Artificial Intelligence XII: Knowledge-Based Systems in Aerospace and Industry, Orlando, FL.
  21. Goel, S., Cherry, D., & Gregory, B. (April 1993). Knowledge-Based System for Preliminary Aerodynamic Design of Aircraft Engine Turbines. Applications of Artificial Intelligence XI: Knowledge-Based Systems in Aerospace and Industry, Orlando, FL.
  22. Tong, S.S., Powell, D.J., & Goel, S. (February 1992). Integration of Artificial Intelligence and Numerical Optimization Techniques for the Design of Complex Aerospace Systems. Proceedings of the Aerospace Design Conference, Irvine, CA. AIAA-92-1189.
  23. Lee, H., Goel, S., Hunter, S., Gregory, B., & Tong, S.S. (July 1993). Toward Modeling for Concurrent Design of Aircraft Engine Turbines. 38th ASME International Gas Turbine and Aeroengine Congress and Exposition, Cincinnati OH.
  24. Goel, S., & Kwon, T.H. (August 1992). Geometric Reasoning for Automated Design of an Injection-Mold Cooling System. IAPR Workshop on Structural and Syntactic Pattern Recognition, Berne, Switzerland.
  25. Rao, P.N., & Goel, S. (1988). A Study in Computer Aided Process Planning, Workshop on Computer Aided Manufacture. The Institution of Engineers (India).

Privacy

  1. 1. Yuan Hong , Jaideep Vaidya, Haibing Lu and Wen Ming Liu. “ and
    Efficient Query Clustering via Top Ranked Search Results.” Web Intelligence:
    An International Journal (WI) , Vol. 14. (2), pp. 119-138, 2016, IOS Press.
  2. Yuan Hong , Jaideep Vaidya, Haibing Lu, Panagiotis Karras and Sanjay Goel.
    “Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted
    Utility.” IEEE Transactions on Dependable and Secure Computing (TDSC), Vol.
    12(5), pp. 504-518, 2015, IEEE Computer Society.
  3. Haibing Lu, Yuan Hong , Yanjiang Yang, Lian Duan and Nazia Badar. “Towards
    User-Oriented RBAC Model.” Journal of Computer Security (JCS) , Vol 23(1),
    pp. 107-129, 2015, IOS Press.
  4. Yuan Hong , Jaideep Vaidya and Shengbin Wang. “A Survey of Privacy-aware
    Supply Chain Collaboration: From Theory to Applications.” Journal of Information
    Systems (JIS) , Vol. 28(1), pp. 243-268, 2014, American Accounting Association.
    5. Yuan Hong  and Jaideep Vaidya. “An Inference-proof Approach to Privacy
  5. Peserving Horizontally Partitioned Linear Programs.” Optimization Letters , Vol.
    8(1), pp. 267-277, 2014, Springer-Verlag.
  6. Yuan Hong , Jaideep Vaidya and Haibing Lu. “Secure and Efficient Distributed
    Linear Programming.” Journal of Computer Security (JCS) , Vol. 20(5), pp.
    583-634, 2012, IOS Press.
  7. Haibing Lu, Jaideep Vaidya, Vijay Atluri and Yuan Hong . “Constraint-Aware
    Role Mining via Extended Boolean Matrix Decomposition.” IEEE Transactions
    on Dependable and Secure Computing (TDSC) , Special Issue on Data & Application
    Security, Vol. 9(5), pp. 655-669, 2012, IEEE Computer Society.

Refereed Conference, Workshop and Poster Papers

  1. 1. Yumei Chen, Yuan Hong  and Theresa Pardo. “Integrating DataMasking Standard
    and Application into Open Government Data.” In Proceedings of the 2016 IFIP
    EGOV/ePart Conference (EGOV ’16) , Guimaraes, Portugal, 2016. To Appear.
  2. Nicholas Rizzo, Ethan Sprissler, Yuan Hong  and Sanjay Goel. “Privacy-preserving
    Driving Style Recognition.” In Proceedings of the 2015 IEEE International Conference
    on Connected Vehicles and Expo (ICCVE ’15) , Shenzhen, China, Nov. 2015,
    Pages 232 237, IEEE.
  3. Yuan Hong , Jaideep Vaidya, Haibing Lu and Lingyu Wang. “Collaboratively
    Solving Traveling Salesman Problem with Limited Disclosure.” In Proceedings of
    the 28th Annual IFIP WG 11.3 Conference on Data and Applications Security
    and Privacy (DBSEC ’14) , Vienna, Austria, July 14-16, 2014, Pages 179-194,
    Springer-Verlag.
  4. Haibing Lu, Yuan Hong , Yanjiang Yang, Yi Fang and Lian Duan. “Dynamic
    Workflow Adjustment with Security Constraints.” In Proceedings of the 28th
    Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
    (DBSEC ’14) , Vienna, Austria, July 14-16, 2014, Pages 211-226, Springer-
    Verlag.
  5. Jaideep Vaidya, Anirban Basu, Basit Shafiq and Yuan Hong . “Differentially
    Private Nave Bayes Classification.” In Proceedings of the 12th IEEE International
    Conference on Web Intelligence (WI ’13) , Atlanta, GA, USA, Nov. 17-20, 2013,
    Pages 571-576, IEEE Computer Society.
  6. Haibing Lu, Yuan Hong , Yanjiang Yang, Lian Duan and Nazia Badar. “Towards
    User-Oriented RBAC Model.” In Proceedings of the 27th Annual IFIP WG 11.3
    Conference on Data and Applications Security and Privacy (DBSEC ’13) , Newark,
    NJ, USA, July 15-17, 2013, Pages 81-96, Springer-Verlag.
  7. Haibing Lu, Yuan Hong , Nick Street, FeiWang and Hanghang Tong. “Overlapping
    Clustering with Sparseness Constraints.” In Proceedings of ICDM Workshops
    (ICDMW ’12) , Brussels, Belgium, December 10-13, 2012, Pages 486-494, IEEE
    Computer Society.
  8. Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong , Nabil Adam and
    Vijay Atluri. “Privacy Preserving Subgraph Discovery.” In Proceedings of the 26th
    Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
    (DBSEC ’12) , Paris, France, July 11-13, 2012, Pages 161-176, Springer-Verlag.
  9. Yuan Hong , Jaideep Vaidya, Haibing Lu and MingruiWu. “Differentially Private
    Search Log Sanitization with Optimal Output Utility.” In Proceedings of the 15th
    ACM International Conference on Extending Database Technology (EDBT ’12) ,
    Berlin, Germany, March 26-30, 2012, Pages 50-61, ACM Press. (Acceptance rate:
    22.5%)
  10. Yuan Hong , Jaideep Vaidya, Haibing Lu and Basit Shafiq. “Privacy-preserving
    Tabu Search for Distributed Graph Coloring.” In Proceedings of the Third IEEE
    International Conference on Privacy, Security, Risk and Trust (PASSAT ’11) ,
    MIT, Boston, USA, October 9-11, 2011, Pages 951-958, IEEE Computer Society.
    (Acceptance rate: 8%)
  11. Yuan Hong , Jaideep Vaidya and Haibing Lu. “Search Engine Query Clustering
    using Top-k Search Results.” In Proceedings of the 10th IEEE International
    Conference on Web Intelligence (WI ’11) , Campus Scientifique de la Doua, Lyon,
    France, August 22-27, 2011, Pages 112-119, IEEE Computer Society. (Acceptance
    rate: 20.5%)
  12. Yuan Hong , Jaideep Vaidya and Haibing Lu. “Efficient Distributed Linear
    Programming with Limited Disclosure.” In Proceedings of the 25th Annual IFIP
    WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC
    ’11) , Richmond, VA, USA, July 11-13, 2011, Pages 170-185, Springer-Verlag.
  13. Haibing Lu, Jaideep Vaidya, Vijay Atluri and Yuan Hong . “Extended Boolean
    Matrix Decomposition.” In Proceedings of the 2009 International Conference on
    Data Mining (ICDM ’09) , Miami, FL, USA, December 6-9, 2009, Pages 317-326,
    IEEE Computer Society. (Acceptance rate: 8.9%)
  14. Yuan Hong , Xiaoyun He, Jaideep Vaidya, Nabil Adam and Vijay Atluri, “Effective
    Anonymization of Query Logs.” In Proceedings of the 18th ACM International
    Conference on Information and Knowledge Management (CIKM ’09) , Hong
    Kong, China, November 2-6, 2009, Pages 1465-1468, ACM Press. (Acceptance
    rate: 20.2%)
  15. Yuan Hong , Shuo Lu, Qian Liu, Lingyu Wang and Rachida Dssouli. “Preserving
    Privacy in e-Health Systems Using Hippocratic Databases.” In Proceedings of the
    32nd Annual IEEE International Computer Software and Applications Conference
    (COMPSAC ’08) , Turku, Finland, July 2008, Pages 692-697, IEEE Computer
    Society.
  16. Qian Liu, Shuo Lu, Yuan Hong , Lingyu Wang and Rachida Dssouli. “Securing
    Tele-health Applications in a Web-based e-Health Portal.” In Proceedings of the
    Third IEEE International Conference on Availability, Reliability and Security
    (ARES ’08) , Barcelona, Spain, March 4-7, 2008, Pages 3-9, IEEE Computer
    Society. (Acceptance rate: 21.1%)
  17. Yuan Hong , Shuo Lu, Qian Liu, LingyuWang and Rachida Dssouli. “A Hierarchical
    Approach to the Specification of Privacy Preferences.” In Proceedings of the 2007
    IEEE International Conference on Innovations in Information Technology (IIT
    ’07) , Dubai, November 2007, Pages 660-664, IEEE Communication Society.
  18. Shuo Lu, Yuan Hong, Qian Liu, Lingyu Wang and Rachida Dssouli. “Access
    Control in e-Health Portal Systems.” In Proceedings of the 2007 IEEE International
    Conference on Innovations in Information Technology (IIT ’07) , Dubai, November
    2007, Pages 88-92, IEEE Communication Society.
  19. Luan Tran, Liyue Fan , Cyrus Shahabi. \Distance-based Outlier Detection for
    Data Streams." In Proceedings of the 42nd International Conference on Very
    Large Data Bases (VLDB), 2016
  20. Hien To, Gabriel Ghinita, Liyue Fan , Cyrus Shahabi. \Di_erentially Private
    Location Protection for Worker Datasets in Spatial Crowdsourcing." In IEEE
    Transactions on Mobile Computing  (TMC), 2016
  21. Hien To, Liyue Fan , Luan Tran, Cyrus Shahabi. \Real-Time Task Assignment in
    Hyper-Local Spatial Crowdsourcing under Budget Constraints." In Proceedings of
    the IEEE International Conference on Pervasive Computing and Communications
    (PerCom), 2016
  22. Luca Bonomi, Liyue Fan , Hongxia Jin. \An Information Theoretic Approach
    to Individual Sequential Data Sanitization." In Proceedings of the Ninth ACM
    International Conference on Web Search and Data Mining  (WSDM), 2016
  23. Cyrus Shahabi, Liyue Fan , Luciano Nocera, Li Xiong, Ming Li. \Privacy-
    Preserving Inference of Social Relationships from Location Data: A Vision Paper."
    In Proceedings of the 23rd SIGSPATIAL International Conference on Advances in
    Geographic Information Systems  (GIS), 2015 Presenter/Third Prize Winner
  24. Hien To, Liyue Fan , Cyrus Shahabi. \Di_erentially Private H-Tree." In GeoPrivacy
    workshop at ACM SIGSPATIAL, 2015
  25. Minh Nguyen, Liyue Fan , Cyrus Shahabi. \Activity Recognition Using Wrist-
    Worn Sensors for Human Performance Evaluation." In Proceedings of the IEEE
    International Conference on Data Mining Workshop  (ICDMW), 2015
  26. Liyue Fan , Hongxia Jin. \A Practical Framework for Privacy-Preserving Data
    Analytics." In Proceedings of the 24th Internatial World Wide Web Conference
    (WWW), 2015
  27. Yonghui Xiao, Li Xiong, Liyue Fan , and Slawomir Goryczka. \DPCube: Di_erentially
    Private Histogram Release through Multidimensional Partitioning." In Transactions
    on Data Privacy  (TDP), Vol. 7, Iss. 3, 2014
  28. Liyue Fan , Luca Bonomi, Li Xiong, and Vaidy Sunderam. \Monitoring Web
    Browsing Behavior with Di_erential Privacy." In Proceedings of the 23rd Internatial
    World Wide Web Conference  (WWW), 2014
  29. Liyue Fan , Li Xiong. \An Adaptive Approach to Real-Time Aggregate Monitoring
    with Di_erential Privacy. " In IEEE Transactions on Knowledge and Data
    Engineering  (TKDE), Vol. 26, No. 9, September 2014
  30. Liyue Fan , Li Xiong. \Di_erentially Private Anomaly Detection with a Case
    Study on Epidemic Outbreak Detection." In Proceedings of IEEE 13th International
    Conference on Data Mining Workshops  (ICDMW), 2013
  31. Liyue Fan , Li Xiong, and Vaidy Sunderam. \Di_erentially Private Multi-Dimensional
    Time Series Release for Tra_c Monitoring. " In Proceedings of the 27th Annual
    IFIP WG 11.3 Conference  (DBSec), pages 33-48, 2013 Best Student Paper
  32. Liyue Fan , Li Xiong, and Vaidy Sunderam. \FAST: Di_erentially Private Real-
    Time Aggregate Monitor with Filtering and Adaptive Sampling. " In Proceedings
    of the 2013 ACM SIGMOD International Conference on Management of Data
    (SIGMOD), 2013
  33. Li Xiong, Vaidy Sunderam, Liyue Fan , Slawomir Goryczka, and Layla Pournajaf.
    \PREDICT: Privacy and Security Enhancing Dynamic Information Collection and
    Monitoring. " In Procedia Computer Science , Volume 18, Pages 1979-1988, 2013
  34. Liyue Fan , Li Xiong. \Real-Time Aggregate Monitoring with Di_erential Privacy."
    In Proceedings of the 21st ACM international conference on Information and
    knowledge management  (CIKM), 2012
  35. Hong, Y., Vaidya, J., Lu, H., Karras, P., and Goel, S., (2014). Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility”, IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Computer Society.
  36. Goel, S., & Shawky, H. (2014). The Impact of Federal and State Notification Laws on Security Breach Announcements. Communications of the AIS, 34(3). [Research Gate Impact Factor: 1.29]
  37. Goel, S. & Shawky, H. (2009). Estimating the Impact of Security Breaches on Stock Valuations of Firms, Information & Management, 46(7), 404–410.
  38. Goel, S., Baykal, A., & Pon, D. (2006). Botnets: The Anatomy of a Case. Journal of Information Systems Security (JISSEC) 1(3), 45-60.
  39. Tam, K., Goel, S., & Gangolly, J. (2003). On the Design of an XML-Schema Based Application for Business Reporting: An XBRL Schema. International Journal of Digital Accounting Research. 2(1), 83-118.
  40. Goel, S. and Augustine, W. (2016) An SEC 10-K XML Schema Extension to Extract Cyber Security Risks in Proceedings of The 22nd Americas’ Conference on Information Systems (AMCIS ‘16), San Diego, CA., Aug. 11-14, 2016.
  41. Goel, S. (November 11-13, 2010). Privacy versus National Security: The Fight against Encrypted Communication. Proceedings of the 6th International Conference “Scientific Issues in Security and Combating Terrorism.” Lomonosov University, Moscow, Russia.
  42. Chinnam, S., & Goel, S. (June 2-3 2008). Classification of DoS Attacks using MIB Objects. 7th Annual Security Conference.  Las Vegas, NV.
  43. Goel, S., Brown, C., & Shawky, H. (April 11-12, 2007). Measuring the Impact of Security Breaches on Stock Valuations of Firms. 6th Annual Security Conference. Las Vegas, NV.
  44. Goel. S., & Baykal, A. (April 19-20, 2006). Improving Intrusion Detection: Analyzing the Payload in Network Traffic. In the Proceedings of the 5th Annual Security Conference, Las Vegas, NV.
  45. Goel, S., & Allen, MB. (July 10-13, 2005). A Risk Analysis Model to Predict Financial Loss Due to Cyber Attacks. Proceedings of the Symposium on Risk Management and Cyber-Informatics (RMCI'05), Orlando, FL.
  46. Goel, S. (April 27-28, 2005). Innovative Model for Simplifying Information Security Risk Analysis. Proceedings of Working Together: R&D Partnerships in Homeland Security, a R&D Partnering Conference Sponsored by the Department of Homeland Security, Boston, MA.
  47. Goel S., & Talya, S. (August 2004). Constrained Optimization Using Cellular Automata. Proceedings of the 10th AIAA/ISSMO Multidisciplinary Analysis and Optimization Conference, Albany, NY.

Peer-Reviewed Book Chapters

  1. Goel, S., & Baykal, A., & Pon, D. (2007). Botnets: Anatomy of a Case. In G. Dhillon (Ed.), Principles of IS Security: Text and Cases. Hoboken, NJ: John Wiley & Sons, 335-348. (Reprint--Originally published in the Journal of Information Systems Security)
  2. Goel, S., & Embrechts M. (1996). Quantification of shape characteristics by using Neural Nets. ARTIFICIAL NEURAL NETWORKS IN ENGINEERING: Intelligent Systems through Artificial Neural Networks, Smart Engineering Systems, Neural Networks, Fuzzy Logic and Evolutionary Programming, 6, Dagli C. H., Akay M., Chen C. L. P., Fernandez B., and Ghosh J. (Eds.), 1996.

Behavioral Security

  1. M. Shekhawat, S. Deshmukh, G., Monroy, A. Tiwari, X. He, H. Shin. Y. Hong
    and H. Lu, “Usability Test of Personality Type within a Roommate Matching
    Website: A Case Study.” Journal of International Technology and Information
    Managmeent (JITIM) , International InformationManagement Association (IIMA),
    Vol. 23(5), Article 5, 2016.
  2. Justin Giboney, Joseph Buckman and Yuan Hong . “Social Media is Weakening
    Passwords.” In Proceedings of the AIS SIGSEC Workshop in Information Security
    and Privacy (WISP ’15) , in Conjunction with the International Conference on
    Information Systems (ICIS ’15), Ft. Worth, TX, 2015, Paper 3, Association for
    Information Systems.
  3. Jay F. Nunamaker Jr., Nathan W. Twyman, Justin Scott Giboney, Robert Briggs. Breaking out of the Design Science Box: High-Value Impact through Multidisciplinary Design Science Programs of Research. (Invited for second round review at MIS Quarterly 26 Jan 2015; Second round submitted 20 Jul 2015; Conditional Acceptance 29 Sep 2015; Accepted 28 Jun 2016).
  4. Justin Scott Giboney, Jeffrey Gainer Proudfoot, Sanjay Goel, and Joseph S. Valacich. The Security Expertise Assessment Measure (SEAM): Developing a Scale for Hacker Expertise. Computers & Security, 60 pp 37 51 http://www.sciencedirect.com/science/article/pii/S0167404816300323
  5. Judee K. Burgoon, Joe Bonito, Gregory D. Moody, Paul Benjamin Lowry, Sean L. Humphreys, James Gaskin, Justin Scott Giboney. Application of Expectancy Violations Theory to Communication with and Judgments of Embodied Agents during Decision-Making. International Journal of Human-Computer Studies, 91, July 2016, Pages 24-36
    http://www.sciencedirect.com/science/article/pii/S1071581916000227
  6. Judee K. Burgoon, William Mayew, Justin Scott Giboney, Aaron Elkins, Kevin Moffitt, Lee Splitzley, Michael Byrd, and Bradley Dorn (2016). Which Spoken Language Markers Identify Deception in High-Stakes Settings? Evidence from Earnings Conference Calls. Journal of Language and Social Psychology, 35(2) pp 123-157.
    http://jls.sagepub.com/content/35/2/123.full.pdf
  7. Justin Scott Giboney, Susan A. Brown, Paul Benjamin Lowry, and Jay F. Nunamaker Jr. (2015) User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit. Decision Support Systems, 72(1) pp 1-10.
    http://www.sciencedirect.com/science/article/pii/S0167923615000251
  8. Paul Benjamin Lowry, Justin Scott Giboney, Ryan Schuetzler, Tom Gregory, and John
    Romney (2015). Is Trust Always Better than Distrust? The Potential Value of Distrust in Newer Virtual Teams Engaged in Short-Term Decision-Making. Group Decision and Negotiation, 24(4) pp 723-752. http://link.springer.com/article/10.1007/s10726-014-9410-x
  9. Jordan B. Barlow, Justin Scott Giboney, Mark Jeffery Keith, David W. Wilson, Ryan M.
    Schuetzler, Paul Benjamin Lowry, and Anthony Vance (2011). Overview and Guidance on Agile Development in Large Organizations. Communications of the Association for Information Systems, 29(1) pp 25-44. http://aisel.aisnet.org/cais/vol29/iss1/2/
  10. Goel, S., Williams, K., Zavoyskiy, S., Miller, B., (2016) Stopping Insiders Before They Attack: Understanding Motivations and Triggers, Workshop on Information Security and Privacy, December 10, Dublin. 
  11. Goel, S., Williams, K., Dincelli, E., (2016) Got Phished: Internet Security and Human Vulnerability, Journal of the AIS.
  12. Goel, Sanjay (2015): Anonymity vs. Security: The Right Balance for the Smart Grid," Communications of the Association for Information Systems, 36(2), Available online at http://aisel.aisnet.org/cais/vol36/iss1/2
  13. Goel, S., & Chengalur-Smith, I-N. (2010, Dec.). Metrics for Characterizing the Form of Security Policies. Journal of Strategic Information Systems, 19(4), 281-295.
  14. Goel, S., Miesing, P., and Chandra U. (2010). The Impact of Illegal Peer-to-Peer File-Sharing on the Media Industry, California Management Review, 52(3), 6-33.
  15. Goel, S., & Lauría, E.J.M. (2010). Quantification, Optimization, and Uncertainty Modeling in Information Security Risks: A Matrix Based Approach. Information Resources Management Journal, 23(2), 33-52.
  16. Goel, S., & Chen, V. (2008). Can Business Process Reengineering Lead to Security Vulnerabilities: Analyzing the Reengineered Process. International Journal of Production Economics, 115(1), 104-112.
  17. Goel, S., & Chen, V. (2008). Integrating the Global Enterprise Using Six Sigma: Business Process Reengineering at General Electric Wind Energy. International Journal of Production Economics Special Section on Advanced Modeling and Innovative Design of Supply Chain, 113(2), 914-927.
  18. Goel, S., Brown, C., & Shawky, H. (2007). Complexity and the Performance of Investment Portfolios. Advances in Investment Analysis and Portfolio Management, 3(2007), 83-102.
  19. Goel, S., Pon, D., & Menzies, J. (2006). Managing Information Security: Demystifying the Audit Process for Security Officers. Journal on Information Systems Security (JISSEC), 2(2), 25-45.

Refereed Conference Proceedings

  1. 1.Goel, S., Warkentin, M., Willams, K. J., and Renaud, K. (2016) Does Risk Disposition Play a Role in Influencing Decisions to Behave Securely? IFIP Dewald Roode Information Security Workshop, October 7-8, Albuquerque, NM.
  2. Kam, H-J., Goel, S., Katerattanakul, P., Hong S., Organizational Security Norms in the Banking Industry: The United States vs. South Korea, Workshop on Information Security and Privacy (Pre-ICIS Workshop), December 13, Fort Worth Texas.
  3. Dincelli, E., and Goel, S., (2015) Research Design for Study of Cultural and Societal       Influence on Online Privacy Behavior, The 2015 Roode Workshop on Information Systems, October 2-3, University of Delaware, Delaware. (Accepted).
  4. Giboney, J., Goel, S., Valacich, J.S., (2015). Measuring Hacking Ability Using A Conceptual Expertise Task ADFSL Conference on Digital Forensics, Security and Law.
  5. Goel, S. (Sept. 22-23, 2006). Blueprint of a Security Glossary: A Common Language for Creating International Security Policies. In J. Von Knop, A.A. Salnikov, V.V. Iashchenko (eds.) (2007). Proceedings of the Advanced Research Workshop: A Process for Developing a Common Vocabulary in the Information, sponsored by NATO-Russia Council Science Committee, Lomonosov University, Russia. Fairfax, VA: IOS Press, pp. 52-61.
  6. Goel, S., & Chengalur-Smith, IN. (December 10-11, 2005). An Innovative Approach to Security Policy Metric Development: A Foundation for Research in Security Policy Management. Proceedings of SoftWars, Imperial Palace, Las Vegas, NV.
  7. Goel, S., & Chen, V. (December 10, 2005). Managing Risks in Business Process Reengineering: A Case Study at General Electric Wind Energy. Proceedings of the Fourth Workshop on e-Business (WeB 2005), The Venetian, Las Vegas, NV.
  8. Goel, S. & Chen, V. (May 23-26, 2005). Information Security Risk Analysis - A Matrix-Based Approach. Proceedings of the Information Resource Management Association (IRMA) International Conference, San Diego, CA.

Cybersecurity Education

  1. Goel, S., Pon, D., & Bloniarz, P., Bangert-Drowns, R., Berg, G., Delio, V., Iwan, L., Hurbanek, T., Schuman, S., Gangolly, J., Baykal, A., and Hobbs, J.,  (2006). Innovative Model for Information Assurance Curriculum: A Teaching Hospital. ACM Transactions on Computing Education (TOCE), 6(3), Article 2.


Peer-Reviewed Book Chapters

  1. Goel, S., & Pon, D. (2006). Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital. In N. Sarkar (Ed.), Tools for Teaching Computer Networking and Hardware Concepts. Hershey, PA: Information Science Publishing, 179-199.
  2. Goel, S., & Pon, D. (May 23-26, 2005). An Innovative Model for Information Assurance Curriculum: A Teaching Hospital. Proceedings of the Information Resource Management Association (IRMA) International Conference, San Diego, CA.