National Centers of Academic Excellence in Information Assurance (IA) Education - Research - Supporting Evidence by Area

1. Engagement in IA research initiatives, Community Service, and outreach
Hands-on Hacking Workshops for area professionals Hearing Invitation Letter to Dr. Streff
DakotaCON (annual security conference) North Central Region of the Collegiate Cyber Defense Competition
Access to recorded lectures Chenega Logistics,LLC
CFO Conference DSU Cyber Corps scholarship program funded by the NSF-SFS program
Cyber Crime and Data Protection Sinte Gleska
Biometrics Education newspaper article Northwest Iowa Community College
Perspectives from the National Center for the Protection of the Financial Infrastructure IFIP 2009 Conference Program
Dr. Streff Testimony to congress DSU Team #1 in the 2011 Department of Defense Cyber Crime Center international competition
Cybersecurity Research Forum Spring Series The Macroeconomics of Mobile Money
DSU team in the National Collegiate Cyber Defense (CCDC) Collaboration with the Independent Community Bankers of South Dakota (ICBSD)
Collaboration with InfraGard Collaboration with Graduate School of Banking at the University of Wisconsin-Madison
2. Student IA research
SRI Support Letter Dr. Pat Engebretson Dissertation
Dr. Ashley Podhradsky Dissertation Dr. Petter Lovaas Dissertation
Sample Project 1 for Information Security Risk Management Sample Project 2 for Information Security Risk Management
Sample Project 1 for Information Audit and Compliance Sample Project 2 for Information Audit and Compliance
3. IA Academic Program
MSIA Course Rotation IA Certificate Program
M.S. in Computer Science MSIA Assessment Plan
Computer Network Security Assessment Plan Program descriptions for master degree in IA see page 68
Program descriptions for doctoral degree in IA see page 22 Program descriptions for Computer and Network Security degree see page 153
CIS 245 Info Security Fundamentals CIS 275 Web Application Programming I
CIS 328 Operating Environments CIS 332 Structured Systems Analysis & Design
CIS 338 Project Management CIS 350 Computer Hardware, Data Comm and Networking
CIS 375 Web Application Programming II CIS 380 Introduction to Computers
CIS 383 Networking I CIS 385 Networking II
CIS 388 Computer Forensics Fundamentals CIS 484 Database Management Systems
CSC 150 Computer Science I CSC 250 Computer Science II
CSC 275 Web Application Programming I CSC 334 System Software Security
CSC 432 Operating Systems Security CSC 436 Offensive Network Security
CSC 438 Defensive Network Security CSC 509 System and Security Programming
INFA 532 System and Network Security INFA 701 Principles of Information Assurance
INFA 709 Ethical Hacking INFA 713 Managing Security Risks
INFA 715 Data Privacy INFA 717 Advanced Network Security
INFA 719 Software Security INFA 721 Computer Forensics
INFA 723 Cryptography INFA 725 Advanced Network Hacking
INFA 739 Software Quality Assurance INFA 743 Information Security Management Systems
INFA 745 Compliance and Audit INFS 750 IT Infrastructure, Technology and Network Management
INFA 751 Wireless Security MATH 509 Foundational Mathematics
4. IA Education and Research Center
Master of Science in Information Assurance Bachelor of Science in Computer and Network Security
National Center for the Protection of Financial Infrastructure IA Certificate Program
5. Faculty IA Practice, Research and IA literature contribution
Dr. Sreekanth Malladi Vitae Dr. Josh Pauli Vitae
Dr. Dianxiang Xu Vitae Dr. Patrick Engebretson Vitae
Dr. Michael Tu Vitae Dr. Robert Honomichl Vitae
Dr. Kevin Streff Vitae Dr. Yong Wang Vitae
Mr. Kyle Cronin Vitae Dr. Sreekanth Malladi teaching and course schedules
Dr. Kevin Streff teaching and course schedules Dr. Josh Pauli teaching and course schedules
Dr. Dianxiang Xu teaching and course schedules Dr. Michael Tui teaching and course schedules
Dr. Patrick Engebretson teaching and course schedules Dr. Robert Honomichl teaching and course schedules
Dr. Yong Wang teaching and course schedules Mr. Kyle Cronin teaching and course schedules
Mr. Brent Tulloss teaching and course schedules Dr. William Figg teaching and course schedules
Dr. Stephen Krebsbach teaching and course schedules  
6. IA Publications
Books/Chapters
Dr. Engebretson authors book Dr. Streff authors book chapter
A. Principles
[1] El Ariss, O., Jianfei, W. and Dianxiang, X. Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts. In Proceedings of the 5th IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI''11) (Jeju Island, South Korea, 27-29 June 2011, 2011),2011.
B. Security Mechanisms / Functionality
[1] Zhan, J. and Fang, X. Authentication Using Multi-level Social Networks. Knowledge Discovery, Knowledge Engineering and Knowledge Management (2011), 35-49. [2] Zhan, J. Secure collaborative social networks. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 40, 6 2010), 682-689.
[3] Fu, J., Hao, W., Tu, M. and Ma, B. Virtual Services in Cloud Computing. In Proceedings of the IEEE 6th World Congress on Service (Service-1) (September, 2010),2010. [4] Pinagapani, S., Xu, D. and Kong, J. A Comparative Study of Access Control Languages. In Proceedings of the 3rd IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI'09) (Shanghai, China, July, 2009),2009.
C. Architectures
[1] Wong, W. E., Debroy, V. and Xu, D. Towards Better Fault Localization: A Crosstab-Based Statistical Approach. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, PP, 99 2011), 1-19. [2] Tu, M., Li, P., Yen, I., Thuraisingham, B. and Khan, L. Partial Replication of Secure Data Objects in Data Grids. IEEE Transactions on Dependable and Secure Computing, 7, 1 (January 2010).
[3] Tu, M., Xu, D., Xia, Z. and Smith, L. Securing Epidemic based Update Protocol for P2P Systems. In Proceedings of the 23rd IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS'11) (Dallas, TX, USA, December, 2011), Best Paper Award,2011. [4] Tu, M., Xu, D., Xia, Z. and Fu, J. Modeling and Computing Reach Availability of Replicated Data or Service in Distributed Environments. In Proceedings of the 35th IEEE Computer Software and Applications Conference (COMPSAC 2011) (Munich, Germany, July, 2011),2011
D. Assurance
[1] Kong, J., Zhang, K., Dong, J. and Xu, D. Specifying Behavioral Semantics of UML Diagrams through Graph Transformations. Journal of Systems and Software, 82, 2 (2009), 292-306. [2] Xu, D., Goel, V., Nygard, K. and Wong, W. E. Aspect-Oriented Specification of Threat-Driven Security Requirements. International Journal of Computer Applications in Technology,Special Issue on Concern Oriented Software Evolution, 31, 1/2 (2008), 131-140.
[3] Lundell, M. C., Xu, D., Tolliver, D. and Nygard, K. E. A multi-agent design for sense and respond logistics simulation. World Review of Intermodal Transportation Research, 1, 4 (2007), 459-471. [4] Tu, M., Xu, D. and Xia, Z. Securing epidemic based update protocol for P2P systems. In Proceedings of the 23rd IASTED International Conference on Parallel and Distributed Computing and Systems (IASTED PDCS 2011) (Dallas, TX USA, October, 2011),2011.
[5] Ariss, O. E., Xu, D. and Wong, W. E. Integrating Safety Analysis with Functional Modeling. IEEE Transactions on Systems, Man, and Cybernetics--Part A: Systems and Humans, 41, 4 (July 2011), 610-624. [6] Xia, Z., Zhang, W., Tu, M. and Yen, I. Kernel-based Approaches for Collaborative Filtering. In Proceedings of the IEEE 9th International Conference on Machine Learning and Applications(ICMLA10) (December, 2010),2010.
[7] Fu, J., Hao, W., Tu, M. and Ma, B. Virtual Services in Cloud Computing. In Proceedings of the IEEE 6th World Congress on Service (Service-1) (September, 2010),2010. [8] Engebretson, P., Pauli, J. and Bosma, J. Lessons Learned From an Evolving Information Assurance Lab. In Proceedings of the 2010 International Conference on Security and Management (SAM'10) (Las Vegas, NV, USA, July, 2010),2010.
[9] Duan, Y., Canny, J. and Zhan, J. P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. In Proceedings of the 19 USENIX Security Symposium (Washington, DC, MD, USA, August, 2010),2010. [10] Lundell, M., Xu, D., Pikalek, J. and Nygard, K. E. Multi-agent Designs for Ambient Systems. In Proceedings of the First International Conference on Ambient Media and Systems (Ambi-sys'08) (Quebec City, Canada, February, 2008),2008.
[11] Kong, J., Xu, D. and Zeng, X. UML-based Modeling and Analysis of Security Threats. International Journal of Software Engineering and Knowledge Engineering, 20, 6 (September 2010), 875-897. [12] Xu, D., Xu, W. and Wong, W. E. Automated Test Code Generation from Class State Models. International Journal of Software Engineering and Knowledge Engineering, 19, 4 (June 2009), 599-623.
[13] Xu, D., Ariss, O. E., Xu, W. and Wang, L. Aspect-Oriented Modeling and Verification with Finite State Machines. Journal of Computer Science and Technology, 24, 5 (September 2009), 949-961. [14] Dianxiang Xu, W. X., and W. Eric Wong Testing Aspect-Oriented Programs with UML Design Models. International Journal of Software Engineering and Knowledge Engineering, 18, 3 (May 2008), 413-437.
[15] Xu, D. A Tool for Automated Test Code Generation from High-Level Petri Nets. In Proceedings of the 32nd International Conference on Application and Theory of Petri Nets and Concurrency (Petri Nets 2011) (Newcastle upon Tyne, UK, June, 2011),2011 [16] Woodraska, D., Sanford, M. and Xu, D. Security mutation testing of the FileZilla FTP server. ACM, City, 2011.
[17] Tu, M., Xu, D., Xia, Z. and Fu, J. Modeling and Computing Reach Availability of Replicated Data or Service in Distributed Environments. In Proceedings of the 35th IEEE Computer Software and Applications Conference (COMPSAC 2011) (Munich, Germany, July, 2011),2011 [18] Thomas, L., Weifeng, X. and Dianxiang, X. Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing. In Proceedings of the Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual (Munich, Germany, 18-22 July 2011, 2011),2011.
[19] Sanford, M., Woodraska, D. and Xu, D. Security Analysis of FileZilla Server Using Threat Models. In Proceedings of the 23rd International Conf. on Software Engineering and Knowledge Engineering (SEKE'11) (Miami, FL, USA, July, 2011),2011 [20] El Ariss, O., Jianfei, W. and Dianxiang, X. Towards an Enhanced Design Level Security: Integrating Attack Trees with Statecharts. In Proceedings of the 5th IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI''11) (Jeju Island, South Korea, 27-29 June 2011, 2011),2011.
[21] Ding, J., Wu, T., Xu, D., Lu, J. Q. and Hu, X.-H. Metamorphic Testing of a Monte Carlo Modeling Program. In Proceedings of the Sixth International Workshop on the Automation of Software Test (AST'11), in conjunction with ICSE'11 (Honolulu, Hawaii, USA, May, 2011),2011. [22] Ariss, O. E. and Xu, D. Modeling Security Attacks with Statecharts. In Proceedings of the 2nd International ACM SigSoft Symposium on Architecting Critical Systems (ISARCS 2011), Federated with CompArch 2011 (Boulder, Colorado, USA, June, 2011),2011.
[23] Wang, Y., Xu, D., Lively, W. M. and Simmons, D. B. A Stochastic Model for Optimizing the Patching Time of Software Bugs. In Proceedings of the 22nd International Conf. on Software Engineering and Knowledge Engineering (SEKE'10) (San Francisco Bay, CA, USA, July, 2010),2010. [24] Ariss, O. E., Xu, D., Dandey, S., Vender, B., McClean, P. and Slator, B. A Systematic Capture and Replay Strategy for Testing Complex GUI based Java Applications. In Proceedings of the 7th International Conference on Information Technology: New Generations (ITNG'10) (Las Vegas, NV, USA, April, 2010),2010.
[25] Xu, W. and Xu, D. Automated Evaluation of Runtime Object States Against Model-Level States for State-Based Test Execution. In Proceedings of the 5th Workshop on Advances in Model Based Testing (A-MOST'09), in conjunction with ICST'09 (Denver, Colorado, USA, April, 2009),2009. [26] Marback, A., Do, H., He, K., Kondamarri, S. and Xu, D. Security Test Generation using Threat Trees. In Proceedings of the Fourth International Workshop on the Automation of Software Test (AST'09), in conjunction with ICSE'09 (Vancouver, BC, Canada, May, 2009),2009.
[27] Cui, Z., Wang, L., Li, X. and Xu, D. Modeling and Integrating Aspects with UML Activity Diagrams. In Proceedings of the 24th ACM Symposium on Applied Computing (SAC'09), Software Engineering Track (Hawaii, USA, March, 2009),2009. [28] Kong, J. and Xu, D. A UML-based Framework for Design and Analysis of Secure Software. In Proceedings of the 32nd IEEE Computer Software and Applications Conference (COMPSAC 2008) (Turku, Finland, July, 2008),2008.
[29] El-Ariss, O., Xu, D., Wong, W. E., Chen, Y. and Lee, Y.-H. A Systematic Approach for Integrating Fault Trees into System Statecharts. In Proceedings of the 32nd IEEE Computer Software and Applications Conference (COMPSAC 2008) (Turku, Finland, July, 2008),2008. [30] Xu, D., Xu, W. and Wong, W. E. Automated Test Code Generation from UML Protocol State Machines. In Proceedings of the 19th International Conference on Software Engineering and Knowledge Engineering (SEKE'07) (Boston, MA, USA, July, 2007),2007.
[31] Xu, D. and He, X. Generation of Test Requirements from Aspectual Use Cases. In Proceedings of the Third Workshop on Testing Aspect-Oriented Programs (WTAOP'07). In conjunction with AOSD'07 (Vancouver, BC, Canada, March, 2007),2007. [32] Xu, D., Alsmadi, I. and Xu, W. Model Checking Aspect-Oriented Design Specification. In Proceedings of the 31st IEEE International Computer Software and Applications Conference (COMPSAC'07) (Beijing, China, July, 2007),2007.
[32] Wang, L., Wong, W. E. and Xu, D. A Threat Model Driven Approach for Security Testing. In Proceedings of the 3rd International Workshop on Software Engineering for Secure Systems (SESS'07), in conjunction with ICSE'07 (Minneapolis, MN, USA, May, 2007),2007.  
E. Operations
[1] Xu, D., Xu, W. and Wong, W. E. Automated Test Code Generation from Class State Models. International Journal of Software Engineering and Knowledge Engineering, 19, 4 (June 2009), 599-623. [2] Zhan, J. and Thomas, L. Phishing detection using stochastic learning-based weak estimators. In Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) (11-15 April 2011, 2011),2011.
[3] Xu, D. A Tool for Automated Test Code Generation from High-Level Petri Nets. In Proceedings of the 32nd International Conference on Application and Theory of Petri Nets and Concurrency (Petri Nets 2011) (Newcastle upon Tyne, UK, June, 2011),2011 [4] Tu, M., Xu, D. and Xia, Z. Reach availability of replicated services. In Proceedings of the 35th IEEE International Computer Software and Application Conference(COMPSAC'11) (July, 2011),2011.
[5] Thomas, L., Weifeng, X. and Dianxiang, X. Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing. In Proceedings of the Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual (Munich, Germany, 18-22 July 2011, 2011),2011. [6] Pauli, J., Ham, M., Zautke, M. and Engebretson, P. Cookie Monster: Automated Session Hijacking Archival and Analysis. In Proceedings of the 7th International Conference on Information Technology : New Generations (ITNG 2011) (Las Vegas, NV, USA, April, 2011),2011.
[7] Engebretson, P., Burroughs, J. and Pauli, J. Attack Traffic Libraries for Testing and Teaching Intrusion Detection Systems. In Proceedings of the Information Systems Analysis and Synthesis: (ISAS 2011). (Orlando, FL, USA, March, 2011),2011. [8] Xu, D. and Ding, J. Prioritizing State-Based Aspect Tests. In Proceedings of the Third International Conference on Software Testing, Verification, and Validation (ICST'10) (Paris, France, April, 2010),2010.
[9] Xu, D., Xu, W. and Wong, W. E. Automated Test Code Generation from UML Protocol State Machines. In Proceedings of the 19th International Conference on Software Engineering and Knowledge Engineering (SEKE'07) (Boston, MA, USA, July, 2007),2007. [10] Xu, D. and He, X. Generation of Test Requirements from Aspectual Use Cases. In Proceedings of the Third Workshop on Testing Aspect-Oriented Programs (WTAOP'07). In conjunction with AOSD'07 (Vancouver, BC, Canada, March, 2007),2007.
F. Analysis
[1] Tu, M., Wira, S., Xu, D. and Cronin, K. On the development of Digital Forensics Curriculum. Journal of Digital Forensics, Security, and Law(May 2011). [2] Podhradsky, A. L. and Streff, K. Testing Data Sanitization Practices of Retired Drives with The Digital Forensics Data Recovery Project. Journal of Information Privacy & Security, 7, 3 2011), 46-63.
[3] Tu, M., Xia, Z., Li, P. and Tadayon, N. Allocation of partitioned data by using a neural network based approach. Neurocomputing, 72, 4-6 2009), 1000-1011. [4] Zhan, J., Thomas, L. and Pasumarthi, V. Using gaming strategies for attacker and defender in recommender systems. In Proceedings of the 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM) (11-15 April 2011, 2011),2011.
[5] Pauli, J., Ham, M., Zautke, M. and Engebretson, P. Cookie Monster: Automated Session Hijacking Archival and Analysis. In Proceedings of the 7th International Conference on Information Technology : New Generations (ITNG 2011) (Las Vegas, NV, USA, April, 2011),2011. [6] Butner, E. and Tu, M. Forensic Readiness through augmented attack graphs. In Proceedings of the 2011 Mid West Instruction and Computing Symposium (MICS'11) (April, 2011),2011.
[7] Beck, K. and Streff, K. Analyzing Tweets to Identify Malicious Messages. In Proceedings of the 2011 IEEE International Conference on Electro/Information Technology (EIT 2011) (Mankato, MN, May, 2011),2011. [8] Windsor, J. and Pauli, J. Smashing Web Goat for Fun and Research: Static Code Scanner Evaluation. In Proceedings of the 2010 OWASP AppSec DC Conference (Washington, DC, USA, November, 2010),2010.
[9] Beck, K. and Zhan, J. Phishing Using a Modified Bayesian Technique. In Proceedings of the Social Computing (SocialCom), 2010 IEEE Second International Conference on (20-22 Aug. 2010, 2010),2010. [10] Wu, J., Denton, A., Ariss, O. E. and Xu, D. Mining for Core Patterns in Stock Market Data. In Proceedings of the Third International Workshop Mining Multiple Information Sources (MMIS'09), In conjunction with ICDM 2009 (Miami, FL, USA, December, 2009),2009.
[11] Engebretson, P. and Pauli, J. Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies. In Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG 2009) (Las Vegas, NV, USA, April, 2009),2009. [12] Pohdradsky, A., and Streff, K. Re-Visiting Data Sanitization Issues With the Digital Forensics Data Recovery Project. 2011 Hawaii International Conference on Business (HICB 2011), May 2011.
G. Non-Technical IA Issues
[1] Zhan, J., Hsieh, C. L., Wang, I. C., Hsu, T. S., Liau, C. J. and Wang, D. W. Privacy-preserving collaborative recommender systems. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 40, 4 2010), 472-476. [2] Li, P., Tu, M., Yen, I. L. and Xia, Z. Preference update for e-commerce applications: Model, language, and processing. Electronic Commerce Research, 7, 1 2007), 17-44.
[3] Zhan, J., Xing, F. and Killion, P. Trust optimization in task-oriented social networks. In Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) (11-15 April 2011, 2011),2011. [4] Zhan, J., Xing, F. and Bandaru, N. Location privacy protection on social networks. In Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) (11-15 April 2011, 2011),2011.
[5] Kam, H. and Pauli, J. Web Penetration Testing: Effectiveness of Student Learning in Web Application Security. In Proceedings of the 2011 IEEE Frontiers in Education (FIE) (Rapid City, SD, October, 2011). IEEE, Rapid City,2011. [6] Zhan, J. and Fang, X. A Computational Trust Framework for Social Computing (A Position Paper for Panel Discussion on Social Computing Foundations). IEEE, City, 2010.
[7] Teng-Kai, Y., Lee, D. T., Shih-Ming, C. and Zhan, J. Multi-party k-Means Clustering with Privacy Consideration. In Proceedings of the 2010 International Symposium on Parallel and Distributed Processing with Applications (ISPA) (6-9 Sept. 2010, 2010),2010. [8] Podhradsky, A., Engebretson, P., Pauli, J. and Streff, K. A Restructured Information Technology Risk Assessment Model for Small and Medium-sized Financial Institutions. In Proceedings of the 11th Annual Hawaii International Conference on Business (Honolulu, HI, USA, May, 2010),2010.
[9] Pauli, J. and Engebretson, P. Cradle-To-Grave Approach to Retaining Students in Information Security Programs. In Proceedings of the 2010 International Conference on Security and Management (SAM'10) (Las Vegas, NV, USA, July, 2010),2010. [10] Duan, Y., Canny, J. and Zhan, J. P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. In Proceedings of the 19 USENIX Security Symposium (Washington, DC, MD, USA, August, 2010),2010.
Presentations
[1] Streff, K. Commercializing Technology Research. Presentation to Drexel University, (Philadelphia, PA, USA, April 18, 2011),2011 [2]Streff, K. Cybercrime and Data Protection: Perspectives from the National Center for the Protection of the Financial Infrastructure. Presentation to Federal Reserve Bank, (Washington, DC, USA, August, 2011),2011.
[3] Author, Cybersecurity and Data Protection in the Financial Sector, Banking, Housing, and Urban Affairs, Washington, DC, MD, USA, US Senate,Library of Congress (July 21 2011) [4] Streff, K. Enterprise Risk Management in Banking. Presentation to Minnesota Bankers Association, Financial Managers Conference, (November, 2011),2011
[5]Streff, K. An Overview of Mobile Banking Threats, The Macro Effects of Mobile Money in Mobile Transactions and Electronic Payments. Presentation to Columbia University, (Columbia, NY, USA, April 2, 2010),2010.  
7. IA Graduate-level Production
Enrollment Letter SRI Support Letter
Below, please find evidence of 3 Masters and 3 Doctoral students in the area of IA:
Masters Thesis Evidence: [1] Gao, P. Survey of security in ecommerce. MS, Dakota State University, Madison, SD USA, 2008
[2] Katamaneni, S. Web banking. Dakota State University, Madison, SD USA, 2010
[3] Seshadri, R. Securing data through encryption. MS, Dakota State University, Madison, SD USA, 2007
Doctoral Dissertation Evidence: [1] Engebretson, P. H. A Hierarchical Approach for Useable and Consistent CAPEC-based Attack Patterns. Dakota State University, Madison, SD USA, 2008
[2] Lovaas, P. A Holistic Information Technology Audit Framework for Small-and-Medium-Sized Financial Institutions. Dakota State University, Madison, SD, USA, 2009
[3] Podhradsky, A. L. An Innovative Approach to Information Technology Risk Assessment for Small-and Medium-sized Financial Institutions. Dakota State University, Madison, SD USA, 2010
Examples of IA graduate student peer reviewed papers: [1] Thomas, L., Weifeng, X. and Dianxiang, X. Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing. In Proceedings of the Computer Software and Applications Conference Workshops (COMPSACW), 2011 IEEE 35th Annual (Munich, Germany, 18-22 July 2011, 2011),2011.
[2] Woodraska, D., Sanford, M. and Xu, D. Security mutation testing of the FileZilla FTP server. ACM, City, 2011.
[3] Sanford, M., Woodraska, D. and Xu, D. Security Analysis of FileZilla Server Using Threat Models. In Proceedings of the 23rd International Conf. on Software Engineering and Knowledge Engineering (SEKE'11) (Miami, FL, USA, July, 2011),2011
8. IA Research Funding
Ethical Hacking - 08/07 NSF Collaboration Research - 08/07
DoD Capacity Building - 08/07 Upper Midwest IA Faculty Development - 08/08
NSF REU IA and Security Program - 03/10 Healthcare Security (CAHIT) - 03/10
Privacy Preserving in Banking - 09/10 IA Scholarship to Promote Research 1 - 02/11
IA Scholarship to Promote Research 2 - 09/11  
TopicFunding Agency
National Center for the Protection of the Financial Infrastructure State of South Dakota, Governor's Office of Economic Development
National Science Foundation - Scholarship for Service (NSF-SFS) grant titled "Dakota Defenders Information Assurance Scholarship Program". [awarded NSF award DUE-1026114] NSF
Department of Defense Information Assurance Scholarship Program (DoD IASP) grant. DoD IASP
Acquisition of Equipment to Establish Information Assurance Infrastructure for Research and Education NSF
MRI National Science Foundation grant titled "MRI: Acquisition of an Online Banking System for Information Assurance Research". [awarded NSF award CNS-1123220] NSF
Mobile Banking Research: National Science Foundation grant titled "Online Banking Systems Security Research". [awarded NSF award DUE-1153336] DHS through NSF
Chenega Post-Doc Researcher State of South Dakota, Competitive Research Fund
Chenega Post-Doc Researcher Chenega
National Science Foundation - Research Experience for Undergraduates titled "REU Site: Information Assurance and Security". [awarded NSF award CNS-1004843] NSF

Last Updated: 9/26/12