Florida State University
Computer Science Department

Security Research Group

Selected Publications

 

 



Main

Group Schedule

Presented Papers

People

Security Protocols

Intrusion Detection

Wireless Security

Publications

NSA Security Proffesional
Certificate


Security Related Courses

Security Related Conferences

SAIT Labs

DoD Scholarship

Grant Proposal Tips

Links

Bibliography


Computer Forensics Education, Alec Yasinsac, Robert Earbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer, accepted to IEEE Computer Security and Privacy Magazine, July/Aug 2003

 

Honeytraps, a Valuable Tool To Provide Effective Countermeasures for Crime Against Computer and Network Systems, Yanet Manzano and Alec Yasinsac, accepted to the 7th World Multi-conference on Systemics, Cybernetics and Informatics (SCI), July 2003

 

Rate of Change in Ad Hoc Networks, Alec Yasinsac, Accepted to the Information Resources Management Association International Conference, May, 2003

 

Identifying Flaws in the Secure Routing Protocol, John Marshall, Vikram Thakur, and Alec Yasinsac, Proceedings of The 22nd International Performance, Computing, and Communications Conference (IPCCC 2003) April 9-11, 2003, pp. 167-174

 

Protocols for a Dynamic Key Exchange System for Ad Hoc Networks, Mike Burmester and Alec Yasinsac, Eleventh International Workshop on Security Protocols, Cambridge, UK, Apr. 2-4, 2003, LNCS

 

Secure Position Aided Ad hoc Routing Protocol, Stephen Carter and Alec Yasinsac, Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 329-334, Nov. 4-6, 2002.

 

A Family of Protocols for Group Key Generation in Ad Hoc Networks, Alec Yasinsac, Vikram Thakur, Stephen Carter, and Ilkay Cubukcu, Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 183-187, Nov.4-6, 2002


Secure Position Aided Ad hoc Routing Protocol, Stephen Carter and Alec Yasinsac, in the Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2002.

 

An Environment for Security Protocol Intrusion Detection, Alec Yasinsac, Journal of Computer Security, Vol. 10, Nov. 1-2, 2002, pp. 177-88

A Family of Protocols for Group Key Generation in Ad Hoc Networks, Alec Yasinsac, Vik Thakur, Stephen Carter, and Ilkay Cubukcu, in the Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2002

An Analysis of SRP for Mobile Ad Hoc Networks, John Marshall, Poster Presentation, The 2002 International Multi-Conference in Computer Science, June 24-27, 2002

Honeytraps, A Network Forensic Tool, Yanet Manzano and Alec Yasinsac, Sixth Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, July 14 -18, 2002

Activity Profiles for Intrusion Detection, Ladislav Kohout, Alec Yasinsac, and Ernest McDuffie, North American Fuzzy Information Processing Society-Fuzzy Logic and the Internet (NAFIPS-FLINT 2002), New Orleans, LA, June 27-29, 2002

Modeling Protocols for Secure Group Communication in AdHoc Networks, Alec Yasinsac and James A. Davis,  Tenth International Workshop on Security Protocols, Cambridge, UK, Apr 17-19, 2002, LNCS

Developing an Academic Security Laboratory, Alec Yasinsac, Jenny Frazier, and Marion Bogdonav, " 6th National Colloquium for Information Systems Security Education 2002, June 3-7, 2002, Microsoft Headquarters, Redmon, Washington.

An Environment for Security Protocol Intrusion Detection, Alec Yasinsac, The Journal of Computer Security, January 2002

Security or Privacy, Must We Choose?, Michael Burmester, Yvo Desmedt, Rebecca Wright, and Alec Yasinsac, Computer Science and Telecommunication Board, Critical Infrastructure Protection and the Law Project, October, 2001

A Framework for A Protocol Evaluation Workbench, Alec Yasinsac and Wm A. Wulf, The International Journal of Reliability, Quality and Safety Engineering (IJRQSE), Vol. 8 No. 4, December 01, 2001, pp 373-389

Using Weakest Preconditions to Evaluate the Transport Layer Security Protocol, Justin Childs and Alec Yasinsac,  Sixth IEEE International Symposium on High Assurance Systems Engineering, Boca Raton, FL, Oct 24-26, 2001.

Information Security Curricula in Computer Science Departments: Theory and Practice, Alec Yasinsac, 5th National Colloquium for Information Systems Security Education 2001: A Security Odyssey, May 22-24, 2001, George Mason University

Policies to Enhance Computer and Network Forensics,  Yanet Manzano and Alec Yasinsac, The Proceedings of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, United States Military Academy, June 2001

Detecting Intrusions in Security Protocols,   Alec Yasinsac, 1st ACM Conference on Computer and Communication Security Workshop on Intrusion Detection,  Nov 1-4, 2000

Dynamic Analysis of Security Protocols, Alec Yasinsac, Proceedings of the New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland, pp. 77-87

A Framework for A Protocol Evaluation Workbench , Alec Yasinsac and Wm A. Wulf, Proceedings of the Fourth IEEE International High Assurance Systems Engineering Symposium (HASE) '99, Nov 17-19, 1999, Washington, D.C., IEEE Computer Society Press.

Using Weakest Preconditions to Evaluate Cryptographic Protocols , Alec Yasinsac and Wm A. Wulf, Cambridge Workship on Cryptographic Protocols, March 1996

A Technique for Remote Authentication , Alec Yasinsac, Katie S. Oliver, Ramesh Peri and Wm A. Wulf, Proceedings of the Internet Society Symposium on Network and Distributed System Security, 1994, pp 159-164