Center for Cyberspace Research (CCR)

Center for Cyberspace Research (CCR)
Document Libraries

Faculty Journal Publications

Last updated: 07/21/2014

Several recent CCR faculty journal publications are highlighted here for quick reference.

  Document Title Type Size
Evaluation of Security Solutions in the SCADA Environment

*Denotes Students: Larkin*, J. Lopez*, J. Butts, M. Grimaila, “Evaluation of Security Solutions in the SCADA Environment,” Journal of the Data Base for Advances in Information Systems, Feb 2014.

PDF File 962 KB
Strengthening DOD Cyber Security with the Vulnerability Market

*Denotes Students: *Panton, B.C., Colombi, J.M., Grimaila, M.R., and Mills, R.F. “Strengthening DoD Cyber Security with the Vulnerability Market”, submitted to Defense Acquisition Review Journal, to appear Jan 2014.

PDF File 430 KB
Enhancing the Security of Aircraft Surveillance in the Next Generation Air Traffic Control System

*Denotes Students: *Finke, C., Butts, J., Mills, R., and Grimaila, M. “Enhancing the security of aircraft surveillance in the next generation air traffic control system”, International Journal of Critical Infrastructure Protection, available online 20 Feb 2013, pp, 1-20,

PDF File 943 KB
Firmware Modification Attacks on Programmable Logic Controllers

*Denotes Students: Basnight*, J. Butts, J. Lopez, T. Dube, “Firmware modification attacks on programmable logic controllers,” Int’l. Journal of Critical Infrastructure Protection (2013)http://dx.doi.org/10.1016/j.ijcip.2013.04.004

PDF File 837 KB
Exploiting Automatic Dependent Surveillance-Broadcast via False Target Injection

*Denotes Students: *Magazu, D., Mills, R.F., Butts, J.W., and Robinson, D.J., “Exploiting Automatic Dependent Surveillance-Broadcast via False Target Injection”, Journal of Aviation and Aerospace Perspectives, Vol. 2(2), pp. 5-19, Fall 2012.

PDF File 761 KB
Developing Cyber Warriors From Computer Engineers et al.

B. E. Mullins, "Developing Cyber Warriors from Computer Engineers et al.," American Society for Engineering Education (ASEE) Computers in Education Journal, Vol. 3, No. 4, Oct-Dec 2012, pp. 26-35.

PDF File 89.7 KB
Malware Target Recognition of Unknown Threats

T.Dube, R. Raines, M. Grimaila, K. Bauer and S. Rogers, "Malware Target Recognition of Unknown Threats," IEEE Systems Journal, Vol. PP, NO. 99, 2012,

PDF File 292 KB
Malware Target Recognition via Static Heuristics

T. Dube, R. Raines, G. Peterson, K. Bauer, M. Grimaila and S. Rogers, "Malware Target Recognition via Static Heuristics," Journal of Computers and Security, Vol. 31, No. 1, February 2012, pp. 137-147.

PDF File 300 KB
RIPsec - Using Reputation-Based Multilayer Security to Protect MANETs

T. H. Lacey, R. F. Mills, B. E. Mullins, R. A. Raines, M. E. Oxley, and S. K. Rogers, “RIPsec – Using Reputation-Based Multilayer Security to Protect MANETs,” Computers & Security, Vol 31, No. 1, February 2012, pp. 122-136.

PDF File 702 KB
Center Home
Faculty & Staff Directory
CCR Brochures
CCR Videos