Security Research Group
Honeytraps, a Valuable Tool To Provide Effective Countermeasures for Crime Against Computer and Network Systems, Yanet Manzano and Alec Yasinsac, accepted to the 7th World Multi-conference on Systemics, Cybernetics and Informatics (SCI), July 2003
Rate of Change in Ad Hoc Networks, Alec Yasinsac, Accepted to the Information Resources Management Association International Conference, May, 2003
Identifying Flaws in the Secure Routing Protocol, John Marshall, Vikram Thakur, and Alec Yasinsac, Proceedings of The 22nd International Performance, Computing, and Communications Conference (IPCCC 2003) April 9-11, 2003, pp. 167-174
Protocols for a Dynamic Key Exchange System for Ad Hoc Networks, Mike Burmester and Alec Yasinsac, Eleventh International Workshop on Security Protocols, Cambridge, UK, Apr. 2-4, 2003, LNCS
Secure Position Aided Ad hoc Routing Protocol, Stephen Carter and Alec Yasinsac, Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 329-334, Nov. 4-6, 2002.
A Family of Protocols for Group Key Generation in Ad Hoc Networks, Alec Yasinsac, Vikram Thakur, Stephen Carter, and Ilkay Cubukcu, Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 183-187, Nov.4-6, 2002
An Environment for Security Protocol Intrusion Detection, Alec Yasinsac, Journal of Computer Security, Vol. 10, Nov. 1-2, 2002, pp. 177-88
A Family of Protocols for Group Key Generation in Ad Hoc Networks, Alec Yasinsac, Vik Thakur, Stephen Carter, and Ilkay Cubukcu, in the Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2002
An Analysis of SRP for Mobile Ad Hoc Networks, John Marshall, Poster Presentation, The 2002 International Multi-Conference in Computer Science, June 24-27, 2002
Honeytraps, A Network Forensic Tool, Yanet Manzano and Alec Yasinsac, Sixth Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, July 14 -18, 2002
Activity Profiles for Intrusion Detection, Ladislav Kohout, Alec Yasinsac, and Ernest McDuffie, North American Fuzzy Information Processing Society-Fuzzy Logic and the Internet (NAFIPS-FLINT 2002), New Orleans, LA, June 27-29, 2002
Modeling Protocols for Secure Group Communication in AdHoc Networks, Alec Yasinsac and James A. Davis, Tenth International Workshop on Security Protocols, Cambridge, UK, Apr 17-19, 2002, LNCS
Developing an Academic Security Laboratory, Alec Yasinsac, Jenny Frazier, and Marion Bogdonav, " 6th National Colloquium for Information Systems Security Education 2002, June 3-7, 2002, Microsoft Headquarters, Redmon, Washington.
An Environment for Security Protocol Intrusion Detection, Alec Yasinsac, The Journal of Computer Security, January 2002
Security or Privacy, Must We Choose?, Michael Burmester, Yvo Desmedt, Rebecca Wright, and Alec Yasinsac, Computer Science and Telecommunication Board, Critical Infrastructure Protection and the Law Project, October, 2001
A Framework for A Protocol Evaluation Workbench, Alec Yasinsac and Wm A. Wulf, The International Journal of Reliability, Quality and Safety Engineering (IJRQSE), Vol. 8 No. 4, December 01, 2001, pp 373-389
Using Weakest Preconditions to Evaluate the Transport Layer Security Protocol, Justin Childs and Alec Yasinsac, Sixth IEEE International Symposium on High Assurance Systems Engineering, Boca Raton, FL, Oct 24-26, 2001.
Information Security Curricula in Computer Science Departments: Theory and Practice, Alec Yasinsac, 5th National Colloquium for Information Systems Security Education 2001: A Security Odyssey, May 22-24, 2001, George Mason University
Policies to Enhance Computer and Network Forensics, Yanet Manzano and Alec Yasinsac, The Proceedings of the 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, United States Military Academy, June 2001
Detecting Intrusions in Security Protocols, Alec Yasinsac, 1st ACM Conference on Computer and Communication Security Workshop on Intrusion Detection, Nov 1-4, 2000
Dynamic Analysis of Security Protocols, Alec Yasinsac, Proceedings of the New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland, pp. 77-87
A Framework for A Protocol Evaluation Workbench , Alec Yasinsac and Wm A. Wulf, Proceedings of the Fourth IEEE International High Assurance Systems Engineering Symposium (HASE) '99, Nov 17-19, 1999, Washington, D.C., IEEE Computer Society Press.
Using Weakest Preconditions to Evaluate Cryptographic Protocols , Alec Yasinsac and Wm A. Wulf, Cambridge Workship on Cryptographic Protocols, March 1996
A Technique for Remote Authentication , Alec Yasinsac, Katie S. Oliver, Ramesh Peri and Wm A. Wulf, Proceedings of the Internet Society Symposium on Network and Distributed System Security, 1994, pp 159-164