|
|
|
PUBLICATIONS
Journal Papers
1. C. Romanowski, R. Raj, J.
Schneider, S. Mishra, V. Shivshankar, S. Ayengar, F.Cueva
(2015). Regional response to large-scale emergency events: Building on
historical data, Intl. Journal of
Critical Infrastructure Protection (Elsevier), 11, 12-21.
2. H. Tuncer, S. Mishra and N.
Shenoy (2012). A Survey of Identity and Handoff Management Approaches for
the Future Internet, Computer
Communications (Elsevier), 36(1), 63-79.
3. S. Mishra, M. Venkatesh and
B. Attaie (2011). Developing a neighborhood-scale wireless notification
prototype, International Journal on
Computing (GSTF), 1(2), 216-221.
4. G. Thamilarasu, S. Mishra
and R. Sridhar (2011). Improving Reliability of Jamming Attack Detection in
Ad hoc Networks, International
Journal of Communication Networks and Information Security, 3(1),
57-66.
5. E. Golen,
S. Mishra and N. Shenoy (2010). An Underwater Sensor Allocation Scheme for
a Range Dependent Environment, Computer
Networks (Elsevier), 54(3), 404-415.
6. R. Sridharan, R. Sridhar and
S. Mishra (2003). A Robust Header Compression Technique for Wireless Ad hoc
Networks, ACM SIGMOBILE Mobile Computing and Communications Review, 7(3),
23-24.
7. O.K. Tonguz, S. Mishra, and
H. Jung (1998). A Simple Analytical Framework for Location Management in
Personal Communication Systems, IEEE Transactions on Vehicular
Technology, 47(2), 428-439.
8. S. Mishra and O.K. Tonguz
(1998). Analysis of Intelligent Paging in Personal Communication Systems, IET
Electronic Letters, 34(1), 12-13.
Book/ Book Chapters
9. T. Oh, S. Mishra and C.
Hochgraf (2013). Smart Grid Security in the Last Mile, Security and Privacy in Smart Grids (Yang Xiao, Editor) CRC
Press, 271-290.
10. S. Mishra (2011). Wireless Sensor Networks: Emerging
Applications and Security Solutions, Network Security,
Administration and Management: Advancing Technologies and Practices (D. Kar & M. Syed, Editors) IGI
Global Publishers, 217-236.
11.
Y. Pan, B. Yuan and S. Mishra (2011). Network Security Auditing, Network Security, Administration
and Management: Advancing Technologies and Practices (D. Kar & M.
Syed, Editors) IGI Global Publishers, 131-157.
12. S. Mishra and N. Shenoy
(2009), Multihop, Multipath and Load Balanced
Routing in Wireless Mesh Networks, Encyclopedia on Ad hoc and Ubiquitous
Computing (D. Agrawal & B. Xie, Editors),
World Scientific, 565-586.
13. N. Shenoy and S. Mishra
(2008), Vertical Handoff and Mobility Management for Seamless Integration
of Heterogeneous Wireless Access Technologies, Heterogeneous Wireless
Access Networks: Architectures and Protocols (E. Hossain, Editor), Springer, 181-213.
14. S. Mishra and O. K. Tonguz
(1999). Paging Communication for Locating Mobile Users, Wiley Encyclopedia of Electrical
and Electronics Engineering, John Wiley & Sons, vol. 15, 572-579.
Peer-Reviewed
Conference Papers
15. S. Engen, D. Mir, S. Mishra, L.
Pollock, and P. Ruvolo (2017). Partnered Teaching of Interdisciplinary CS+X
Courses: Models and Experiences, ACM
Consortium for Computing Sciences in Colleges — Northeastern Region (ACM
CCSCNE 2017), 6 pages, accepted for publication.
16. Y. Pan, S. Mishra and D. Schwartz
(2017). Gamifying Course Modules for Entry Level Students, ACM Special Interest Group in Computer
Science Education (ACM SIGCSE 2017), 6 pages, accepted for publication.
17. S. Afrin and S. Mishra (2016). An
Anonymized Authentication Framework for Smart Metering Data Privacy, IEEE Conference on Innovative Smart Grid
Technologies (IEEE ISGT2016), Minneapolis, MN, 1-5.
18. B. Lipton and S. Mishra (2016). Formalizing Anonymity-Delay
Tradeoffs in Smart Grid Networks, 4th
IEEE International Conference on Smart Energy Grid Engineering (IEEE SEGE
2016), Oshawa, ON, 353-357.
19. S. Alshehri, S. Mishra and R.K. Raj
(2016). Using Access Control to Mitigate Insider Threats to Healthcare
Systems, IEEE International
Conference on Healthcare Informatics (IEEE ICHI 2016), Chicago, IL,
55-60.
20. S. Mishra, T. Howles, R.K. Raj, C. Romanowski, J. Schneider,
A. McNett and D.J. Dates (2016). A modular approach to teaching critical infrastructure
protection concepts to engineering, technology and computing students, IEEE Frontiers in Education
Conference (IEEE FIE 2016), Erie, PA, 1-7.
21. Y. Pan, R. McGlinn, S. Mishra, and D. Schwartz (2016).
Gamifying Cybersecurity Modules for Entry Level Students, 20th
Colloquium for Information Systems Security Education (CISSE 2016), Philadelphia,
PA, 10 pages.
22. C. Romanowski, J. Schneider, S. Mishra, R.K. Raj, R. Rosario,
K. Stein, and B. Solanki (2016). Response and Recovery: A quantitative approach
to emergency management, IEEE International Conference on Technologies
for Homeland Security (IEEE HST 2016), Waltham, MA, 6 pages.
23. J. Schneider, C. Romanowski, R. K. Raj, S. Mishra, J. Aleckna,
and Kaiyue Wang (2016). Mapping a community resilience management system:
building operational knowledge, IEEE International Conference on
Technologies for Homeland Security (IEEE HST 2016), Waltham, MA, 6
pages.
24. C. Romanowski, R.K. Raj, J. Schneider, S. Mishra, B. Brooks,
J. Pardee, B. Bhole, and N. Robalino (2016). The Community as Responder: A
Multidisciplinary Predictive Model for Managing Critical Infrastructure
Disruptions, Tenth Annual IFIP WG
11.10 International Conference on Critical Infrastructure Protection,
Arlington, VA, 203-218.
25. S. Mishra, R. K. Raj, C. J. Romanowski, J. Schneider and A.
Critelli (2015). On building cybersecurity expertise in critical
infrastructure protection, IEEE Conference on Technologies for
Homeland Security (IEEE HST 2015), Waltham, MA, pp. 1-6
(DOI:10.1109/THS.2015.7225263).
26. J. Schneider, C. J. Romanowski, R.
K. Raj, S. Mishra and K. Stein (2015). Measurement of locality specific
resilience: an operational model, IEEE
Conference on Technologies for Homeland Security (IEEE HST 2015),
Waltham, MA, pp. 1-6 (DOI: 10.1109/THS.2015.7225332).
27. Y. Pan, D. Schwartz, and S. Mishra
(2015). Gamified Digital Forensics Course Modules for Undergraduates, 5th IEEE Integrated STEM
Education Conference (IEEE ISEC 2015), Princeton, NJ, 100-105.
28. C. Romanowski, R. Raj, J. Schneider, S. Mishra, V. Shivshankar, S. Ayengar, F.Cueva (2015). Regional
response to large-scale emergency events: Building on historical data, Ninth Annual IFIP WG 11.10 International
Conference on Critical Infrastructure Protection, Arlington, VA (paper
presented at the conference, invited article for Elsevier Journal of
Critical Infrastructure Protection).
29. W. Huba,
B. Yuan, Y. Pan, and S.Mishra
(2013). Towards A Web Tracking Profiling Algorithm, IEEE Conference on Technologies for Homeland Security (IEEE HST
2013), Boston, MA, 12-17.
30. C. Romanowski, S. Mishra, R. Raj, T.
Howles, and J. Schneider (2013). Information management and decision
support in critical infrastructure emergencies at the local level, IEEE Conference on Technologies for
Homeland Security (IEEE HST 2013), Boston, MA, 113-118.
31. S. Mishra, C. Romanowski, R. Raj, T.
Howles, and J. Schneider (2013). A Curricular Framework for Critical
Infrastructure Protection Education for Engineering, Technology and
Computing Majors, IEEE Frontiers in Education Conference (IEEE
FIE 2013), Oklahoma City, OK, 1779-1781.
32. Y. Pan and S. Mishra (2013). Advanced
Forensics Labs to meet Computer Forensics challenges due to Technological
Advancements, Proceedings of the 17th
Colloquium for Information Systems Security Education (CISSE 2013),
Mobile, AL, 21-30.
33. H. Tuncer, N. Shenoy, A. Kwasinski, J. Hamilton, and S. Mishra (2012). A Novel User-centric Handoff Cost
Framework Applied to the Virtual Mobility Domains and IPv6-based Mobility
Protocols, IEEE Global Communications
Conference (IEEE GLOBECOM 2012), Anaheim, CA, 2578 – 2584.
34. Y. Pan, S. Mishra, B. Yuan, B.
Stackpole and D. Schwartz (2012). Game-based Forensics Course for First
Year Students, Proceedings of 13th
Annual ACM Special Interest Group for Information Technology Education (ACM
SIGITE 2012), Calgary, Canada, 13-18.
35. N. Winemiller,
B. Hartpence, D. Johnson and S. Mishra (2012).
NAT Denial of Service: An Analysis of Translation Table Behavior on
Multiple Platforms, Proceedings of
International Conference on Security and Management (SAM
2012), Las Vegas, NV.
36. J. Treglia, L. W. McKnight, M.
Venkatesh, T. Bose, J. Van Aardt, Jan, D. Mckeown, S. Mishra, and M. Lee
(2011). Social Emergency Response Technology Policy: Wireless Grid Edgeware
for Collaboration in Infrastructureless Wireless Networks, Intelligent
Distributed Augmented Wireless Gateways (IDAWG), Neighborhood Notification
and Advanced Situational Awareness Systems (ASAS), 40th Research Conference on Communication, Information and Internet
Policy, Arlington, VA, September 2011.
37. R.K. Raj, S. Mishra, C. Romanowski and T. Howles (2011). Cybersecurity as General Education, Proceedings of the 15th
Colloquium for Information Systems Security Education (CISSE 2011), Fairborn,
Ohio, 10-15.
38. O. Polatcan,
S. Mishra, and Y. Pan (2011). E-mail Behavior Profiling based on Attachment
Type and Language, Proceedings of
6th Annual Symposium on
Information Assurance (ASIA 2011), Albany, NY, 6 -10.
39. T. Howles, C. Romanowski, S. Mishra,
and R.K. Raj (2011). A Holistic, Modular Approach to Infuse Cybersecurity
into Undergraduate Computing Degree Programs, Proceedings of 6th Annual Symposium on Information Assurance (ASIA 2011), Albany,
NY, 67 -70.
40. D. Pearson, S. Mishra, and Y. Pan (2011). Dynamic
Threat-resistant Node Identification in Sensor Networks, Proceedings of International Conference
on Security and Management (SAM
2011), Las Vegas, NV.
41. D. Pearson, S. Mishra and Y. Pan (2010). Security Attacks and
Defenses in Sensor networks, Proceedings
of International Conference on Security and Management (SAM 2010), Las
Vegas, NV.
42. T. Oh, S. Mishra and Y. Pan (2009).
Teaching High-Assurance Internet Protocol Encryption
(HAIPE) using OPNET Modeler Simulation Tool, Proceedings of the 10th ACM conference on SIG-information
technology education (ACM SIGITE 2009), ACM, New York, NY, USA,
161-165.
43. S. Mishra, Y. Pan and T. Oh (2009).
Undergraduate Research in Wireless Sensor Security Course, Proceedings
of the 13th Colloquium for Information Systems Security
Education (CISSE 2009), Seattle, Washington, 139 – 144.
44. T. Oh, Y. Pan, and S. Mishra
(2009). Network Management Architecture for Energy Efficient Mobile Ad-Hoc
Networks, Proceedings of US-Korea Conference on Science, Technology, and
Entrepreneurship (UKC ’09), Raleigh, NC.
45. G. Thamilarasu, S. Mishra, and R. Sridhar (2006). A
cross-layer approach to detect jamming attacks in wireless ad hoc
networks, Proceedings of the 2006 IEEE conference on Military
communications (IEEE MILCOM
2006), IEEE Press, Piscataway, NJ, USA, 753-759.
46. G. Thamilarasu, A. Balasubramanian, S. Mishra and R. Sridhar
(2005). A cross-layer based intrusion detection approach for wireless ad
hoc networks, Proceedings of IEEE International Conference on Mobile
Adhoc and Sensor Systems Conference (IEEE MASS 2005), IEEE
Press, Piscataway, NJ, USA, 861 -868.
47. K. Ramakrishnan, A. Balasubramanian, S. Mishra, and R. Sridhar
(2005). Wireless security protocol using a low cost
pseudo random number generator, Proceedings of the 2005 IEEE conference
on Military communications (IEEE
MILCOM 2005), IEEE Press, Piscataway, NJ, USA, 1333 - 1339.
48. A. Balasubramanian, S. Mishra and R. Sridhar (2005). Secure
Key Management for NASA Communication, Proceedings
of Fifth Integrated Communications, Navigation and Surveillance
Conference and Workshop (ICNS 2005),
Fairfax, VA.
49. A Balasubramanian, S. Mishra and R. Sridhar (2005). Analysis
of a Hybrid Key Management solution for Ad hoc Networks, Proceedings of 2005 IEEE Wireless
Communication and Networking Conference (IEEE WCNC 2005), IEEE Press, Piscataway, NJ,
USA, 2082 – 2087.
50. V. Natarajan, A. Balasubramanian, S. Mishra and R. Sridhar
(2005). Security for Energy Constrained RFID System, Proceedings of Fourth
IEEE Workshop on Automatic Identification Advanced Technologies (IEEE
AutoID 2005), IEEE Press, Piscataway, NJ, USA, 181 – 186.
51. A. Balasubramanian, S. Mishra and R. Sridhar (2004). An
Enhanced Security Solution for Wireless Networks using Tradeoff Analysis, 1st
IEEE Upstate NY Workshop on Communications and Networking, Rochester,
NY.
52. E. Yanmaz, O. Tonguz, S. Mishra, H. Wu and C. Qiao (2002).
Efficient Dynamic Load Balancing Algorithms using iCAR Systems: A
Generalized Framework, Proceedings of
56th semi-annual IEEE International
Vehicular Technology Conference (IEEE VTC Fall 2002), IEEE Press,
Piscataway, NJ, 586 – 590.
53. C. Qiao, H. Wu, S. De, E. Yanmaz, O. Tonguz and S. Mishra
(2002). Deploying iCAR in Disaster Recovery, The First IEEE Workshop on
Disaster Recovery Networks in conjunction with INFOCOM 2002, IEEE
Press, Piscataway, NJ, USA.
54. E. Yanmaz, O. Tonguz, S. Mishra, H. Wu and C. Qiao (2002).
Impact of the Number of ISM-band Ad hoc Relay Channels on the Performance
of iCAR Systems, Proceedings of 55th semi-annual IEEE International
Vehicular Technology Conference (IEEE VTC Spring 2002), IEEE Press,
Piscataway, NJ, 1492 – 1496.
55. S. Mishra and O. K. Tonguz (2001). A New Metric for Analyzing
Multi-step Paging Schemes in Mobile Networks, Proceedings of 51st Annual IEEE International Vehicular Technology Conference
(IEEE VTC 1999), IEEE Press, Piscataway, NJ, USA. 2590-2594.
56. O. K. Tonguz, S. Mishra, and D. M. Grasso (1999). Impact of
Random User Motion on Locating Subscribers in Mobile Networks, Proceedings of IEEE International Conference on Communications (IEEE ICC 1999), IEEE
Press, Piscataway, NJ, USA, 1746-1750.
57. O. K. Tonguz, S. Mishra and R. Josyula (1999). Intelligent
Paging in Wireless Networks: Random Mobility Models and Grouping Algorithms
for Locating Subscribers, Proceedings
of 49th Annual IEEE International
Vehicular Technology Conference (IEEE VTC 1999), IEEE Press,
Piscataway, NJ, 1177-1181.
58. O. K. Tonguz, S. Mishra and R. Josyula (1999). Impact of
Random User Motion on Locating Subscribers in Mobile Networks, Proceedings of IEEE International
conference on Personal Wireless Communications (IEEE ICPWC 1999), IEEE
Press, Piscataway, NJ, USA, 491 – 495.
59. S. Mishra and O.K. Tonguz (1997). Most Recent Interaction Area
and Speed-based Intelligent Paging in Personal Communication Systems, Proceedings of 47th Annual IEEE International Vehicular Technology Conference
(IEEE VTC 1997), IEEE Press, Piscataway, NJ, USA, 505-509.
60. H. Jung, S. Mishra and O.K. Tonguz (1995). Efficient Location
Management in PCS, Proceedings of
Sixth IEEE International Symposium on Personal, Indoor and Mobile Radio
Communications (IEEE PIMRC 1995), IEEE Press, Piscataway, NJ, USA, 284
-288.
Peer-Reviewed
Conference Extended Abstracts
61. A.
McNett, D.J. Dates, and S. Mishra (2015). Security and Education:
Collaborative Modular Approach to Embedding Security Concepts, Innovations 2015, League for Innovation
in the community college, Boston, MA.
62.
Y. Pan, S. Mishra, D. Schwartz, A. McNett, and P. McCarthy
(2015). Gamified Digital Forensics Course Modules for Entry-Level Students Demonstration,
the 24th Annual Conference on Instruction & Technology (CIT 2015), SUNY Geneseo, NY.
63.
B. Yuan, Y. Pan, Sumita Mishra, David Schwartz and Ryan McGlinn
(2015), Birds of a Feather: Gamifying Cybersecurity Course Content for
Entry Level Students, National
Initiative for Cybersecurity Education (NICE 2015), San Diego, CA.
64.
E. Golen, S. Mishra, and N. Shenoy
(2010). On the effects of deployment imprecision on underwater sensor
connectivity. In Proceedings of the Fifth ACM International
Workshop on Underwater Networks (WUWNet
'10). ACM, New York, NY, USA, Article no. 17.
65.
R. Nagi, S. Mishra, W. Lawless, J. Llinas, and F. Mufalli (2007). Complexity Measures and
Congestion Issues in Wireless Sensor Networks, in Institute for Operations Research and the Management Sciences Annual Meeting (INFORMS ‘07), Seattle WA.
66.
P. Elakummanan, S. Mishra, R. Sridhar and K. Thyagarajan (2004).
Dynamic MEXCLP based Load Balanced Clustering Algorithm for a Wireless Ad
Hoc Network, in Institute for
Operations Research and the Management Sciences Annual Meeting (INFORMS 2004), Denver, CO.
67. R. Sridharan, R. Sridhar and
S. Mishra (2003). A Robust Header Compression Technique for Wireless Adhoc
Networks, in Fourth ACM International Symposium on Mobile Ad Hoc
Networking and Computing (MOBIHOC
‘03), Annapolis, MD.
Peer-Reviewed Conference Posters
68.
V. Natarajan, A.
Balasubramanian, S. Mishra and R. Sridhar (2005). Towards Providing
Security for RFID Tags with Depleting Internal Energy, in Sixth ACM International
Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC ‘05),
Urbana-Champaign, IL.
69.
G. Thamilarasu, A.
Balasubramanian, S. Mishra and R. Sridhar (2005). A Cross-Layer Approach to
Detecting DoS Attacks in Wireless Ad-Hoc
Networks, in Sixth ACM International Symposium on Mobile Ad Hoc
Networking and Computing (MOBIHOC ‘05), Urbana-Champaign, IL.
70.
G. Thamilarasu, S.
Mishra and R. Sridhar (2004). Cross-Layer Approach to low energy Wireless
Ad Hoc Networks, IST RTG-012 Workshop on ‘Cross-Layer Issues in the
Design of Tactical Mobile Ad Hoc Wireless Networks: Integration of
Communication and Networking Functions to Support Optimal Information
Management’, Naval Research Laboratory, Washington, DC.
71.
G. Thamilarasu, S.
Mishra and R. Sridhar (2004). Analysis of Cross-layer design approach for
energy Conservation in Wireless Ad hoc Networks, in 1st IEEE Upstate NY
Workshop on Communications and Networking, Rochester, NY.
72.
P. Elakummanan, S.
Mishra and R. Sridhar (2004). A Novel Load Balanced Clustering Algorithm
for a Wireless Ad Hoc Network with UAVs, in 1st IEEE Upstate NY Workshop
on Communications and Networking, Rochester, NY.
Special
Reports
73. S.
Mishra et. al (2015). Innovative Approaches to Computing Education, Computing Research Association Report, June
2015.
Press Coverage/Technical
Reports/Guest Lectures
74. B.
Aloraini, D. Johnson, B. Stackpole and, S. Mishra (2015). A New Covert
Channel over Cellular Voice Channel in Smartphones, arXiv preprint arXiv:1504.05647 (This article generated press coverage around the world. Some of
them are documented at http://www.bushra-aloraini.net/#!research/c46c
75.
S. Alshehri, S. Mishra, R. Raj (2013). Insider threat mitigation
and access control in healthcare systems, Technical Report, Rochester
Institute of Technology.
76.
S. Mishra (2012). iDAWG: Intelligent Deployable Augmented
Wireless Gateway and Disaster Response, The 2012
Joint Workshop on Disaster Response presented by the Information Products Laboratory
for Emergency Response & Center for Geo-hazards Studies, May 30 –June
1, 2012.
77.
S. Mishra (2011). Data Networking in Smart Grid Systems, RIT
Energy Networking Working Group Meeting and Poster Session, April 22nd
2011.
78.
S. Mishra (2011). Role of Wireless Technologies in the Smart
Grid, 8th WIGIT Meeting at Virginia Tech, March 13th 2011.
79.
P. Newcomb, S. Mishra et al (2011). Novel Methods of Monitoring
Labor in Electrohysterography, RIT & RGHS Alliance Research Reception
and Poster Session, March 14th 2011.
80.
S. Hari, S. Mishra, and S. Mason (2011). Performance Evaluation
of Multicast Routing on IPv4 and IPv6 Networks, in New York Celebration of
Women in Computing (NYC-WIC 2011), Albany, NY.
81.
S. Mishra (2010). Sensor Networks – Introduction, School of Information
Sciences, Syracuse University, October 20th 2010 (Guest Lecture).
82.
T. Oh, Y. Pan, and S. Mishra (2009). Network Management
Architecture for Energy Efficient Mobile Ad-Hoc Networks, Proceedings of
US-Korea Conference on Science, Technology, and Entrepreneurship (UKC ’09),
Raleigh, NC.
83.
F. Mufalli, R. Nagi, J. Llinas, S. Mishra, W. Lawless (2008).
Investigation of Means of Mitigating Congestion in Complex, Distributed
Network Systems by Optimization Means and Information Theoretic Procedures,
AFRL-RH-WP-TR-2008-0059, AFRL Technical Report.
84.
B. Montgomery and S. Mishra (2008). Security Solution for
cluster based wireless sensor networks, in RIT Annual Undergraduate
Research and Innovation Symposium, Rochester, NY.
85.
G. Thamilarasu, S. Mishra and R. Sridhar (2004). Cross-Layer
Approach to low energy Wireless Ad Hoc Networks, IST RTG-012 Workshop on
‘Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc Wireless
Networks: Integration of Communication and Networking Functions to Support
Optimal Information Management’, Naval Research Laboratory, Washington, DC.
86.
A. Balasubramanian, S. Mishra and R. Sridhar (2004). A Hybrid
Approach to Key Management for Enhanced Security in Ad hoc Networks,
Technical Report 2004-09, University at Buffalo.
|