Columbus State University Print Logo

TSYS School of Computer Science

TSYS School of Computer Science

Faculty activity in IA Practice and Research

a. Peer reviewed publications

Dr. Radhouane Chouchane

1. M. R. Chouchane, A. Walenstein, and A. Lakhotia. “Using Markov Chains to Filter Machine
Morphed Variants of Malicious Programs
”. MALWARE'08, Alexandria, VA, October 7-8, 2008.
Link to copy of paper

2. A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. “Constructing Malware Normalizers
Using Term Rewriting
”. Journal in Computer Virology 4(4): 307-322 (2008). Link to copy of paper

3. M. R. Chouchane, A. Walenstein, and A. Lakhotia.“Statistical Signatures for Fast Filtering of
Instruction-substituting Metamorphic Malware
”. 5th Workshop on Recurring Malcode (WORM
2007), Fairfax, VA, November 2007. Link to copy of paper

4. A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. “The Design Space of Metamorphic
Malware
”. 2nd International Conference on i-Warfare and Security (ICIW 2007), Monterey, CA, March 2007.
Link to copy of paper

Dr. Shamim Khan

1. Khan, S., and Gurkas, P., “Identification Using Biometric Technology: Issues and Attitudes”,
Proc. IADIS International Conference on ICT, Society and Human Beings 2010, Freiburg,
July 28-31, 2010, pp.27-34. Link to copy of paper

Dr. Jianhua Yang

1. Yongzhong Zhang, Jianhua Yang, Chumming Ye, “Modeling and Detecting Stepping-Stone
Intrusion”, International Journal of Computer Science and Network Security, pp 200-202,
Vol. 9, No 7. PDF File Link to copy of paper

2. Guoqing Zhao, Jianhua Yang, Long Ni, Gurdeep S. Hura, and Shou-Hsuan Stephen Huang,
"Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone
Intrusion," to be published in the Proceedings of 23nd IEEE International Conference on Advanced
Information Networking and Applications (AINA 2009), Bradford, UK, May 2009 Link to copy of paper

3. Long Ni, Jianhua Yang, Ran Zhang, David Song, "Matching TCP/IP Packets to Resist Stepping-
Stone Intruders' Evasion," the Proceedings of IEEE 40th Southeastern Symposium on System
Theory(SSST08), New Orleans, LA, pp 64-68, March 2008. Link to copy of paper

4. Jianhua Yang, Byong Lee, Shou-Hsuan Stephen Huang, "Monitoring Network Traffic to Detect
Stepping-Stone Intrusion," the Proceedings of 22nd IEEE International Conference on Advanced
Information Networking and Applications (AINA 2008), Okinawa, Japan, pp 56-61 March 2008.
Link to copy of paper

5. Jianhua Yang, Stephen Huang, “Mining TCP/IP Packets to Detect Stepping-Stone Intrusion”,
Journal of Computers and Security, Elsevier Ltd., pp 479-484, Vol. 26 (2007). Link to copy of paper

6. Jianhua Yang, Stephen Huang, “Probabilistic Analysis of an Algorithm to Compute TCP Packet
Round-Trip Time for Intrusion Detection”, Journal of Computers and Security, Elsevier Ltd.,
pp137-144, Vol. 26 (2007). Link to copy of paper

7. Stephen Huang, Robert Lychev, Jianhua Yang, “Stepping-Stone Detection via Request-Response
Traffic Analysis” to be published in Lecture Notes in Computer Science (LNCS) by Springer-Verlag,
4th IEEE International Conference on Automatic and Trusted Computing, Hong Kong, China,
pp276-285 July, 2007.(Accepting rate=60/242) Link to copy of paper

b. Published books or book chapters

Dr. Jianhua Yang

1. Jianhua Yang, Byong Lee, “Detecting Stepping-Stone Intrusion and Resisting Evasion through
TCP/IP Packets Cross-Matching”, Lecture Notes in Computer Science (LNCS) by Springer-Verlag,
5th IEEE International Conference on Automatic and Trusted Computing, Oslo, Norway, Vol. 5060,
pp 2-12 June,2008.(Accepting rate=28/125) Link to copy of paper

Dr. Wayne Summers

1. Summers, W. “Local Area Networks”, The Handbook of Technology Management,
Volume 3: Management Support Systems, Electronic Commerce, Legal and Security
Considerations, John Wiley & Sons, 2010, pages 1 – 20. Link to copy of paper

c. Grants for IA Education and/or Research

During academic year 2009 – 2010, members of the CSU Center for Information
Assurance Education were awarded a grant for development of hands–on
information assurance labs. Here is a link to the report.

d. Faculty members are subject matter experts
No points claimed here.

e. Faculty members involved in student IA programs
No points claimed here.

f. Faculty presents at major conferences

Dr. Radhouane Chouchane

1. M. R. Chouchane. “Injecting Information Security in Core CS Courses: Methods, Challenges,
and Impact
”. CISSE'09, Seattle, WA, June 1-3, 2009. Link to copy of paper

2. Drs. Jianhua Yang and Edward Bosworth, “Matching TCP/IP Packets to Detect Stepping–Stone Intrusion”,
Kennesaw State University InfoSec CD, October 2009. Link to PowerPoint presentation .

3. Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang, “ Using Dynamic
Programming Techniques to Detect Multi-Hop Stepping-Stone Pairs in a Connection Chain”, the Proceedings
of 24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010),
Perth, Australia, April 2010 Link to Paper

4. Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S.-H. Huang, “Resist Intruders, Manipulation
via Context-based TCP/IP Packet Matching”, the Proceedings of 24th IEEE International Conference on Advanced
Information Networking and Applications (AINA 2010), Perth, Australia, April 2010 Link to Paper

5. Dr. Lydia Ray Command–Line Windows Forensic Tools, the 2010 ACM Mid–Southeast Conference,

November 12, 2010. Abstract of Paper PowerPoint presentation