AIRL Logo2006 Publications

  • Weist, P., Deokar, A. V., and El-Gayar, O. F. "Evaluation of readiness model for web services adoption: A case study approach," In Proceedings of the Pre-ICIS SIG-DSS Research Workshop (ICIS 2006), Milwaukee, WI, 2006.
  • Dean D., Deokar, A. V., and Ter Bush, R., "Making the collaboration engineering investment decision," In Proceedings of the 39th Hawaii International Conference on System Sciences (HICSS-39 '06), 2006. El-Gayar, O.F. and Kanchana Tandekar (2006).
  • An Intelligent Decision Support System (IDSS) for Aquaculture Planning. In: Intelligent Decision-Making Support Systems: Foundations, Applications, and Challenges (Eds.) Jatinder Gupta, Guisseppi Forgionne, and Manuel Mora, Springer-Verlag. El-Gayar, O.F. (2006).
  • Designing Information Systems Doctoral Programs: Issues and Challenges. Issues in Information Systems (IIS) VII(1-2). Xinwen Fu, S. Graham, Y. Zhu, Y. Guan and D. Xuan, Location Privacy in Wireless Networks,Handbook on Mobile Ad Hoc and Pervasive Communications, American Scientific Publishers,2006.
  • Y. Zhu, Xinwen Fu, R. Bettati, and W. Zhao, Analysis of Flow-Correlation Attacks in Anonymity Network, Special Issue of International Journal of Security and Networks (IJSN), Accepted 2006.
  • Xinwen Fu, Y. Zhu, B. Graham, R. Bettati, and Wei Zhao, On Flow Marking Attacks in Wireless Anonymous Communication Networks, Journal of Ubiquitous Computing and Intelligence (JUCI), Accepted, 2006.
  • Xinwen Fu, S. Graham, Y. Guan and D. Xuan, Location Privacy in Wireless Networks, Handbook on Mobile Ad Hoc and Pervasive Communications, American Scientific Publishers, 2006 Accepted.
  • Surendra Sarnikar, and J. Leon Zhao, "A Pattern-based Approach to Automating e-Business Knowledge Flows", Proceedings of the Fifth Workshop on E-business (WeB 2006), Milwaukee, WI, December 9, 2006.
  • El-Gayar, O.F. and M. Moran (2006). College students' acceptance of Tablet PCs: an application of the UTAUT model. Paper presented at the 36th Annual Meeting of the Decision Sciences Institute (DSI), November 18-21, 2006, San Antonio, Texas.
  • El-Gayar, O.F. (2006). A Service-oriented architecture for distributed decision support systems. Proceeding of the 36th Annual Meeting of the Decision Sciences Institute (DSI), November 18-21, 2006, San Antonio, Texas.
  • Stephen Krebsbach, George Hamer, "Near-Optimal Distortion Reduction with Invisible Watermarking RSSI Algorithms" Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering (CAINE-06) Las Vegas, NV, November 13-15, 2006, ISBN pending.
  • George Hamer, Stephen Krebsbach "Statistical Steganography and Steganalysis of Database Tables" Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering (CAINE-06) Las Vegas, NV, November 13-15, 2006, ISBN pending.
  • J. Pauli. "The Role of Sequence Diagrams in Use/Misuse Case Decomposition for Secure Systems". Proc. of the 10th IASTED International Conference on Software Engineering and Applications (SEA 2006). November 2006. Dallas,TX, USA.
  • Xinewen Fu, W.Yu, D. Cheng, X. Tan, K. Streff, and S. Graham, On Recognizing Virtual Honey pots and Countermeasures, The IEEE International Symposium on dependable, Autonomic and Secure Computing (DASC), Sep. 29-Oct. 1, 2006.
  • El-Gayar, O.F. (2006). A web services-based architecture for model sharing and reuse. South Dakota EPSCoR State Conference, September 25-26, 2004, Rapid City, South Dakota.
  • Cao, J., Crews, J. M., Lin, M., Deokar, A. V., Nunamaker, J. F., Jr. and Burgoon, J. K. "Interactions between system evaluation And theory testing: A demonstration of the power of a multifaceted approach to systems research," Journal of Management Information Systems, 22(4), pp. 207-235, Spring 2006.
  • J. Pauli and D. Xu, "Integrating Functional and Security Requirements with Use Case Decomposition", Proc. of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), August 2006, Palo Alto, CA, USA.
  • J. Pauli and D. Xu, "Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems", Proc. of the 18th International Conference on Software Engineering and Knowledge Engineering (SEKE 2006), July 2006, San Francisco, CA, USA.
  • Surendra Sarnikar, and J. Leon Zhao, "Task-Centric Document Recommendation via Context-Specific Terms", Proceedings of the 2006 AAAI Workshop on Modeling and Retrieval of Context (MRC'06), Boston, Massachusetts, July 16-17, 2006.
  • D. Xu and J. Pauli, "Threat-Driven Design and Analysis of Secure Software Architectures", Journal of Information Assurance (JIAS), Volume 1, Issue 2,June 2006.
  • J. Pauli, "Integrated Decomposition of Use/Misuse Cases to Harvest Security Requirements", Faculty Research and Education Seminar Hour (FRESH), April 2006, Madison, SD, USA.

Last Updated: 7/31/12