Dr. Scott R. Graham

Dean for Research and Professor of Computer Engineering

Bio Photo

 

Contact:
Comm: 937-656-5512
DSN: 785-5512
Click to E-mail
View Department

Publications

Refereed Journal Papers

  1. ^Langehaug, T.J., Graham, S.R., “CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification”, ACM Digital Threats: Research and Practice, to Appear
  2. ^Rose, A., Graham, S.R., Schubert-Kabban, C.,  “ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments”, MDPI Cyber to Appear
  3. ^Rose, A., Graham, S.R., “IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines”, ACM Digital Threats: Research and Practice, vol. 4, issue 3, no. 4, pp. 1-23
  4. *Bada, A.S., Sweeney, P.J., Graham, S.R., Dill, R., “Taint-Assisted Fuzzing for Emulated Avionics Systems”, Journal of DoD Research and Engineering, vol. 5, no. 4, pp. 230-242, Dec 2022.
  5. *Barrett, M.M., Jacques, D.R., Engle, R.D.L., Cox, A.M., Graham, S.R., “Employing a Reference Architecture for Small Unmanned Aerial Systems Cybersecurity Assessment, vol. 5, no. 4, pp. 54-66, Dec 2022.
  6. ^Koranek, D.F., Graham, S.R., Borghetti, B.J., Henry, W.C., “Identification of Return-Oriented Programming Attacks Using RISC-V Instruction Trace Data”, in IEEE Access, vol. 10, pp. 45347-45364, 2022
  7. ^Langehaug, T.J., Graham, S.R., Schubert Kabban, C., Borghetti, B.J.,  “MADFAM: MicroArchitectural Data Framework And Methodology”, in IEEE Access, vol. 10, pp. 23511-23531, 2022
  8. ^Llewellyn, L.C., Grimaila, M.R., Hodson, D.D., Graham, S.R., “A Metric for Quantifying Nonlinearity in k-Dimensional Complex-Valued Functions”, Journal of Defense Modeling and Simulation, March 2022
  9. ^Simon, P.E., Graham, S.R., “Extending the Quality of Secure Service Model to Multi-Hop Networks”, MDPI Journal of Cybersecurity and Privacy, vol. 1, no. 4, pp. 793-803, Dec 2021.
  10. *Arnold, C.M, Nykl, S.L., Graham, S.R., Leishman, R.C., “Real-Time Structure from Motion with Planar Homography Estimation: A Real-Time Low-Bandwidth High-Resolution Variant for Aerial Reconnaissance.” Journal of Defense Modeling and Simulation, pp. 1-12, Dec 2021
  11. ^Simon, P.E., Graham, S.R., Talbot, C.M, Hayden, M.J, “Model for Quantifying the Quality of Secure Service”, MDPI Journal of Cybersecurity and Privacy, vol. 1, no. 2, pp. 289–301, May 2021.
  12. ^Langehaug, T.J., Borghetti, B.J., Graham, S.R., “Classifying Co-Resident Computer Programs Using Information Revealed by Resource Contention”, ACM Digital Threats: Research and Practice, May 2021
  13. *Tullos, J.C., Graham, S.R., Jordan, J.D., Patel, P.P., “SPARC: Statistical Performance Analysis with Relevance Conclusions”, IEEE Open Journal of the Computer Society, vol 2, pp. 117-129, Feb 2021
  14. *Pettit, D.M., Graham, S.R., Sweeney, P.J., “Searching for Stars: Analyzing and Defining UAV Cyber Risk Assessments”, International Journal on Advances in Security, vol 13, no 1&2, Jul 2020
  15. ^Hamilton, N.S., Graham, S.R., Carbino, T.J., Petrosky, J.C., Betances, J.A., “Adaptive-Hybrid Redundancy with Error Injection”, MDPI Journal of Electronics, vol 8, no 11, p. 1266, Nov 2019
  16. *Roeber J. B., Nykl, S.L., Graham, S.R., “Assessment of Structure from Motion for Reconnaissance Augmentation and Bandwidth Usage Reduction”, Journal of Defense Modeling and Simulation, vol 1, pp. 1-13, Apr 2019
  17. ^Badenhop, C.W., Graham, S.R., Mullins, B.E., Mailloux, L.O., “Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver”, ACM Transactions on Cyber-Physical Systems, vol 3, issue 2, pp. 1-24, Mar 2019
  18. *Beyer, S.M., Mullins, B.E., Graham, S.R., Bindewald, J.M., “Pattern-of-Life Modeling in Smart Homes”, IEEE Internet of Things Journal, vol 5, issue 6, pp. 5317-5325, Dec 2018
  19. *Gutierrez, J.A., Bindewald, J.M., Graham, S.R., Rice, M.J., “Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections”, International Journal of Critical Infrastructure Protection, vol 18, pp. 58-70, Sep 2017
  20. *Reber, P.E., Graham, S.R., “Evaluating System on a Chip Design Security”, Journal of Information Warfare, vol 16, issue 3, Summer 2017
  21. ^Badenhop, C.W., Graham, S.R., Ramsey, B.W., Mullins, B.E., Mailloux, L.O., “The Z-Wave Routing Protocol and its Security Implications”, Elsevier Journal of Computers & Security, vol 68, pp. 112-129, Jul 2017
  22. *Harmon, D.F., *Reynolds, M.B., Graham, S.R., Hopkinson, K.M., “Integrating Disruption Prone Links Into Reliable Networks – A TCP Friendly Approach”, IET Communications, vol 6, issue 12, pp. 1702-1709, Aug 2012
  23. ^Kleeman, M.P., *Seibert, B.A., Lamont, G.B., Hopkinson, K.M., Graham, S.R., “Solving Multicommodity Capacitated Network Design Problems using Multiobjective Evolutionary Algorithms”, IEEE Transactions on Evolutionary Computation, vol 16, Issue 4, pp. 449-471, 2012
  24. *Stuckey, N.C., Vasquez, J.R., Graham, S.R., Hopkinson, K.M., Maybeck, P.S., “Stochastic Control of Computer Networks”, IET Control Theory and Applications, vol 6, issue 3, pp. 403-411, Feb 2012
  25. ^Freris, N., ^Graham, S.R., Kumar, P.R., “Fundamental limits on synchronizing clocks over networks”, IEEE Transactions on Automatic Control, vol 56, no 2, pp. 1352-1364, Jun 2011
  26. *Llewellyn, L.C., Hopkinson, K.M., Graham, S.R., “Distributed Fault-Tolerant Quality of Wireless Networks.” IEEE Transactions on Mobile Computing, vol 10, no 2, pp. 175-190, Feb 2011
  27. *Coates, G.M., Hopkinson, K.M., Graham, S.R., Kurkowski, S.H., “A Trust System Architecture for SCADA Network Security”, IEEE Transactions on Power Delivery, vol 25, issue 1, pp. 158-169, Jan 2010
  28. ^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “A General Method of Measuring Interoperability and Describing Its Impact on Operational Effectiveness.” Journal of Defense Modeling and Simulation, Jul 2009
  29. ^Graham, S.R., ^Baliga, G.B., Kumar P.R., “Abstractions, Architecture, Mechanisms, and a Middleware for Networked Control.” IEEE Transactions on Automatic Control, vol 54, no 7, pp. 1490-1503, Jul 2009
  30. ^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “On the Application of Classification Concepts to Systems Engineering Design and Evaluation.” Journal of Systems Engineering, vol 12, no 2, 2009
  31. *Coates, G. M., Hopkinson, K.M., Graham, S.R., Kurkowski, S.H., “Collaborative, Trust-Based Security Mechanisms for a National Utility Intranet.” IEEE Transactions on Power Systems, vol 23, no 3, Aug 2008

Refereed Conference Papers

  1. *Culbreth, S.P., Graham, S.R., “Demonstrating Redundancy Advantages of a Three-Channel Communication Protocol”, 18th International Conference on Cyber Warfare and Security (ICCWS 2023), Baltimore, MD, Mar 2023
  2. ^Langehaug, T.J., Graham, S.R., “Towards Hardware-Based Application Fingerprinting with Microarchitectural Signals for Zero Trust Environments”, Proceedings of the 56th Hawaii International Conference on System Sciences, Manoa, Hawaii, Jan 2023
  3. ^Simon, P.E., Graham, S.R., “Probability of Data Leakage and its Impacts on Confidentiality”, 21st European Conference on Cyber Warfare and Security (ECCWS 2022), UK, Jun 2022
  4. *Chadwick, S.D., Graham, S.R., Dean, J.W.,  Dallmeyer M.J.,  “Leveraging Confidential Computing to Enable Secure Information Sharing”, 16th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2022
  5. *Diamond, N.B., Graham, S.R., Clark, G.J., “Securing InfiniBand Traffic with the Bluefield-2 DPU”, 16th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2022
  6. *Muramoto, C.M., Graham, S.R., ^Dunlap, S.J., “Boot Image Encryption on the Talos II”, 16th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2022
  7. *Chadwick, S.D., Graham, S.R., Dean, J.W., “Performance Implications for Multi-Core RISC-V Systems with Dedicated Security Hardware”, 17th International Conference on Cyber Warfare and Security (ICCWS 2022), Albany, NY, Mar 2022
  8. *Diamond, N.B., Graham, S.R., Clark, G.J., “Securing IBA with the Bluefield-2 DPU”, 17th International Conference on Cyber Warfare and Security (ICCWS 2022), Albany, NY, Mar 2022
  9. *Muramoto, C.M., ^Dunlap, S.J., Graham, S.R., “Improving Hardware Security on Talos II Architecture Through Boot Image Encryption”, 17th International Conference on Cyber Warfare and Security (ICCWS 2022), Albany, NY, Mar 2022
  10. *Hintze, K.D., Graham, S.R., Dunlap, S.J., Sweeney, P.J., “InfiniBand Network Monitoring: Challenges and Possibilities”, 15th International Conf on Crit Infrastructure Protection, Arlington, VA, USA, Mar 2021
  11. *Mellish, R.W., Graham, S.R., Dunlap, S.J., Sweeney, P.J., “Anomaly Detection in Automation Controllers”, 15th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2021
  12. *Tullos, J.C., Graham, S.R., Patel, P.P., “Applied Analytical Model for Latency Evaluation of RISC-V Security Monitor”, 16th International Conference on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
  13. #^Koranek, D.F., Hodson, D.D., Graham, S.R., “Zynq System-on-Chip DMA Messaging for Processor Monitoring”, 16th Intern’l Conf on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
  14. Mellish, R.W., Graham, S.R., Dunlap, S.J.,“Network Forensics for Encrypted SCADA Device Programming Traffic”, 16th International Conf on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
  15. #*Willburn, R.A., Graham, S.R., “Remote Memory Monitoring for Malware in a Talos II Architecture”, 16th International Conference on Cyber Warfare and Security (ICCWS 2021), Cooksville, TN, Feb 2021
  16. *Crow, D.R., Graham, S.R., Borghetti, B.J., Sweeney, P.J., “Empirical Dynamic Modeling as a Component of an Intrusion Detection System”, 14th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2020
  17. *Hayden, M.J, Graham, S.R., Betances, J.A., Mills, R.F., “Multi-Channel Security through Data Fragmentation”, 14th International Conf on Crit Infrastructure Protection, Arlington, VA, USA, Mar 2020
  18. *Mireles, L.E., Graham, S.R., Dunlap, S.J., Sweeney, P.J., Dallmeyer M.J., “Implications of Securing and Infiniband Network”, 14th Intrntl Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2020
  19. *Pettit, D.M., Graham, S.R., “Cybersecurity Risk Assessment for Small Unmanned Aerial Vehicles”, 14th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2020
  20. *Crow, D.R., Graham, S.R., Borghetti, B.J., “Fingerprinting Vehicles with CAN Bus Data Samples”, 15th International Conference on Cyber Warfare and Security (ICCWS 2020), Norfolk, VA, Feb 2020
  21. *Pettit, D.M., Dill, R., Graham, S.R., “Zero Stars: Analysis of Cybersecurity Risk of Small COTS UAVs”, IARIA SECUREWARE 19, Nice, France, Oct 2019
  22. ^Hamilton, N.S., Graham, S.R., Carbino, T.J., Petrosky, J.C., Betances, J.A., “Adaptive-Hybrid Redundancy for Rad-Hardening”, Proceedings of the IEEE 2019 National Aerospace and Electronics Conference (NAECON), IEEE, Jul 2019
  23. *Cintron, L.A., Graham, S.R., Hodson, D.D., Mullins, B.E. “Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure using Hyperledger Fabric”, 13th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
  24. *Hacker, K.L., Graham, S.R., Dunlap, S.J., “Vehicle Identification and Route Reconstruction via TPMS Data Leakage”, 13th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
  25. *Lassiter, R. M., Graham, S.R., Carbino, T.J., Dunlap S.J., “Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes (WS-DNA)”, 13th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
  26. *Schmitt, D.J., Graham, S.R., Sweeney, P.J., Mills, R.F., “A Cyber Vulnerability Assessment of Infiniband Networking”, 13th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2019
  27. *Cintron, L.A., Graham, S.R., Hodson, D.D., Mullins, B.E., “Distributed-Ledger Based Event Attestation for Intelligent Transportation Systems”, 14th International Conference on Cyber Warfare and Security (ICCWS 2019), Stellenbosch, South Africa, Mar 2019
  28. *Hacker, K.L., Graham, S.R., “Preserving Privacy and Integrity in Automotive Tire Sensors”, 14th International Conf on Cyber Warfare and Security (ICCWS 2019), Stellenbosch, South Africa, Mar 2019
  29. ^Nolan, B.C., Graham, S.R., Mullins, B.E., Schubert-Kabban, C.M., “Unsupervised Time Series Extraction from Controller Area Network Payloads”, 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), Chicago, IL, USA, pp. 1-5, 2018
  30. *Beyer, S.M., Mullins, B.E., Graham, S.R., Bindewald, J.M., “Pattern-of-Life Modeling Using Data Leakage in Smart Homes”, SCI-300 Specialists’ Meeting (SM) on ‘Cyber Physical Security of Defense Systems’, Fort Walton Beach, FL, USA, May 2018
  31. *Willis, J.M., Mills, R.F., Mailloux, L.O., Graham, S.R., “MIL-STD-1553 Device Characterization using Organic Interface Functionality”, SCI-300 Specialists’ Meeting (SM) on ‘Cyber Physical Security of Defense Systems’, Fort Walton Beach, FL, USA, May 2018
  32. *Jeffries, B.M., Mullins, B.E., Graham, S.R., “Securing Critical Infrastructure: A Ransomware Study”, 12th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
  33. *Celebucki, D.J., Graham, S.R., Gunawardena, S., “Reversing A Lattice ECP3 FPGA for Bitstream Protection”, 12th International Conf on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
  34. *Bentjen, K.C., Graham, S.R., Nykl, S.L., “Introducing Persistent Human Control into a Reservation-Based Autonomous Intersection Protocol”, 12th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
  35. *Wolfe, C.L., Graham, S.R., Mills, R.F., Nykl, S.L., Simon, P.E., “Securing Data-in-Transit for Power-Limited Sensor Networks using Two-Channel Communication”, 12th International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2018
  36. *Wolfe, C.L., Graham, S.R., Simon, P.E. “Securing Data in Transit using Tunable Two Channel Communication”, 13th International Conf on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, Mar 2018
  37. *Connors, J.W., Graham, S.R., Mailloux, L.O., “Cyber Synthetic Modeling for Vehicle-to-Vehicle Applications”, 13th International Conf on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, Mar 2018
  38. *Bentjen, K.C., Graham, S.R., Nykl, S.L. “Modelling Misbehaviour in Automated Vehicle Intersections in a Synthetic Environment”, 13th International Conference on Cyber Warfare and Security (ICCWS 2018), Washington, DC, USA, Mar 2018
  39. *Celebucki, D.J., Lin, A.C., Graham, S.R., “A Security Evaluation of Popular Internet of Things Protocols for Manufacturers”, 2018 IEEE International Conference on Consumer Electronics (ICCE), Jan 2018
  40. *Willis, J.M., Mills, R.F., Mailloux, L.O., Graham, S.R., “Considerations for secure and resilient satellite architectures”, 2017 International Conference on Cyber Conflict (CyCon U.S.), Washington, DC, USA, pp. 16-22, 2017
  41. ^Simon, P.E., Graham, S.R., “Potential Privacy Ramifications of Modern Vehicle Software and Firmware”, 12th European Conference on Cyber Warfare and Security (ECCWS 2017), Estonia, Jun 2017
  42. *Gutierrez, J.A., Bindewald, J.M., Graham, S.R., Rice, M.J., “Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections”, International Conference on Critical Infrastructure Protection, Arlington, VA, USA, Mar 2017
  43. *Potthoff, T.S., Graham, S.R., “Dynamic Attestation of Real-Time Systems”, 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Fairborn, OH, USA, Mar 2017
  44. *Caberto, E.K., Graham, S.R., “A Method of Securing a Vehicle’s Controller Area Network”, 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Fairborn, OH, USA, Mar 2017
  45. *Reber, P.E., Graham, S.R., “Security by Design in System on a Chip Applications”, 12th International Conference on Cyber Warfare and Security (ICCWS 2017), Fairborn, OH, USA, Mar 2017
  46. ^Simon, P.E., Graham, S.R., “Comparison of Real-Time, Mobile Data Bus Architectures”, 3rd International Workshop on Information Integration in Cyber Physical Sys (IICPS 2016), Jul 2016
  47. *Coates, G.M., Hopkinson, K.M., Graham, S.R., Kurkowski, S.H., Collaborative, Trust-Based Security Mechanisms for a Regional Utility Intranet, IEEE General Power Meeting, Alberta, Canada, p. 1, Jul 2009
  48. *Coyne, M.E., Graham, S.R., Hopkinson K.M., Kurkowski, S.H., “A Methodology for Unit Testing Actors in Proprietary Discrete Event Based Simulations.” Winter Simulation Conference, pp. 1012-1019, Miami, FL, USA, Dec 2008
  49. *Belue, J.M., Kurkowski, S.H., Graham, S.R., Hopkinson, K.M., Thomas, R.W., *Abernathy, J.W., “Research and Analysis of Simulation-based Networks through Multi-Objective Visualization.” Winter Simulation Conference, Miami, FL, USA, pp. 1216-1224, Dec 2008
  50. *Compton, M.D., Hopkinson, K.M., Graham, S.R., “The Network Tasking Order (NTO).” Military Communications Conference, San Diego, CA, USA, pp. 1-7, Nov 2008
  51. ^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “Measuring system interoperability: An i-Score Improvement.” Proceedings of the 6th Annual Conference on Systems Engineering Research, Redondo Beach, CA, USA, Apr 2008
  52. ^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “A Survey on Interoperability Measurement.” Proceedings of the 12th International Command and Control, Research and Technology Symposium, Newport, RI, USA, Jun 2007
  53. ^Kleeman, M.P., Lamont, G.B., Hopkinson, K.M., Graham, S.R., “Solving Multicommodity Capacitated Network Design Problems using a Multiobjective Evolutionary Algorithm.” Proceedings of the 2007 IEEE Computational Intelligence for Security and Defense Applications, Honolulu, HI, USA, pp. 33-41, Apr 2007
  54. ^Ford, T.C., Colombi, J.M., Jacques, D.R., Graham, S.R., “The Interoperability Score.” Proceedings of 5th Annual Conf on Systems Engineering Research, Hoboken, NJ, USA, Mar 2007
  55. *Stuckey, N.C., Vasquez, J.R., Graham, S.R., “Estimating Queue Size in a Computer Network Using an Extended Kalman Filter.” Proceedings of the 2007 IEEE Aerospace Conf, Big Sky, MT, USA, Mar 2007
  56. *Kautz, J.T., Mullins, B.E., Baldwin, R.O., Graham. S.R., “An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.” Hawaii International Conference on System Sciences (HICSS-40), Waikoloa, HI, USA,pp. 1-6, Jan 2007
  57. ^Kowshik S., ^Baliga, G.B., ^Graham, S.R., Sha L., “Co-Design Based Approach to Improve Robustness in Networked Control Systems.” Proceedings of the International Conference on Dependable Systems and Networks, Jun 2005
  58. ^Robinson, C.L., ^Baliga, G.B., ^Graham. S.R., Kumar, P.R., “Design patterns for robust and evolvable networked control.” Proceedings of 3rd Annual Conf on Systems Engineering Research, NJ, USA, Mar 2005
  59. ^Graham, S.R., Kumar, P.R., “Time in general-purpose control systems: The control time protocol and an experimental evaluation.”  Proceedings of the 43rd IEEE Conference on Decision and Control, pp. 4004–4009, Bahamas, 14-17 Dec 2004
  60. ^Baliga, G.B., ^Graham, S.R., Sha L., Kumar, P.R., “Service continuity in networked control using Etherware.” IEEE Distributed Systems Online, Sep 2004
  61. ^Baliga, G.B., ^Graham, S.R., Sha L., Kumar, P.R., “Etherware: Domainware for wireless control networks.” Proceedings of the 7th IEEE International Symposium on Object-oriented Realtime distributed Computing (ISORC 2004), pp. 155–162, Vienna, Austria, 12-14 May 2004

Invited Conference Papers

  1. ^Baliga, G.B., ^Graham, S.R., Gunter, C., Kumar, P.R., “Reducing Risk by Managing Software Related Failures in Networked Control Systems.” Proceedings of the 45th IEEE Conference on Decision and Control, San Diego, CA, pp. 2866-2871, Dec 2006
  2. ^Baliga, G.B., ^Graham, S.R., Kumar, P.R., “Middleware and Abstractions in the Convergence of Control with Communication and Computation.” 44th IEEE Conf on Decision and Control, Seville, Spain, Dec 2005
  3. ^Graham, S.R., ^Baliga, G.B., Kumar, P.R., “Issues in the convergence of control with communication and computation: Proliferation, architecture, design, services, and middleware.” Proceedings of 43rd IEEE Conf on Decision Control, Nassau, Bahamas, pp. 1466-1471, Dec 2004
  4. ^Graham, S.R., Kumar, P.R., “The Convergence of Control with Communication and Computation.” Proceedings of the Eighth International Conf on Personal Wireless Communication, pp. 458-475, Sep 2003

Book Chapters

  1. *Muramoto, C.M., Graham, S.R., Dunlap, S.J., “Evaluating the Use of Boot Image Encryption on Talos II Architecture”, Critical Infrastructure Protection XVI, Springer, Cham, Switzerland, 2022
  2. *Diamond, N.B., Graham, S.R., Clark, G.J., “Securing InfiniBand Traffic with the Bluefield-2 DPU”, Critical Infrastructure Protection XVI, Springer, Cham, Switzerland, 2022
  3. *Chadwick, S.W., Graham, S.R., Dean, J.W., Dallmeyer, M.J., “Towards Leveraging Confidential Computing; Enabling Secure Information Sharing”, Critical Infrastructure Protection XVI, Springer, Cham, Switzerland, 2022
  4. *Mellish, R.W., Graham, S.R., Dunlap, S.J., Sweeney, P.J., “Anomaly Detection in Automation Controllers”, Critical Infrastructure Protection XV, Springer, Cham, Switzerland, pp. 57-78, 2021
  5. *Hintze, K.D., Graham, S.R., Dunlap, S.J., Sweeney, P.J., “Infiniband Network Monitoring: Challenges and Possibilities”, Critical Infrastructure Protection XV, Springer, Cham, Switzerland, pp. 25-46, 2021
  6. *Crow, D.R., Graham, S.R., Borghetti, B.J., Sweeney, P.J., “Engaging Empirical Dynamic Modeling to Detect Intrusions in Cyber-Physical Systems”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 111-133, 2020
  7. *Hayden, M., Graham, S.R., Betances, J.A., Mills, R.F., “Multi Channel Security through Data Fragmentation”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 137-155, 2020
  8. *Mireles, L.E., Graham, S.R., Sweeney, P.J., Dunlap, S.J., Dallmeyer, M.J., “Securing an Infiniband Network and its Effect on Performance”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 157-179, 2020
  9. *Pettit, D.M., Graham, S.R., “Assessing the Cyber Risk of Small Unmanned Aerial Vehicles”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 45-67, 2020
  10. *Magness, J.M., Sweeney, P.J., Graham, S.R., Kovach, N.S., “Simulation-Based Logic Bomb Identification and Verification for Unmanned Aerial Vehicles”, Critical Infrastructure Protection XIV, Springer, Cham, Switzerland, pp. 25-44, 2020
  11. *Cintron, L.A., Graham, S.R., Hodson, D.D., Mullins, B.E., “Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure using Hyperledger Fabric”, Critical Infrastructure Protection XIII, Springer, Cham, Switzerland, pp. 137-156, 2019
  12. *Lassiter, R. M., Graham, S.R., Carbino, T.J., Dunlap S.J., “Electronic Control Unit Discrimination Using Wired Signal Distinct Native Attributes (WS-DNA)”, Critical Infrastructure Protection XIII, Springer, Cham, Switzerland, pp. 103-121, 2019
  13. *Hacker, K.L., Graham, S.R., Dunlap, S.J., Vehicle Identification and Route Reconstruction via TPMS Data Leakage, Critical Infrastructure Protection XIII, Springer, Cham, Switzerland, pp. 123-136, 2019
  14. *Schmitt, D.J., Graham, S.R., Sweeney, P.J., Mills, R.F., “Vulnerability Assessment of Infiniband Networking”, Critical Infrastructure Protection XIII, Springer, Cham, Switzerland, pp. 179-205, 2019
  15. *Celebucki, D.J., Graham, S.R., Gunawardena, S., “Reversing A Lattice ECP3 FPGA for Bitstream Protection”, Critical Infrastructure Protection XII, Springer, Cham, Switzerland, pp. 91-111, 2018
  16. *Bentjen, K.C., Graham, S.R., Nykl, S.L., “Introducing Persistent Human Control into a Reservation-Based Autonomous Intersection Protocol”, Critical Infrastructure Protection XII, Springer, Cham, Switzerland, pp. 197-212, 2018
  17. *Wolfe, C.L., Graham, S.R., Mills, R.F., Nykl, S.L., Simon, P.E., “Securing Data-in-Transit for Power-Limited Sensor Networks using Two-Channel Communication”, Critical Infrastructure Protection XII, Springer, Cham, Switzerland, pp. 81-90, 2018

* Denotes Master's student authors, ^ Denotes PhD student authors, # Denotes “Best Paper/Presentation” 

Return to the top of the page

Air Force Institute of Technology
2950 Hobson Way
Wright-Patterson Air Force Base, OH 45433-7765
Commercial: 937-255-6565 | DSN: 785-6565