Security Research at St. Cloud State University

Faculty, staff, and students at St. Cloud State University are active in the field of security research. Students may present their research at the annual Student Research Colloquium on campus. Faculty and staff contribute to the field through their publications.

Journal Publications (Forthcoming / Published)

Journal Publications (Forthcoming / Published)

  • Zhang, R. Jim Q. Chen, Jaejung Lee, “Mobile Commerce and Consumer Privacy Concerns,” Journal of Computer Information Systems, Volume 53, Number 4, 2013.
  • Crosby, G., Ghosh, T., Murimi, R., Chin, C., Wireless Body Area Network for Healthcare: A Survey. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), vol. 3(3), June 2012.
  • Pope, Michael Brian, Merrill Warkentin, Ernst Bekkering, and Mark B. Schmidt.  “Digital Steganography: An Introduction to Techniques and Tools,” Communications of the AIS. Volume 30, Issue 1, Article 22, June 2012, pp. 347-366.
  • Dennis C. Guster, Olivia F. Lee, Dustin C. Rogers (2011). Pitfalls of Devising a Security Policy in Virtualized Hosts. Journal of Information Security Research. 2(2), 75-83.
  • Schmidt, Mark B. and Michael J. Condon. “Computer Forensics: Examining the Effectiveness of File Deletion.” Journal of Information Systems Security. Volume 7, Issue 3, 2011.
  • Hemminger, Corey, Dustin C. Rogers and Dennis Guster (2010). “Planning and Managing the Data Center to Green Computing,” International Journal of Business Research, 10(4), 105-113.
  • Lee, Olivia F., Dennis C. Guster (2010), “Virtualized Disaster Recovery Model for Large Scale Hospital and Healthcare Systems,” International Journal of Healthcare Information Systems and Informatics, 5(3), 69-81. DOI: 10.4018/jhisi.2010070105.
  • Kirmani, E. and Hood, C. “Analysis of a Scanning Model of Worm Propagation,” Journal in Computer Virology, Volume 5, Number 1, February 2009.
  • Lee, O. F., Guster, D. C., Schmidt, M. B., & McCann, B. (2009). Applying the Scale-Free Distribution Algorithm to Assess Communication Complexity and Failure Points in Disaster Recovery Models. Journal of Information Technology Management, 20(2), 35-46.
  • Guster, Dennis C.; Mark B. Schmidt; Charles Hall; and Chris Brown. "Evaluating Performance and Scalability Issues in Distributed Data Mining: A Fist Level Analysis" International Journal of Business, Marketing, and Decision Sciences. Volume 2, Issue 1, 2009.
  • Ma, Qingxiong; Mark B. Schmidt; J. Michael Pearson. “An Integrated Framework for Information Security Management.” Review of Business. Volume 30, Issue 1, 2009, pp. 58-69.
  • Guster, Dennis C.; Mark B. Schmidt; Charles Hall; and Chris Brown. “Evaluating Performance and Scalability Issues in Distributed Data Mining: A First Level Analysis” International Journal of Business, Marketing, and Decision Sciences. January 2009.
  • Schmidt, Mark B.; Jim Q. Chen; Dien D. Phan; and Kirk P. Arnett. “Security Perceptions of E-Commerce Users,” Journal of Internet Commerce. Accepted for publication. Tentatively scheduled for Volume 8, Issue 1, Spring 2009.
  • Guster, Dennis C.; Mark B. Schmidt; and Erich B. Bergiel. “Distributed Clusters and the Effects of Switch Configuration and Line Speed” Business Research Yearbook. Volume 16, No. 1, 2009, pp. 139 – 144.
  • Lee, Olivia F.; Dennis C. Guster; and Mark B. Schmidt. “WAN Line Speed and its Implications for the Support of Globally Remote Replicas in a Disaster Recovery Model,” Business Research Yearbook. Volume 16, No. 1, 2009, pp. 349 – 354.
  • You, L., Guster, D. C., & Sundheim, R. A. (2008). Using the packet analysis method to teach secure communications in client/server computing. Journal of Informatics Education Research, 10(1), 1-35.
  • Chen, Jim Q.; Mark B. Schmidt; Dien D. Phan; and Kirk P. Arnett. “E-Commerce Security Threats: Awareness, Trust, and Practice.” International Journal of Information Systems and Change Management. Volume 3, No. 1, 2008, pp. 16 – 32.
  • Schmidt, Mark B.; Allen C. Johnston; Kirk P. Arnett; Jim Q. Chen, and Li Suicheng. “Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness,” Journal of Global Information Management. Volume 16, No 2, April – June, 2008, pp. 91-103.
  • Warkentin, Merrill, Ernst Bekkering, and Mark B. Schmidt. "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law, Vol. 3, No. 2 2008 pp. 17-34.
  • Weber, James E; Dennis Guster; Paul Safonov; and Mark B. Schmidt. “Weak Password Security: An Empirical Study.” Information Systems Security: A Global Perspective. Volume 17, Issue 1, January 2008.
  • Olagunju, A. O. (2009). Harmonizing the Interests of Free Speech, Obscenity, and Child Pornography in Cyberspace: The New Roles of Parents, Technology, and Legislation for Internet Safety. Scientific World Journal, 9, 1260-1272.
  • Herath, S. Herath, A., Kachur, R. (2008). An Interdisciplinary Accounting Forensics Course to Improve Computer Science Enrollments. Journal for Computing Sciences in Colleges, 74-81.
  • Herath, S., Herath, A., Goonatilake, R., Herath, J. (2008). Cryptographic Algorithms to Spatial Circuit Transformation in An Active Learning Module to Enhance the Information Assurance and Security Curriculum. Journal for Computing Sciences in Colleges 2008, 23-29.
  • Olagunju, A. O. (2008). A Computational Exploration of the Chinese Remainder Theorem. Journal of Applied Mathematics and Informatics, 26(1), 307-317.
  • Arnett, Kirk P.; Mark B. Schmidt; Allen C. Johnston; Jongki Kim; and HaJin Hwang. “Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions.” International Journal of Information Security and Privacy. Volume 1, Issue 4, October – December 2007. P. 75-86.
  • Goonatilake, R., Herath, A., Herath, S., Herath, J. (2007). Intrusion Detection using the Chi-square Goodness-of-fit Test for Information Assurance, Network, Forensics and Software security. The Journal of Computing Sciences in Colleges, 23(1), 255-263.
  • Herath, A., Herath, S., Goonatilake, R., Herath, J. (2007). Designing Computer Forensics Courses using Case Studies to Enhance Computer Security Curricula. The Journal of Computing Sciences in Colleges, 23(1), 264-272.
  • Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “US and Korean Perspectives on Malware: A Closer Look.” Business Research Yearbook. Volume 14, 2007, pp. 506-512.
  • Johnston, Allen C.; Mark B. Schmidt; Kirk P. Arnett; and Jeff Thomas. “Getting to the Root of the Problem.” Journal of Internet Commerce. Volume 6, Issue 1, Spring 2007 pp 1-12.
  • Schmidt, M. B., Johnston, A. C., & Arnett, K. P. (2007). US and Korean Perspectives on Malware: A Closer Look. Business Research Yearbook, 14.
  • Johnston, A. C., Schmidt, M. B., Arnett, K. P., & Thomas, J. (2007). Getting to the Root of the Problem. Journal of Internet Commerce, 6 (1).
  • Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “An Empirical Investigation of Rootkit Awareness.” Business Research Yearbook. Volume 13, 2006, pp. 153-158.
  • Schmidt, Mark B.; Mark D. Nordby; and Dennis C. Guster. “Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch.” Business Research Yearbook. Volume 13, 2006, pp. 147-152.
  • Guster, D., Safonov, P., Sundheim, R., & Sultanov, R. (2006). Determining the Effectiveness of Using Linux Operating System Demonstrations to Illustrate Message Digest Concepts and Vulnerabilities. Journal of Informatics Education Research, 8(3), 81-105.
  • Safonov, P., Guster, D., Sultanov, R., & Podkorytov, D. (2006). Processor type and its relationship to performance in the application of distributed processing to determine vulnerabilities in password files. Issues in Information System, 7(2), 33-37.
  • Arnett, Kirk P. and Mark B. Schmidt. “Busting the Ghost in the Machine.” Communications of the ACM. vol. 48 no. 8. August, 2005. pp. 92-95.
  • Schmidt Mark B. and Kirk P. Arnett. “Spyware: A Little Knowledge is a Wonderful Thing.” Communications of the ACM. vol. 48 no. 8. August, 2005. pp. 67-70.
  • Maskey, S., Jansen, B., Guster, D., & Hall, C. A Basic Firewall Configuration Strategy for the protection of Development Related Computer Networks and Subnetworks. Information Systems Security, 16(5), 281-290.
  • Parnerkar, A., Herath, J., & Guster, D. C. Secret Key Distribution Protocol using Public Key Cryptography. The Journal of Computing Sciences in Colleges, 19 (1).
  • Ghosh, T., Pissinou, N., & Makki, K. (2005). Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mobile Networks and Applications, 10(6), 985–995.
  • Arnett, K. P., Schmidt, M. B., & Johnston, A. C. (2004). Wireless Networks in Small Town Mississippi. Mississippi Business Journal.
  • Chok, O.-S., Herath, J., & Herath, S. (2004). Computer Security Learning Laboratory: Implementation of DES and AES Algorithm Using Spreadsheets. International Journal of Effective Management, 1(2).
  • Ghosh, T., Makki, K., & Pissinou, N. (2004). An Overview of Security Issues for Multihop Mobile Ad Hoc Networks. International Engineering Consortium Network Security: Technology Advances, Strategies, and Change Drivers, ISBN: 0-931695-25-3.
  • Guster, D. C., & Hall, C. (2001). A Firewall Configuration Strategy for the Protection of Computer Networked Labs in a College Setting. Journal of Computing in Small Colleges (17:1), 181-187.

Return to the Top

Proceedings and Conference Presentations

  • Guster, Dennis, O'Brien, Andres and Lebentritt, Laura, Can A Decentralized Storage System Structure Such As Cassandra Provide An Effective Means Of Speeding Up Web Access Times? Proc. of Midwest Instruction and Computing Symposium, Wisconsin, USA, April 19-20, 2013.
  • Chin, C. Crosby, G., Ghosh, T., Murimi, R., Advances and Challenges of Wireless Body Area Networks for Healthcare Applications. Proc. of International Conference on Computing, Networking and Communications, Hawaii, USA, Jan 30 – Feb 2, 2012.
  • Schmidt, Mark B. and Kate Mooney. “Discovering and Investigating Corporate Fraud at the MBA level: A Team Teaching Approach.” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2012, Orlando, FL.
  • Lee, Jaejung, Chen, Jim Q., and Zhang, Ruidong, “M-commerce and Information Privacy Concerns,” Proc. of Pan-Pacific Business the 29th Annual International Conference Haikou, Hainan Island, China, May 24-26, 2012.
  • Ghosh, T., Hou, T., Experimenting with Watchdog Implementation on a Real-life Ad-Hoc Network: Monitoring Selfish Behavior. Proc. of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE ’11), December 3-12, 2011.
  • Guster, D., Lee, O. F., and Rogers, D. (2011). Virtualized hosting: Devising a security policy through log analysis. Proceedings of the 4th International Conference on the Application of Digital Information and Web Technologies.
  • Chen, Q. Jim, Ruidong Zhang, Bruce Busta, “Information Security and Compliance Management,” Proc. of Pan-Pacific Business XXVIII International Conference, Daejun, South Korea, May 2011.
  • Guster, Dennis C., Olivia F. Lee, Dustin C. Rogers and Cynthia Nitsch “Security Policy Concerns in a Virtualized Network Environment,” Submitted conference paper and under review for the Midwest Instructional Computing Symposium, Duluth, MN, April 6-9, 2011.
  • McCann, Brandon; Mark B. Schmidt; and Dennis C. Guster.“Reverse TCP Attacks: Analysis and Prevention,” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2011, Orlando, FL.
  • Guster, Dennis C., Olivia F. Lee, Cynthia Nitsch and Carl Robman (2010), “Scaling Performance of Virtualized Servers Deployed In a Health Care Setting,” 2010 41th Decision Sciences Institute (DSI) Annual Meeting in San Diego, November 20-23, 2010.
  • Guster, Dennis, Brown, Christopher, Sultanov, Renat (2010). Enhancing Key Confidentiality by Distributing Portions of the Key Across Multiple Hosts, Midwest Instructional Computing Symposium Annual Meeting in Eau Claire, WI, April 16-17, 2010.
  • Condon Michael J. and Mark B. Schmidt. "Is that File Really Gone? Computer Forensics to Recover the Unrecoverable," Proceedings of the 2010 Security Conference, April 2010, Las Vegas, NV.
  • Schmidt, Mark B. Invited Panel Session: "Current Status and Issues in Wireless/Mobile and Virtual Networks: Cell Phone Spyware and Viruses," Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2009, New Orleans, LA.
  • Schmidt, Mark B.; Dennis C. Guster; Olivia F. Lee; and Brandon McCann. “Disaster Recovery Planning, Analyzing the Dilemma: In-house vs. Outsourced with Special Consideration to the WAN Resources Required,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2009, New Orleans, LA.
  • Lee, Olivia F.; Dennis C. Guster; and Mark B. Schmidt. “A First Approach in the Assessment of the Complexity of Disaster Recovery Models for SMEs,” Proceedings of the 2009 Americas Conference on Information Systems (AMCIS). August 2009, San Francisco, CA.
  • Schmidt, Mark B.; David A. Dampier; and Dennis C. Guster. “A Multi-University Resource Allocation Approach to Provide Computer Forensics Education for Law Enforcement Agents,” Proceedings of the 2009 Security Conference, April 2009, Las Vegas, NV.
  • Jacobson-Schulte,P.; Mark B. Schmidt; and Gary Yoshimoto. “The use and Security of Data in the Higher Education Environment,” American Society of Business and Behavioral Sciences. February 2009, Las Vegas, NV.
  • Schmidt, Mark B.; James E. Weber; Dennis C. Guster, and Paul I. Safonov. “Training Users to Develop Stronger Passwords,” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2009, Orlando, FL.
  • Schmidt, Mark B. Invited Panel Session: “Current Status of Usage and Applications of Mobile Alert, WiBro, Cellular TV, and Web 2.0,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2008, Baltimore, MD.
  • Ghosh, T., Zhu, H., Modeling Trust in Wireless Ad-Hoc Networks. Novel Algorithms and Techniques in Telecommunications and Networking, by T. Sobh (Ed.). Springer, DOI: 10.1007/978-90-481-3662-9_37, pp. 217-221, 2010. (Initial results presented in the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE ’08), December 5-13, 2008).
  • Kirmani, E. and Hood, C. "A New Approach to Analysis of Interval Availability,” Proceedings of the Third International Conference on Availability, Security and Reliability ((ARES 2008), Edited by S. Jakoubi, S. Tjoa, and E.R. Weippl), pp.479-483; IEEE, Piscataway, NJ; 2008.
  • Schmidt, Mark B.; Debjani Das; Vijay Kumar; and Ernst Bekkering. “A Proposed Study and Analysis of User Perceptions of Biometric Acceptance,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2008, Baltimore, MD.
  • Guster, D. C., & Herath, S. (2008). Analysis of Vulnerabilities in a Global Authentication System in a University Based Distributed Processing Laboratory. Omaha, Nebraska: Proceedings of the 3rd International Conference on Information Warfare and Security.
  • Guster, Dennis C.; Mark B. Schmidt; Charles Hall; and Chris Brown. “A Preliminary Analysis of Web Accessible Distributed Data Mining: Performance and Scalability,” Proceedings of the International Academy of Business and Public Administration Disciplines (IABPAD) Conference. January 2008, Orlando, FL.
  • Dennis Guster, C. H., Herath, S., Jansen, B., & Mikluch, L. (2008). A Comparison of Popular Global Authentication Systems. A Comparison of Popular Global Authentication Systems” A paper presented at the Third The International Conference on Information Warfare and Security (ICIW). Omaha, NE.
  • Herath, S. (2008, August 08). Contingency Planning for Secure Information Systems. Presentation at the Information Security, Aizu Wakamatsu, Fuskushima.
  • Herath, S. (2008, August 08). Policies for Information System Security. Presentation at the Information Security, Aizu Wakamatsu, Fukushima.
  • Herath, S. (2008, June 24). Information Security and IT Risk Management. Presentation at the Risk Management, Iizuka, Fukuoka.
  • Ghosh, T., & Pratt, B. (December, 2007). Routing Table Instability in Real-world Ad-Hoc Network Testbed. Proc. International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007).
  • You, L., & Guster, D. (2007). A Secure communication protocol to support client and server computing. Southwestern Decision Sciences Conference. San Diego, CA.
  • Schmidt, M. B. (November, 2007). Invited Panel Session: “Mobile Wireless Services and Business: Present and Future,. Proceedings of the National Decision Sciences Institute (DSI) Conference. Phoenix, AZ.
  • Chen, Jim Q.; Mark B. Schmidt; Dien D. Phan; and Kirk P. Arnett. “E-commerce Security Threats, Awareness, Trust, and Security Practices: An Assessment of Perceptions,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2007, Phoenix, AZ.
  • Schmidt, Mark B.; Jim Q. Chen; Dien D. Phan; and Kirk P. Arnett. “Comparing Security Perceptions of E-Commerce Users,” Proceedings of the 2007 Americas Conference on Information Systems (AMCIS). August 2007, Keystone, CO. Nominee for Best Paper Award.
  • Schmidt, Mark B. and Kirk P. Arnett. “Synthesis and Analysis of Moore and Benbasat’s PCI and Witte’s Susceptibility and Severity of Threat Scales,” Proceedings of the 2007 Americas Conference on Information Systems (AMCIS). August 2007, Keystone, CO.
  • Schmidt, Mark B.; Allen C. Johnson; and Kirk P. Arnett. “US and Korean Perspectives on Malware: A Closer Look.” International Academy of Business Disciplines (IABD). April 2007, Orlando, FL.
  • McDermott, Sherry; Mark B. Schmidt; and Gary Yoshimoto. “NSA Electronic Surveillance Database,” American Society of Business and Behavioral Sciences. February 2007, Las Vegas, NV.
  • Schmidt, Mark B.; Dennis C. Guster; and Richard Sundheim. “An Empirical Analysis of Network Packet Traffic Protocols,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2006, San Antonio, TX.
  • Schmidt, Mark B. Invited Panel Session: “Current Status of Usage and Applications of Podcasting, Weblog, Camtasia, RFID, and Mobile TV,” “Wireless Security for RFID & Other Devices.” National Decision Sciences Institute (DSI) Conference. November 2006, San Antonio, TX.
  • Schmidt, Mark B.; Mark D. Nordby; and Dennis C. Guster. “Managing the Enterprise Network: Performance of Routing Versus Switching on a State of the Art Switch,” International Academy of Business Disciplines (IABD). April 2006, San Diego, CA.
  • Schmidt, Mark B.; Jim Q. Chen; James E. Weber. “An Analysis of Data Warehousing to Promote National Security,” Proceedings of the National Decision Sciences Institute (DSI) Conference. November 2006, San Antonio, TX.
  • Shropshire, Jordan; Merrill Warkentin; Allen C. Johnston; and Mark B. Schmidt. “Personality and IT Security: An Application of the Five-factor Model,” Proceedings of the 2006 Americas Conference on Information Systems (AMCIS). August 2006, Acapulco, Mexico.
  • Schmidt, Mark B.; Allen C. Johnston; and Kirk P. Arnett. “An Empirical Investigation of Rootkit Awareness,”International Academy of Business Disciplines (IABD). April 2006, San Diego, CA.
  • Ghosh, T.; Pissinou, N. Makki; K., Farhat, A.; “A Framework for Computing Trust in Mobile Ad Hoc Networks”, in Proc. WSPWN’06, Miami, Florida, March 15-16, 2006.
  • Herath, A., Herath, S. (2006). Case Studies for Learning Software Security Engineering. Aizu Wakamatsu, Japan: 9th International Conference on Humans and Computers Proceedings.
  • Weber, J., Guster, D., & Safonov, P. (2006). Password Security and Weak Passwords: A Developmental Perspective. Mountain Plains Management Conference. Orem, UT.
  • Guster, D., Safonov, P., & Sultanov, R. (2005). Using the Linux Operating System to Illustrate Message Digest Concepts and Vulnerabilities. Midwest Instructional Computing Symposium Conference. Eau Claire, WI.
  • Kirmani, E. and Hood, C. “Random Scanning Models of Worm Propagation with Constant and Nonhomogenous Contact Rates,” Proceedings of the Network/Computer Security Workshop, Lehigh University, August 4-5, 2005, Bethlehem, PA.
  • Guster, D., Safonov, P., Podkorytov, D., & Sultanov, R. (2005). Tightening Computer Security by Automating OS Attribute Configuration. Midwest Instructional Computing Symposium Conference. Eau Claire, WI.
  • Herath, S. (2005, November 1). Computer Forensics, Information Security and Law: A Case Study. Presentation at the 2005 Digital Forensic Engineering International Workshop.
  • Guster, D., Safonov, P., Podkorytov, D., & Hall, C. (2004). Business Computer Information Systems Security Against Hacking Attacks: Application of Distributed Processing and Software Modifiers in Defense of Password Files. Academy of Business Administration National Conference. Las Vegas, NV.
  • Kirmani, E. and Hood, C. “Diagnosing Network States Through Intelligent Probing,” Proceedings of the 2004 IEEE/IFIP Network Operations and Management Symposium (NOMS 2004), Volume 1, pp. 147-160; IEEE, Piscataway, NJ; 2004.
  • Guster, D., Safonov, P., Podkorytov, D., & Rudenko, A. (2004). Development of an Enhanced Security Strategy for Linux Hosts. Midwest Instructional Computing Symposium Conference. Morris, MN.
  • Herath, S. (2004). Application of Computer Forensics in Information Security and Law. Aizu Wakamatsu, Japan: 7th International Conference on Humans and Computers Proceedings.
  • Schmidt, Mark B; Allen C. Johnston; and Kirk P. Arnett. "Wireless Network Security in Hospitality SMEs," Proceedings of the 2004 Americas Conference on Information Systems (AMCIS). August 2004, New York, NY.
  • Ghosh, T.; Pissinou, N.; Makki, K.; “Collaborative Trust-based Secure Routing Against Colluding Malicious Nodes in Multi-hop Ad Hoc Networks”, in Proceedings of the 29th IEEE Annual Conference on Local Computer Networks (LCN), Nov 16-18, Tampa, USA, 2004.
  • Pissinou, N.; Ghosh, T.; Makki, K.; “Collaborative Trust-based Secure Routing in Multihop Ad Hoc Networks”, in Proceedings of The Third IFIP-TC6 Networking Conference (Networking '04), Athens, Greece, May 9-14, 2004.
  • Schmidt, Mark B. “Steganography: New Techniques for an Ancient Practice,” Proceedings of the 2004 Security Conference, April 2004, Las Vegas, NV.
  • Warkentin, Merrill; Mark B. Schmidt; Allen C. Johnston; and Matthew Boren. "IS Security Management Framework: A Comprehensive Life Cycle Perspective," Proceedings of the 2004 Information Resources Management Association (IRMA). May 2004, New Orleans, LA.
  • Schmidt, Mark B.; Ernst Bekkering; and Merrill Warkentin. "On the Illicit Use of Steganography and Its Detection," Proceedings of the 2004 ISOneWorld International Conference. April 2004, Las Vegas, NV.
  • Johnston, Allen C.; Mark B. Schmidt; and Ernst Bekkering. "IT Security Management Practices: Successes and Failures in Coping with Blaster and Sobig.F," Proceedings of the 2004 ISOneWorld International Conference. April 2004, Las Vegas, NV.
  • Warkentin, Merrill and Mark B. Schmidt. "Evaluating Executive Perceptions of IS Security Threats and Responses: A Post 9/11 Critique,” Proceedings of the 2003 ISOneWorld International Conference, April 2003, Las Vegas, NV.
  • Schmidt, Mark B. and Allen C. Johnston. "Biometric Controls Used to Secure Access at Mississippi State University," Proceedings of the 2003 Security Conference, April 2003, Las Vegas, NV.
  • Bekkering, Ernst and Mark B. Schmidt. "A Discussion of Biometric Security Trade-offs," Proceedings of the 2003 Security Conference, April 2003, Las Vegas, NV.
  • Guster, D., Al-Hamamah, A., & Safonov, P. (2003). Network Security Log Information: A Preliminary Analysis. Midwest Instructional Computing Symposium. Duluth, MN.
  • Herath, S., Herath, J., Herath, A. (2002, June 24). Information Security Courses based on Applications of Management Techniques in Digital Systems for B. Presentation at the Security and Management, Las Vegas, NV.
  • Guster, D., & Krivulin, N. (2001). Modeling and Performance Evaluation of Computer Systems Security Operation. 4th St. Petersburg Workshop on Simulation. St. Petersburg, Russia.

 

Return to the Top

Book Chapters

  • Guster, Dennis C. and Olivia F. Lee “Effective Infrastructure Protection Through Virtualization,” ICT Ethics and Security in the 21st Century: New Developments and Applications. IGI Global Publisher, In press.
  • Ghosh, Tirthankar and H. Xu. "Modeling Trust in Wireless Ad-Hoc Networks," in Novel Algorithms and Techniques in Telecommunications and Networking, by T. Sobh (Ed.). Springer, DOI: 10.1007/978-90-481-3662-9_37, pp. 217-221, 2010.
  • Schmidt, Mark B.; Allen C. Johnston; Kirk P. Arnett; Jim Q. Chen, and Li Suicheng. “Discovering Computer Security Awareness Among U.S. and Chinese Computer Users.” ICTs Technological Advancement in Developed and Developing Countries: Discoveries in Global Information Management” (Advances in Global Information Management series).
  • Guster, Dennis; Mark B. Schmidt; Renat Sultanov; and Charles Hall. “Analyzing bandwidth usage in a distributed processing environment.” In Selected Topics in Communication Networks and Distributed Systems, edited by Dr. Sudip Misra, Dr. Subhas C. Misra and Dr. Issac Woungang. Singapore: World Scientific. 2009.
  • Arnett, Kirk P.; Mark B. Schmidt; Allen C. Johnston; Jongki Kim; and HaJin Hwang. “Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions,” in Techniques and Applications for Advanced Information Privacy and Security: Emerging Organizational, Ethical and Human Issues, Hamid R. Nemati (Ed.), IGI Global, 2009.
  • Warkentin, Merrill; Mark B. Schmidt; and Ernst Bekkering. "Steganography," in Cyber Warfare and Cyber Terrorism, Lech J. Janczewski, and Andrew M. Colarik (Eds.), Hershey, PA: Information Science Reference, 2008, Chapter VII, pp. 50-56.
  • Warkentin, Merrill; Mark B. Schmidt, and Ernest Bekkering. “Steganography and Steganalysis,” in Intellectual Property Protection for Multimedia Information Technology, Sasaki, Hidevasu (Ed.), IGI Global, 2007, Chapter XIX, pp. 374-380. This chapter is a reprint of an earlier book chapter with the same title.
  • Hanson, Jan M. and Mark B. Schmidt. “Secure Automated Clearing House Transactions” in Encyclopedia of Information Ethics and Security, Marion Quigley (Ed.), Information Science Reference (formerly Idea Group Reference), Hershey, PA: 2007.
  • Becker, Reggie G.; Mark B. Schmidt; and Allen C. Johnston. “Mitigation of Identity Theft in the Information Age” in Encyclopedia of Information Ethics and Security, Marion Quigley (Ed.), Information Science Reference (formerly Idea Group Reference), Hershey, PA: 2007.
  • Warkentin, Merrill; Mark B. Schmidt; and Ernst Bekkering. “Steganography, and Steganalysis,” Chapter XVII, p 287-25, in Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Merrill Warkentin and Rayford B. Vaughn (Eds.), Hershey, PA: Idea Group Publishers, 2006.
  • Warkentin, Merrill; Mark B. Schmidt; and Ernst Bekkering. "Steganography," inCyber Warfare and Cyber Terrorism, Lech J. Janczewski, and Andrew M. Colarik (Eds.), Hershey, PA: Information Science Reference, 2008, Chapter VII, pp. 50-56.
  • Ghosh, T.; Pissinou, N.; Makki, K.; Farhat, A.; “A Framework for Computing Trust in Mobile Ad Hoc Networks”, Mobile and Wireless Network Security and Privacy, ed. by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0. July 2007.
  • Reiher, R.; Makki, S.K.; Pissinou, N.; Makki, K.; Burmester, M.; Van, T.L.; Ghosh, T. “Security and Privacy for Mobile and Wireless Networks”, Mobile and Wireless Network Security and Privacy, ed. by Makki, K., et al (Eds.). Springer, ISBN: 978-0-387-71057-0 July 2007.
  • Warkentin, Merrill; Mark B. Schmidt; and Ernst Bekkering. “Steganography, and Steganalysis,” Chapter XVII, p 287-25, in Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Merrill Warkentin and Rayford B. Vaughn (Eds.), Hershey, PA: Idea Group Publishers, 2006.
  • Pissinou, N.; Ghosh, T.; Makki, K.; “ Collaborative Trust-based Secure Routing in Multihop Ad Hoc Networks”, Springer Verlag, Series:Lecture Notes in Computer Science, vol 3042, pp 1446 - 1451, ISBN: 978-3-540-21959-0. April 2004.

Return to the Top

Other Publications

  • Kirmani, E. “Modeling of Fault Diagnosis, Dependability, and Performability of Computer Systems,” Technical Report TR-NSL-04-01, Department of Computer Science, Illinois Institute of Technology, Chicago, Illinois, 98 pages, 2004.
  • Schmidt, Mark B. Book Review. Byte Wars: the Impact of September 11 on Information Technology by Edward Yourdon. Journal of End User Computing, Volume 15, NO. 3, July-September 2003.
  • Kirmani, E. “Modeling Fault Management in Communication Networks,” Technical Report TR-NSL-03-01, Department of Computer Science, Illinois Institute of Technology, Chicago, Illinois, 83 pages, 2003.

Return to the Top

Untitled Document