Home

 

 

PUBLICATIONS

Journal Papers

1.     C. Romanowski, R. Raj, J. Schneider, S. Mishra, V. Shivshankar, S. Ayengar, F.Cueva (2015). Regional response to large-scale emergency events: Building on historical data, Intl. Journal of Critical Infrastructure Protection (Elsevier), 11, 12-21.

2.     H. Tuncer, S. Mishra and N. Shenoy (2012). A Survey of Identity and Handoff Management Approaches for the Future Internet, Computer Communications (Elsevier), 36(1), 63-79.

3.     S. Mishra, M. Venkatesh and B. Attaie (2011). Developing a neighborhood-scale wireless notification prototype, International Journal on Computing (GSTF), 1(2), 216-221.

4.     G. Thamilarasu, S. Mishra and R. Sridhar (2011). Improving Reliability of Jamming Attack Detection in Ad hoc Networks, International Journal of Communication Networks and Information Security, 3(1), 57-66.

5.     E. Golen, S. Mishra and N. Shenoy (2010). An Underwater Sensor Allocation Scheme for a Range Dependent Environment, Computer Networks (Elsevier), 54(3), 404-415.

6.     R. Sridharan, R. Sridhar and S. Mishra (2003). A Robust Header Compression Technique for Wireless Ad hoc Networks, ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 23-24.

7.     O.K. Tonguz, S. Mishra, and H. Jung (1998). A Simple Analytical Framework for Location Management in Personal Communication Systems, IEEE Transactions on Vehicular Technology, 47(2), 428-439.

8.     S. Mishra and O.K. Tonguz (1998). Analysis of Intelligent Paging in Personal Communication Systems, IET Electronic Letters, 34(1), 12-13.

Book/ Book Chapters

9.     T. Oh, S. Mishra and C. Hochgraf (2013). Smart Grid Security in the Last Mile, Security and Privacy in Smart Grids (Yang Xiao, Editor) CRC Press, 271-290.

10.  S. Mishra (2011). Wireless Sensor Networks: Emerging Applications and Security Solutions, Network Security, Administration and Management: Advancing Technologies and Practices (D. Kar & M. Syed, Editors) IGI Global Publishers, 217-236.

11.  Y. Pan, B. Yuan and S. Mishra (2011). Network Security Auditing, Network Security, Administration and Management: Advancing Technologies and Practices (D. Kar & M. Syed, Editors) IGI Global Publishers, 131-157.

12.  S. Mishra and N. Shenoy (2009), Multihop, Multipath and Load Balanced Routing in Wireless Mesh Networks, Encyclopedia on Ad hoc and Ubiquitous Computing (D. Agrawal & B. Xie, Editors), World Scientific, 565-586.

13.  N. Shenoy and S. Mishra (2008), Vertical Handoff and Mobility Management for Seamless Integration of Heterogeneous Wireless Access Technologies, Heterogeneous Wireless Access Networks: Architectures and Protocols (E. Hossain, Editor), Springer, 181-213.

14.  S. Mishra and O. K. Tonguz (1999). Paging Communication for Locating Mobile Users, Wiley Encyclopedia of Electrical and Electronics Engineering, John Wiley & Sons, vol. 15, 572-579.

Peer-Reviewed Conference Papers  

15.  S. Engen, D. Mir, S. Mishra, L. Pollock, and P. Ruvolo (2017). Partnered Teaching of Interdisciplinary CS+X Courses: Models and Experiences, ACM Consortium for Computing Sciences in Colleges — Northeastern Region (ACM CCSCNE 2017), 6 pages, accepted for publication.

 

16.  Y. Pan, S. Mishra and D. Schwartz (2017). Gamifying Course Modules for Entry Level Students, ACM Special Interest Group in Computer Science Education (ACM SIGCSE 2017), 6 pages, accepted for publication.

 

17.  S. Afrin and S. Mishra (2016). An Anonymized Authentication Framework for Smart Metering Data Privacy, IEEE Conference on Innovative Smart Grid Technologies (IEEE ISGT2016), Minneapolis, MN, 1-5.

 

18.  B. Lipton and S. Mishra (2016). Formalizing Anonymity-Delay Tradeoffs in Smart Grid Networks, 4th IEEE International Conference on Smart Energy Grid Engineering (IEEE SEGE 2016), Oshawa, ON, 353-357.

 

19.  S. Alshehri, S. Mishra and R.K. Raj (2016). Using Access Control to Mitigate Insider Threats to Healthcare Systems, IEEE International Conference on Healthcare Informatics (IEEE ICHI 2016), Chicago, IL, 55-60.

 

20.  S. Mishra, T. Howles, R.K. Raj, C. Romanowski, J. Schneider, A. McNett and D.J. Dates (2016). A modular approach to teaching critical infrastructure protection concepts to engineering, technology and computing students, IEEE Frontiers in Education Conference (IEEE FIE 2016), Erie, PA, 1-7.

 

21.  Y. Pan, R. McGlinn, S. Mishra, and D. Schwartz (2016). Gamifying Cybersecurity Modules for Entry Level Students, 20th Colloquium for Information Systems Security Education (CISSE  2016), Philadelphia, PA, 10 pages.

 

22.  C. Romanowski, J. Schneider, S. Mishra, R.K. Raj, R. Rosario, K. Stein, and B. Solanki (2016). Response and Recovery: A quantitative approach to emergency management, IEEE International Conference on Technologies for Homeland Security (IEEE HST 2016), Waltham, MA, 6 pages.

 

23.  J. Schneider, C. Romanowski, R. K. Raj, S. Mishra, J. Aleckna, and Kaiyue Wang (2016). Mapping a community resilience management system: building operational knowledge, IEEE International Conference on Technologies for Homeland Security (IEEE HST 2016), Waltham, MA, 6 pages.

 

24.  C. Romanowski, R.K. Raj, J. Schneider, S. Mishra, B. Brooks, J. Pardee, B. Bhole, and N. Robalino (2016). The Community as Responder: A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions, Tenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Arlington, VA, 203-218.

 

25.  S. Mishra, R. K. Raj, C. J. Romanowski, J. Schneider and A. Critelli (2015). On building cybersecurity expertise in critical infrastructure protection, IEEE Conference on Technologies for Homeland Security (IEEE HST 2015), Waltham, MA, pp. 1-6 (DOI:10.1109/THS.2015.7225263).

 

26.  J. Schneider, C. J. Romanowski, R. K. Raj, S. Mishra and K. Stein (2015). Measurement of locality specific resilience: an operational model, IEEE Conference on Technologies for Homeland Security (IEEE HST 2015), Waltham, MA, pp. 1-6 (DOI: 10.1109/THS.2015.7225332).

 

27.  Y. Pan, D. Schwartz, and S. Mishra (2015). Gamified Digital Forensics Course Modules for Undergraduates, 5th IEEE Integrated STEM Education Conference (IEEE ISEC 2015), Princeton, NJ, 100-105.

 

28.  C. Romanowski, R. Raj, J. Schneider, S. Mishra, V. Shivshankar, S. Ayengar, F.Cueva (2015). Regional response to large-scale emergency events: Building on historical data, Ninth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Arlington, VA (paper presented at the conference, invited article for Elsevier Journal of Critical Infrastructure Protection).

 

29.  W. Huba, B. Yuan, Y. Pan, and S.Mishra (2013). Towards A Web Tracking Profiling Algorithm, IEEE Conference on Technologies for Homeland Security (IEEE HST 2013), Boston, MA, 12-17.

 

30.  C. Romanowski, S. Mishra, R. Raj, T. Howles, and J. Schneider (2013). Information management and decision support in critical infrastructure emergencies at the local level, IEEE Conference on Technologies for Homeland Security (IEEE HST 2013), Boston, MA, 113-118.

 

31.  S. Mishra, C. Romanowski, R. Raj, T. Howles, and J. Schneider (2013). A Curricular Framework for Critical Infrastructure Protection Education for Engineering, Technology and Computing Majors, IEEE Frontiers in Education Conference (IEEE FIE 2013), Oklahoma City, OK, 1779-1781.

 

32.  Y. Pan and S. Mishra (2013). Advanced Forensics Labs to meet Computer Forensics challenges due to Technological Advancements, Proceedings of the 17th Colloquium for Information Systems Security Education (CISSE 2013), Mobile, AL, 21-30.

 

33.  H. Tuncer, N. Shenoy, A. Kwasinski, J. Hamilton, and S. Mishra (2012). A Novel User-centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility Protocols, IEEE Global Communications Conference (IEEE GLOBECOM 2012), Anaheim, CA, 2578 – 2584.

 

34.  Y. Pan, S. Mishra, B. Yuan, B. Stackpole and D. Schwartz (2012). Game-based Forensics Course for First Year Students, Proceedings of 13th Annual ACM Special Interest Group for Information Technology Education (ACM SIGITE 2012), Calgary, Canada, 13-18.

 

35.  N. Winemiller, B. Hartpence, D. Johnson and S. Mishra (2012). NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Proceedings of International Conference on Security and Management (SAM  2012), Las Vegas, NV.

 

36.  J. Treglia, L. W. McKnight, M. Venkatesh, T. Bose, J. Van Aardt, Jan, D. Mckeown, S. Mishra, and M. Lee (2011). Social Emergency Response Technology Policy: Wireless Grid Edgeware for Collaboration in Infrastructureless Wireless Networks, Intelligent Distributed Augmented Wireless Gateways (IDAWG), Neighborhood Notification and Advanced Situational Awareness Systems (ASAS), 40th Research Conference on Communication, Information and Internet Policy, Arlington, VA, September 2011.

 

37.  R.K. Raj, S. Mishra, C. Romanowski and T. Howles (2011). Cybersecurity as General Education, Proceedings of the 15th Colloquium for Information Systems Security Education (CISSE 2011), Fairborn, Ohio, 10-15.

 

38.  O. Polatcan, S. Mishra, and Y. Pan (2011). E-mail Behavior Profiling based on Attachment Type and Language, Proceedings of 6th Annual Symposium on Information Assurance (ASIA 2011), Albany, NY, 6 -10.

 

39.  T. Howles, C. Romanowski, S. Mishra, and R.K. Raj (2011). A Holistic, Modular Approach to Infuse Cybersecurity into Undergraduate Computing Degree Programs, Proceedings of 6th Annual Symposium on Information Assurance (ASIA 2011), Albany, NY, 67 -70.

 

40.  D. Pearson, S. Mishra, and Y. Pan (2011). Dynamic Threat-resistant Node Identification in Sensor Networks, Proceedings of International Conference on Security and Management (SAM 2011), Las Vegas, NV.

 

41.  D. Pearson, S. Mishra and Y. Pan (2010). Security Attacks and Defenses in Sensor networks, Proceedings of International Conference on Security and Management (SAM 2010), Las Vegas, NV.

 

42.  T. Oh, S. Mishra and Y. Pan (2009). Teaching High-Assurance Internet Protocol Encryption (HAIPE) using OPNET Modeler Simulation Tool, Proceedings of the 10th ACM conference on SIG-information technology education (ACM SIGITE 2009), ACM, New York, NY, USA, 161-165.

 

43.  S. Mishra, Y. Pan and T. Oh (2009). Undergraduate Research in Wireless Sensor Security Course, Proceedings of the 13th Colloquium for Information Systems Security Education (CISSE 2009), Seattle, Washington, 139 – 144.

 

44.  T. Oh, Y. Pan, and S. Mishra (2009). Network Management Architecture for Energy Efficient Mobile Ad-Hoc Networks, Proceedings of US-Korea Conference on Science, Technology, and Entrepreneurship (UKC ’09), Raleigh, NC.

 

45.  G. Thamilarasu, S. Mishra, and R. Sridhar (2006). A cross-layer approach to detect jamming attacks in wireless ad hoc networks, Proceedings of the 2006 IEEE conference on Military communications (IEEE MILCOM 2006), IEEE Press, Piscataway, NJ, USA, 753-759.

 

46.  G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar (2005). A cross-layer based intrusion detection approach for wireless ad hoc networks, Proceedings of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference (IEEE MASS 2005), IEEE Press, Piscataway, NJ, USA, 861 -868.

 

47.  K. Ramakrishnan, A. Balasubramanian, S. Mishra, and R. Sridhar (2005). Wireless security protocol using a low cost pseudo random number generator, Proceedings of the 2005 IEEE conference on Military communications (IEEE MILCOM 2005), IEEE Press, Piscataway, NJ, USA, 1333 - 1339.

 

48.  A. Balasubramanian, S. Mishra and R. Sridhar (2005). Secure Key Management for NASA Communication, Proceedings of Fifth Integrated Communications, Navigation and Surveillance Conference and Workshop (ICNS 2005), Fairfax, VA.

 

49.  A Balasubramanian, S. Mishra and R. Sridhar (2005). Analysis of a Hybrid Key Management solution for Ad hoc Networks, Proceedings of 2005 IEEE Wireless Communication and Networking Conference (IEEE WCNC 2005), IEEE Press, Piscataway, NJ, USA, 2082 – 2087.

 

50.  V. Natarajan, A. Balasubramanian, S. Mishra and R. Sridhar (2005). Security for Energy Constrained RFID System, Proceedings of Fourth IEEE Workshop on Automatic Identification Advanced Technologies (IEEE AutoID 2005), IEEE Press, Piscataway, NJ, USA, 181 – 186.

 

51.  A. Balasubramanian, S. Mishra and R. Sridhar (2004). An Enhanced Security Solution for Wireless Networks using Tradeoff Analysis, 1st IEEE Upstate NY Workshop on Communications and Networking, Rochester, NY.

 

52.  E. Yanmaz, O. Tonguz, S. Mishra, H. Wu and C. Qiao (2002). Efficient Dynamic Load Balancing Algorithms using iCAR Systems: A Generalized Framework, Proceedings of 56th semi-annual IEEE International Vehicular Technology Conference (IEEE VTC Fall 2002), IEEE Press, Piscataway, NJ, 586 – 590.

 

53.  C. Qiao, H. Wu, S. De, E. Yanmaz, O. Tonguz and S. Mishra (2002). Deploying iCAR in Disaster Recovery, The First IEEE Workshop on Disaster Recovery Networks in conjunction with INFOCOM 2002, IEEE Press, Piscataway, NJ, USA.

 

54.  E. Yanmaz, O. Tonguz, S. Mishra, H. Wu and C. Qiao (2002). Impact of the Number of ISM-band Ad hoc Relay Channels on the Performance of iCAR Systems, Proceedings of 55th semi-annual IEEE International Vehicular Technology Conference (IEEE VTC Spring 2002), IEEE Press, Piscataway, NJ, 1492 – 1496.

 

55.  S. Mishra and O. K. Tonguz (2001). A New Metric for Analyzing Multi-step Paging Schemes in Mobile Networks, Proceedings of 51st Annual IEEE International Vehicular Technology Conference (IEEE VTC 1999), IEEE Press, Piscataway, NJ, USA. 2590-2594.

 

56.  O. K. Tonguz, S. Mishra, and D. M. Grasso (1999). Impact of Random User Motion on Locating Subscribers in Mobile Networks, Proceedings of IEEE International Conference on Communications (IEEE ICC 1999), IEEE Press, Piscataway, NJ, USA, 1746-1750.

 

57.  O. K. Tonguz, S. Mishra and R. Josyula (1999). Intelligent Paging in Wireless Networks: Random Mobility Models and Grouping Algorithms for Locating Subscribers, Proceedings of 49th Annual IEEE International Vehicular Technology Conference (IEEE VTC 1999), IEEE Press, Piscataway, NJ, 1177-1181.

 

58.  O. K. Tonguz, S. Mishra and R. Josyula (1999). Impact of Random User Motion on Locating Subscribers in Mobile Networks, Proceedings of IEEE International conference on Personal Wireless Communications (IEEE ICPWC 1999), IEEE Press, Piscataway, NJ, USA, 491 – 495.

 

59.  S. Mishra and O.K. Tonguz (1997). Most Recent Interaction Area and Speed-based Intelligent Paging in Personal Communication Systems, Proceedings of 47th Annual IEEE International Vehicular Technology Conference (IEEE VTC 1997), IEEE Press, Piscataway, NJ, USA, 505-509.

 

60.  H. Jung, S. Mishra and O.K. Tonguz (1995). Efficient Location Management in PCS, Proceedings of Sixth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE PIMRC 1995), IEEE Press, Piscataway, NJ, USA, 284 -288.

Peer-Reviewed Conference Extended Abstracts

61.  A. McNett, D.J. Dates, and S. Mishra (2015). Security and Education: Collaborative Modular Approach to Embedding Security Concepts, Innovations 2015, League for Innovation in the community college, Boston, MA.

62.  Y. Pan, S. Mishra, D. Schwartz, A. McNett, and P. McCarthy (2015). Gamified Digital Forensics Course Modules for Entry-Level Students Demonstration, the 24th Annual Conference on Instruction & Technology (CIT 2015), SUNY Geneseo, NY.

63.  B. Yuan, Y. Pan, Sumita Mishra, David Schwartz and Ryan McGlinn (2015), Birds of a Feather: Gamifying Cybersecurity Course Content for Entry Level Students, National Initiative for Cybersecurity Education (NICE 2015), San Diego, CA.

64.  E. Golen, S. Mishra, and N. Shenoy (2010). On the effects of deployment imprecision on underwater sensor connectivity. In Proceedings of the Fifth ACM International Workshop on Underwater Networks (WUWNet '10). ACM, New York, NY, USA, Article no. 17.

65.  R. Nagi, S. Mishra, W. Lawless, J. Llinas, and F. Mufalli (2007). Complexity Measures and Congestion Issues in Wireless Sensor Networks, in Institute for Operations Research and the Management Sciences Annual Meeting (INFORMS ‘07), Seattle WA.

66.  P. Elakummanan, S. Mishra, R. Sridhar and K. Thyagarajan (2004). Dynamic MEXCLP based Load Balanced Clustering Algorithm for a Wireless Ad Hoc Network, in Institute for Operations Research and the Management Sciences Annual Meeting (INFORMS 2004), Denver, CO.

67.  R. Sridharan, R. Sridhar and S. Mishra (2003). A Robust Header Compression Technique for Wireless Adhoc Networks, in Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC ‘03), Annapolis, MD.

Peer-Reviewed Conference Posters

68.  V. Natarajan, A. Balasubramanian, S. Mishra and R. Sridhar (2005). Towards Providing Security for RFID Tags with Depleting Internal Energy, in Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC ‘05), Urbana-Champaign, IL.

69.  G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar (2005). A Cross-Layer Approach to Detecting DoS Attacks in Wireless Ad-Hoc Networks, in Sixth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC ‘05), Urbana-Champaign, IL.

70.  G. Thamilarasu, S. Mishra and R. Sridhar (2004). Cross-Layer Approach to low energy Wireless Ad Hoc Networks, IST RTG-012 Workshop on ‘Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management’, Naval Research Laboratory, Washington, DC.

71.  G. Thamilarasu, S. Mishra and R. Sridhar (2004). Analysis of Cross-layer design approach for energy Conservation in Wireless Ad hoc Networks, in 1st IEEE Upstate NY Workshop on Communications and Networking, Rochester, NY.

72.  P. Elakummanan, S. Mishra and R. Sridhar (2004). A Novel Load Balanced Clustering Algorithm for a Wireless Ad Hoc Network with UAVs, in 1st IEEE Upstate NY Workshop on Communications and Networking, Rochester, NY.

Special Reports

73.  S. Mishra et. al (2015). Innovative Approaches to Computing Education, Computing Research Association Report, June 2015.

 

Press Coverage/Technical Reports/Guest Lectures

 

74.  B. Aloraini, D. Johnson, B. Stackpole and, S. Mishra (2015). A New Covert Channel over Cellular Voice Channel in Smartphones, arXiv preprint arXiv:1504.05647 (This article generated press coverage around the world. Some of them are documented at http://www.bushra-aloraini.net/#!research/c46c

75.  S. Alshehri, S. Mishra, R. Raj (2013). Insider threat mitigation and access control in healthcare systems, Technical Report, Rochester Institute of Technology.

76.  S. Mishra (2012). iDAWG: Intelligent Deployable Augmented Wireless Gateway and Disaster Response, The 2012 Joint Workshop on Disaster Response presented by the Information Products Laboratory for Emergency Response & Center for Geo-hazards Studies, May 30 –June 1, 2012.

77.  S. Mishra (2011). Data Networking in Smart Grid Systems, RIT Energy Networking Working Group Meeting and Poster Session, April 22nd 2011.

78.  S. Mishra (2011). Role of Wireless Technologies in the Smart Grid, 8th WIGIT Meeting at Virginia Tech, March 13th 2011.

79.  P. Newcomb, S. Mishra et al (2011). Novel Methods of Monitoring Labor in Electrohysterography, RIT & RGHS Alliance Research Reception and Poster Session, March 14th 2011.

80.  S. Hari, S. Mishra, and S. Mason (2011). Performance Evaluation of Multicast Routing on IPv4 and IPv6 Networks, in New York Celebration of Women in Computing (NYC-WIC 2011), Albany, NY.

81.  S. Mishra (2010). Sensor Networks – Introduction, School of Information Sciences, Syracuse University, October 20th 2010 (Guest Lecture).

82.  T. Oh, Y. Pan, and S. Mishra (2009). Network Management Architecture for Energy Efficient Mobile Ad-Hoc Networks, Proceedings of US-Korea Conference on Science, Technology, and Entrepreneurship (UKC ’09), Raleigh, NC.

83.  F. Mufalli, R. Nagi, J. Llinas, S. Mishra, W. Lawless (2008). Investigation of Means of Mitigating Congestion in Complex, Distributed Network Systems by Optimization Means and Information Theoretic Procedures, AFRL-RH-WP-TR-2008-0059, AFRL Technical Report.

84.  B. Montgomery and S. Mishra (2008). Security Solution for cluster based wireless sensor networks, in RIT Annual Undergraduate Research and Innovation Symposium, Rochester, NY.

85.  G. Thamilarasu, S. Mishra and R. Sridhar (2004). Cross-Layer Approach to low energy Wireless Ad Hoc Networks, IST RTG-012 Workshop on ‘Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management’, Naval Research Laboratory, Washington, DC.

86.  A. Balasubramanian, S. Mishra and R. Sridhar (2004). A Hybrid Approach to Key Management for Enhanced Security in Ad hoc Networks, Technical Report 2004-09, University at Buffalo.