MARK STAMP
mark.stamp@sjsu.edu
Department of Computer Science
San Jose State University
One Washington Square
San Jose, California  95192

Education

PhD    Mathematics Texas Tech University 1/89–5/92
Lubbock, Texas
MS Mathematics Texas Tech University 8/86–8/88
Lubbock, Texas
BS Computer Science    Morningside College 8/79–5/83
Sioux City, Iowa
High School Harlan Community High School    8/75–5/79
Harlan, Iowa


Employment



Personal Data



Recent Academic Journal Referee Experience



Publications

  1. A CNN-HMM hybrid model for malware classification, with R. Mehta (student), in preparation.

  2. Social media bot detection using Dropout-GAN, with A. Shukla (student) and M. Jureček, submitted.

  3. On the steganographic capacity of selected learning models, with R. Agrawal (student), K. Jou (student), T. Obili (student), D. Parikh (student), S. Prajapati (student), Y. Seth (student), C. Sridhar (student), N. Zhang (student), submitted.

  4. A comparison of adversarial malware generators, with P. Louthánová, M. Kozák, M. Jureček, and F. Di Troia, to appear in Journal of Computer Virology and Hacking Techniques.

  5. Classification and online clustering of zero-day malware, with O. Jurečková, M. Jureček, F. Di Troia, and R. Lórencz, Journal of Computer Virology and Hacking Techniques, February 2024.

  6. Creating valid adversarial examples of malware, with M. Kozák, M. Jureček, and F. Di Troia, submitted.

  7. A natural language processing approach to malware classification, with R. Mehta (student), and O. Jurečková, to appear in Journal of Computer Virology and Hacking Techniques.

  8. Steganographic capacity of deep learning models, with L. Zhang (student), D. Li, and O. Jurečková, submitted.

  9. Concept drift detection in Android malware, with I. Singh (student), in preparation.

  10. Classifying World War II era ciphers with machine learning, with B. Dalton (student), to appear in Cryptologia.

  11. Keystroke dynamics for user identification, with A. Sharma (student) and M. Jureček, to appear in Journal of Experimental & Theoretical Artificial Intelligence.

  12. A comparison of graph neural networks for malware classification, with V. Malhotra (student) and K. Potika, Journal of Computer Virology and Hacking Techniques, 20:53–69, March 2024.

  13. An empirical analysis of the shift and scale parameters in BatchNorm, with Y. Peerthum (student), Information Sciences, 637:118951, August 2023.

  14. Predicting pedestrian crosswalk behavior using convolutional neural networks, with E. Liang (student), Traffic Injury Prevention, 24(4):338–343, March 2023.

  15. Robustness of image-based malware analysis, with K. Tran (student) and F. Di Troia, 3rd International Silicon Valley Cybersecurity Conference, online, August 17–22, 2022.

  16. Darknet traffic classification and adversarial attacks, with N. Rust-Nguyen (student) and S. Sharma (student), Computers & Security, 127:103098, April 2023.

  17. Generative adversarial networks and image-based malware classification, with H. Nguyen (student), F. Di Troia, and G. Ishigaki, Journal of Computer Virology and Hacking Techniques, 19:579–595, November 2023.

  18. Hidden Markov models with momentum, with A. Miller (student) and F. Di Troia, submitted.

  19. Introduction to Machine Learning with Applications in Information Security, 2nd edition, Chapman and Hall/CRC, October 2022.

  20. Malware classification with Word2Vec, HMM2Vec, BERT, and ELMo, with A. S. Kale (student), V. Pandya (student), and F. Di Troia, Journal of Computer Virology and Hacking Techniques, 19:1–16, March 2023.

  21. Artificial Intelligence for Cybersecurity, editor, with C. A. Visaggio, F. Mercaldo, and F. Di Troia, Springer, 2022.

  22. Evaluating deep learning models and adversarial attacks on accelerometer-based gesture authentication, with E. Huang (student) and F. Di Troia, in Artificial Intelligence for Cybersecurity, Springer, 2022.

  23. Clickbait detection in YouTube videos, with R. Gothankar (student) and F. Di Troia, in Artificial Intelligence for Cybersecurity, Springer, 2022.

  24. Computer-aided diagnosis of low grade endometrial stromal sarcoma (LGESS), with X. Yang (student), Computers in Biology and Medicine, 138:104874, November 2021.

  25. Machine learning for malware evolution detection, with L. S. Tupadha (student), in Artificial Intelligence for Cybersecurity, Springer, 2022.

  26. Auxiliary-classifier GAN for malware analysis, with R. Nagaraju (student), in Artificial Intelligence for Cybersecurity, Springer, 2022.

  27. Machine learning-based analysis of free-text keystroke dynamics, with H.-C. Chang (student) and J. Li (student), in Artificial Intelligence for Cybersecurity, Springer, 2022.

  28. Free-text keystroke dynamics for user authentication, with J. Li (student) and H.-C. Chang (student), in Artificial Intelligence for Cybersecurity, Springer, 2022.

  29. Machine learning and deep learning for fixed-text keystroke dynamics, with H.-C. Chang (student), J. Li (student), and C.-S. Wu, in Artificial Intelligence for Cybersecurity, Springer, 2022.

  30. Information Security: Principles and Practice, 3rd edition, Wiley, September 2021.

  31. A new dataset for smartphone gesture-based authentication, with E. Huang (student), F. Di Troia, and P. Sundaravaradhan (student), 5th International Workshop on Formal Methods for Security Engineering (ForSE 2021), in conjunction with the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), online, February 11–13, 2021.

  32. Malware classification with GMM-HMM models, with J. Zhao (student) and S. Basole, 5th International Workshop on Formal Methods for Security Engineering (ForSE 2021), in conjunction with the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), online, February 11–13, 2021.

  33. Malware classification using long short-term memory models, with D. Dang (student) and F. Di Troia, 5th International Workshop on Formal Methods for Security Engineering (ForSE 2021), in conjunction with the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), online, February 11–13, 2021.

  34. Malware classification with word embedding features, with A. Kale (student) and F. Di Troia, 5th International Workshop on Formal Methods for Security Engineering (ForSE 2021), in conjunction with the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021), online, February 11–13, 2021.

  35. Universal adversarial perturbations and image spam classifiers, with A. Phung (student), in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  36. Cluster analysis of malware family relationships, with S. Basole (student), in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  37. Word embedding techniques for malware evolution detection, with S. Paul (student), in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  38. A comparison of Word2Vec, HMM2Vec, and PCA2Vec for malware classification, with A. Chandak (student) and W. Lee, in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  39. An empirical analysis of image-based learning techniques for malware classification, with P. Prajapati (student), in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  40. Sentiment analysis for troll detection on Weibo, with Z. Jiang (student) and F. Di Troia, in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  41. A selective survey of deep learning techniques and their application to malware analysis, in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  42. On ensemble learning, with A. Chandak (student), G. Wong (student), and A. Ye (student), in Malware Analysis using Artificial Intelligence and Deep Learning, Springer, January 2021.

  43. Convolutional neural networks and extreme learning machines for malware classification, with M. Jain (student) and W. Andreopoulos, Journal of Computer Virology and Hacking Techniques, 16:229–244, September 2020.

  44. Malware Analysis using Artificial Intelligence and Deep Learning, editor, with M. Alazab and A. Shalaginov, Springer, January 2021.

  45. Detecting malware evolution using support vector machines, with M. Wadkar (student) and F. Di Troia, Expert Systems with Applications, 143:113022, April 2020.

  46. Convolutional neural networks for image spam detection, with T. Sharmin (student), F. Di Troia, and K. Potika, Information Security Journal: A Global Perspective 29(3):103–117, January 2020.

  47. Multifamily malware models, with S. Basole (student) and F. Di Troia, Journal of Computer Virology and Hacking Techniques, 16:79–92, March 2020.

  48. Emulation vs instrumentation for Android malware detection, with A. Sinha (student), F. Di Troia, and P. Heller, Digital Forensic Investigation of Internet of Things (IoT) Devices, R. Montasari, H. Jahankhani, R. Hill, and S. Parkinson, editors, Springer 2019.

  49. Intrusion detection and CAN vehicle networks, with A. Saber (student) and F. Di Troia, Digital Forensic Investigation of Internet of Things (IoT) Devices, R. Montasari, H. Jahankhani, R. Hill, and S. Parkinson, editors, Springer 2019.

  50. A comparative analysis of Android malware, with N. Chavan (student) and F. Di Troia, 3rd International Workshop on Formal Methods for Security Engineering (ForSE 2019), in conjunction with the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019), Prague, Czech Republic, February 23–25, 2019.

  51. Transfer learning for image-based malware classification, with N. Bhodia (student), P. Prajapati (student), and F. Di Troia, 3rd International Workshop on Formal Methods for Security Engineering (ForSE 2019), in conjunction with the 5th International Conference on Information Systems Security and Privacy (ICISSP 2019), Prague, Czech Republic, February 23–25, 2019.

  52. A dynamic heuristic method for detecting malware using naïve Bayes, with E. M. Alkhateeb, IEEE International Conference on Electrical and Computing Technologies and Applications (ICECTA 2019), American University of Ras Al Khaimah, Ras Al Khaimah, UAE, November 19–21, 2019.

  53. Feature analysis of encrypted malicious traffic, with A. S. Shekhawat (student) and F. Di Troia, Expert Systems with Applications, 125:130–141, July 2019.

  54. An analysis of Android adware, with S. Suresh (student), F. Di Troia, and K. Potika, Journal of Computer Virology and Hacking Techniques, 15(3):147–160, September 2019.

  55. Hidden Markov models with random restarts vs boosting for malware detection, with A. Raghavan (student) and F. Di Troia, Journal of Computer Virology and Hacking Techniques, 15(2):97–107, June 2019.

  56. Robust hashing for image-based malware classification, with W.-C. Huang (student) and F. Di Troia, International Workshop on Behavioral Analysis for System Security (BASS 2018), in conjunction with the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018), Porto, Portugal, July 26–28, 2018.

  57. A survey of machine learning algorithms and their application in information security, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach, S. Parkinson, A. Crampton, and R. Hill, editors, Springer 2018.

  58. Function call graphs versus machine learning for malware detection, with D. Rajeswaran (student), F. Di Troia, and T. H. Austin, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach, S. Parkinson, A. Crampton, and R. Hill, editors, Springer 2018.

  59. Detecting encrypted and polymorphic malware using hidden Markov models, with D. Dhanasekar (student), F. Di Troia, and K. Potika, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach, S. Parkinson, A. Crampton, and R. Hill, editors, Springer 2018.

  60. Masquerade detection on mobile devices, with S. N. K. Manikoth (student) and F. Di Troia, Guide to Vulnerability Analysis for Computer Networks and Systems: An Artificial Intelligence Approach, S. Parkinson, A. Crampton, and R. Hill, editors, Springer 2018.

  61. On the effectiveness of generic malware models, with N. Bagga (student) and F. Di Troia, International Workshop on Behavioral Analysis for System Security (BASS 2018), in conjunction with the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018), Porto, Portugal, July 26–28, 2018.

  62. Hidden Markov models for Vigenère cryptanalysis, with F. Di Troia, M. Stamp (student), and J. Huang (student), International Conference on Historical Cryptology (HistoCrypt 2018), Uppsala, Sweden, June 18–20, 2018.

  63. A comparison of machine learning classifiers for acoustic gait analysis, with F. Di Troia and J. Huang (student), 2018 International Conference on Security & Management (SAM'18), July 30–August 2, 2018.

  64. Bootbandit: A macOS bootloader attack, with A. Boursalian (student), Engineering Reports, 1(1):e12032, August 2019.

  65. Acoustic gait analysis using support vector machines, with J. Huang (student), and F. Di Troia, 2nd International Workshop on Formal Methods for Security Engineering (ForSE 2018), in conjunction with the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, Madeira, Portugal, January 22–24, 2018.

  66. Black box analysis of Android malware detectors, with G. Nellaivadivelu (student), and F. Di Troia, Array, 6:100022, July 2020.

  67. Deep learning versus gist descriptors for image-based malware classification, with S. Yajamanam (student), V. R. S. Selvin (student), and F. Di Troia, 2nd International Workshop on Formal Methods for Security Engineering (ForSE 2018), in conjunction with the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, Madeira, Portugal, January 22–24, 2018.

  68. Autocorrelation analysis of financial botnet traffic, with P. Nagarajan (student), F. Di Troia, and T. H. Austin, 2nd International Workshop on Formal Methods for Security Engineering (ForSE 2018), in conjunction with the 4th International Conference on Information Systems Security and Privacy (ICISSP 2018), Funchal, Madeira, Portugal, January 22–24, 2018.

  69. Support vector machines for image spam analysis, with A. Chavda (student), K. Potika, and F. Di Troia, International Workshop on Behavioral Analysis for System Security (BASS 2018), in conjunction with the 15th International Joint Conference on e-Business and Telecommunications (ICETE 2018), Porto, Portugal, July 26–28, 2018.

  70. Introduction to Machine Learning with Applications in Information Security, Chapman and Hall/CRC, August 2017.

  71. Virtual values for taint and information flow analysis, with P. Kannan, T. H. Austin, T. Disney, and C. Flanagan, Workshop on Meta-Programming Techniques and Reflection (META 2016), co-located with ACM SPLASH 2016, October 30–November 4, 2016, Amsterdam.

  72. Static and dynamic analysis of Android malware, with A. Kapratwar (student) and F. Di Troia, 1st International Workshop on Formal Methods for Security Engineering (ForSE 2017), in conjunction with the 3rd International Conference on Information Systems Security and Privacy (ICISSP 2017), Porto, Portugal, February 19–21, 2017, in Proceedings of the 3rd International Conference on Information Systems Security and Privacy.

  73. Image spam analysis and detection, with A. Annadatha (student), Journal of Computer Virology and Hacking Techniques, 14(1):39–52, February 2018.

  74. Vigenère scores for malware detection, with S. Deshmukh (student) and F. Di Troia, Journal of Computer Virology and Hacking Techniques, 14(2):157–165, May 2018.

  75. Advanced Transcriptase for JavaScript malware, with F. Di Troia, C. A. Visaggio, and T. H. Austin, MALCON 2016, Fajardo, Puerto Rico, October 18–21, 2016.

  76. A completely covert audio channel in Android, with S. Thakur (student), Journal of Computer Virology and Hacking Techniques, 13(3):141–152, August 2017.

  77. A comparison of static, dynamic, and hybrid analysis for malware detection, with A. Damodaran (student), F. Di Troia, C. A. Visaggio, and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 13(1):1–12, February 2017.

  78. Support vector machines and malware detection, with T. Singh (student), F. Di Troia, C. A. Visaggio, and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 12(4):203–212, November 2016.

  79. Malware detection using dynamic birthmarks, with S. Vemparala (student), F. Di Troia, C. A. Visaggio, and T. H. Austin, 2nd International Workshop on Security & Privacy Analytics (IWSPA 2016), co-located with ACM CODASPY 2016, March 9–11, 2016.

  80. Clustering versus SVM for malware detection, with U. Narra (student), F. Di Troia, C. A. Visaggio, and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 12(4):213–224, November 2016.

  81. Clustering for malware classification, with S. Pai (student), F. Di Troia, C. A. Visaggio, and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 13(4):95–107, May 2017.

  82. Static analysis of malicious Java applets, N. Ganesh (student), F. Di Troia, C. A. Visaggio, and T. H. Austin, 2nd International Workshop on Security & Privacy Analytics (IWSPA 2016), co-located with ACM CODASPY 2016, March 9–11, 2016.

  83. SocioBot: A Twitter-based botnet, with I. Kaur Makkar (student), F. Di Troia, C. A. Visaggio, and T. H. Austin, International Journal of Security and Networks, 12(1):1–12, 2017.

  84. Classic cryptanalysis using hidden Markov models, with R. Vobbilisetty (student), F. Di Troia, R. M. Low, and C. A. Visaggio, Cryptologia, 41(1):1–28, 2017.

  85. Dueling hidden Markov models for virus analysis, with A. Kalbhor (student), T. H. Austin, E. Filiol, and S. Josse, Journal of Computer Virology and Hacking Techniques, 11(2):103–118, May 2015.

  86. Automating NFC message sending for good and evil, with N. B. Brandt (student), Journal of Computer Virology and Hacking Techniques, 10(4):273–297, November 2014.

  87. Hunting for metamorphic JavaScript malware, with M. Musale (student) and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 11(2):89–102, May 2015.

  88. Hunting for pirated software using metamorphic analysis, with H. Rana (student), Information Security Journal: A Global Perspective, 23(3):68–85, November 2014.

  89. Metamorphic detection using function call graph analysis, with P. Deshpande (student), MIS Review: An International Journal, 21(1/2):15–34, September 2015/March 2016.

  90. Singular value decomposition and metamorphic detection, with R. K. Jidigam (student) and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 11(4):203–216, 2015.

  91. Compression-based analysis of metamorphic malware, with J. Lee (student) and T. H. Austin, International Journal of Security and Networks, 10(2):124–136, 2015.

  92. Hidden Markov models for malware classification, with C. Annachhatre (student) and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 11(2):59–73, May 2015.

  93. Deriving common malware behavior through graph clustering, with Y. Park and D. S. Reeves, Computers & Security, 39(B):419–430, November 2013.

  94. Masquerade detection for GUI-based Windows systems, with A. Agrawal (student), International Journal of Security and Networks, 10(1):32–41, 2015

  95. Kullback-Leibler divergence for masquerade detection, with G. R. Viswanathan (student) and R. M. Low, Journal of Network and Information Security, 1(1):44–53, June 2013.

  96. Metamorphic code from LLVM bytecode, with T. Tamboli (student) and T. H. Austin, Journal of Computer Virology and Hacking Techniques, 10(3):177–187, August 2014.

  97. HTTP attack detection using n-gram analysis, with A. Oza (student), K. Ross (student), and R. M. Low, Computers & Security, 45:242–254, September 2014.

  98. Eigenvalue analysis for metamorphic detection, with S. Deshpande (student) and Y. Park, Journal of Computer Virology and Hacking Techniques, 10(1):53–65, February 2014.

  99. Simple substitution distance and metamorphic detection, with G. Shanmugam (student) and R. M. Low, Journal of Computer Virology and Hacking Techniques, 9(3):159–170, August 2013.

  100. Structural entropy and metamorphic malware, with D. Baysa (student) and R. M. Low, Journal of Computer Virology and Hacking Techniques, 9(4):179–192, November 2013.

  101. Social networking for botnet command and control, with A. Singh (student), A. H. Toderici (student), and K. Ross, International Journal of Computer Network and Information Security, 5(6):11–17, May 2013.

  102. Java design pattern obfuscation, with P. K. Gone (student), Proceedings of the 2013 International Conference on Security & Management (SAM'13), July 22–25, 2013.

  103. Chi-squared distance and metamorphic virus detection, with A. H. Toderici (student), Journal of Computer Virology and Hacking Techniques, 9(1):1–14, February 2013.

  104. Cryptanalysis of Typex, with K. Chang (student) and R. M. Low, Cryptologia, 38(2):116–132, 2014.

  105. Metamorphic worm that carries its own morphing engine, with S. M. Sridhara (student), Journal of Computer Virology and Hacking Techniques, 9(2):49–58, May 2013.

  106. Hidden Markov models for software piracy detection, with S. Kazi (student), Information Security Journal: A Global Perspective, 22(3):140–149, 2013.

  107. Exploring hidden Markov models for virus analysis: A semantic approach, with T. H. Austin, E. Filiol, and S. Josse, Proceedings of 46th Hawaii International Conference on System Sciences (HICSS 46), January 7–10, 2013.

  108. Efficient cryptanalysis of homophonic substitution ciphers, with A. Dhavare (student) and R. M. Low, Cryptologia, 37(3):250–281, 2013.

  109. Opcode graph similarity and metamorphic detection, with N. Runwal (student) and R. M. Low, Journal in Computer Virology, 8(1-2):37–52, May 2012.

  110. Software similarity and metamorphic detection, with M. Mungale (student), in Proceedings of 2012 International Conference on Security & Management (SAM '12).

  111. Masquerade detection using profile hidden Markov models, with L. Huang (student), Computers & Security, 30(8):732–747, November 2011.

  112. Information Security: Principles and Practice, 2nd edition, Wiley, May 2011, ISBN: 978-0-470-62639-9.

  113. Improved software activation using multithreading, with J. Zhang (student), International Journal of Computer Network and Information Security, 4(12):1–17, November 2012.

  114. Hunting for undetectable metamorphic viruses, with D. Lin (student), Journal in Computer Virology, 7(3):201–214, August 2011.

  115. Detecting undetectable metamorphic viruses, with S. Venkatachalam (student), Proceedings of 2011 International Conference on Security & Management (SAM '11), pp. 340–345.

  116. A highly metamorphic virus generator, with P. Desai (student), International Journal of Multimedia Intelligence and Security, 1(4):402–427, 2010.

  117. iPhone security analysis, with V. Pandya (student), Journal of Information Security, 1(2):73–86, October 2010.

  118. Handbook of Information and Communication Security, editor, with P. Stavroulakis, Springer, March 2010, ISBN: 978-3-642-04116-7.

  119. Software reverse engineering, with T. Cipresso (student), in Handbook of Information and Communication Security, Springer, March 2010.

  120. QuickPay online payment protocol, with J. Dai (student), Proceedings of SEKE '08.

  121. Profile hidden Markov models and metamorphic virus detection, with S. Attaluri (student) and S. McGhee (student), Journal in Computer Virology, 5(2):151–169, May 2009.

  122. Digital rights management for streaming media, with D. Brahmbhatt (student), Handbook of Research on Secure Multimedia Distribution, IGI Global, March 2009, ISBN: 978-1-60566-262-6.

  123. Digital rights management for untrusted peer-to-peer networks, with P. Priyadarshini (student), Handbook of Research on Secure Multimedia Distribution, IGI Global, March 2009, ISBN: 978-1-60566-262-6.

  124. An agent-based privacy enhancing model, with H.-H. Lee (student), Information Management & Computer Security, 16(3):305–319, 2008.

  125. P2PTunes: A peer-to-peer digital rights management system, with R. Venkataramu (student), Handbook of Research on Secure Multimedia Distribution, IGI Global, March 2009, ISBN: 978-1-60566-262-6.

  126. SIGABA: Cryptanalysis of the full keyspace, with W. O. Chan (student), Cryptologia, 31(3):201–222, July 2007.

  127. P3P privacy enhancing agent, with H.-H. Lee (student), Proceedings of the 3rd ACM Workshop on Secure Web Services (SWS'06), Alexandria, Virginia, November 3, 2006, pp. 109–110.

  128. Hunting for metamorphic engines, with W. Wong (student), Journal in Computer Virology, 2(3):211–229, December 2006.

  129. Applied Cryptanalysis: Breaking Ciphers in the Real World, with R. M. Low, Wiley-IEEE Press, April 2007, ISBN: 978-0-470-11486-5.

  130. King and rook vs. king on a quarter-infinite board, with R. M. Low, Integers: The Electronic Journal of Combinatorial Number Theory, 6:Article G3, 2006.

  131. Information theory, with D. Blockus, invited book chapter, The Handbook of Computer Networks, H. Bidgoli, editor, John Wiley & Sons, Inc., November 2007, ISBN: 978-0-471-64833-8.

  132. Role based access control and the JXTA peer-to-peer framework, with A. Mathur (student) and S. Kim, Proceedings of 2006 International Conference on Security & Management (SAM '06), Las Vegas, Nevada, June 26–29, 2006.

  133. Metamorphic software for buffer overflow mitigation, with X. Gao (student), Proceedings of 3rd Conference on Computer Science and its Applications, P. P. Dey and M. N. Amin, editors, San Diego, California, June 28–30, 2005.

  134. On using mouse movements as a biometric, with S. Hashia (student) and C. Pollett, Proceedings of 3rd Conference on Computer Science and its Applications, P. P. Dey and M. N. Amin, editors, San Diego, California, June 28–30, 2005.

  135. Stealthy ciphertext, with M. Simova (student) and C. Pollett, Proceedings of 3rd International Conference on Internet Computing (ICOMP '05), Las Vegas, Nevada, June 27–30, 2005.

  136. Unpredictable binary strings, with R. M. Low, R. Craigen, and G. Faucher, Congressus Numerantium 177, 2005, pp. 65–75, MR2198651.

  137. Information Security: Principles and Practice, Wiley Interscience, September 2005, ISBN: 0-471-73848-4.

  138. Software watermarking via assembly code transformations, with S. Thaker (student), Proceedings of 2nd Conference on Computer Science and its Applications, P. P. Dey, M. N. Amin, and T. M. Gatton, editors, San Diego, California, June 2004, pp. 205–209.

  139. Hamptonese and hidden Markov models, with E. Le (student), Lecture Notes in Control and Information Sciences, Vol. 321, New Directions and Applications in Control Theory, Springer 2005, W. P. Dayawansa, A. Lindquist, and Y. Zhou, editors, pp. 367–378.

  140. Enterprise digital rights management: Ready for primetime?, with E. J. Sebes, Business Communications Review, March 2004, pp. 52–55.

  141. Risks of monoculture, Inside Risks 165, Communications of the ACM, 47(3):120, March 2004.

  142. Multilevel security models, with A. Hushyar (student), invited chapter, The Handbook of Information Security, H. Bidgoli, editor, John Wiley & Sons, Inc., January 2006, ISBN: 0-471-64833-7.

  143. A characterization of a class of discrete nonlinear feedback systems, with D. I. Wallace, and C. F. Martin, Communications in Information and Systems, 5(3):305–310, 2005.

  144. Solvable problems in enterprise digital rights management, with E. J. Sebes, Information Management & Computer Security, 15(1):33–45, 2007.

  145. Secure streaming media and digital rights management, with D. Holankar (student), Proceedings of the 2004 Hawaii International Conference on Computer Science, Honolulu, Hawaii, January 2004, pp. 85–97.

  146. Digital rights management: For better or for worse?, ExtremeTech, May 20, 2003. Also appeared on eWEEK, May 1, 2003.

  147. The MediaSnap® digital rights management system, with P. Sabadra (student), Proceedings of Conference on Computer Science and its Applications, P. P. Dey, M. N. Amin, and T. M. Gatton, editors, San Diego, California, July 2003.

  148. Software uniqueness: How and why, with P. Mishra (student), Proceedings of Conference on Computer Science and its Applications, P. P. Dey, M. N. Amin, and T. M. Gatton, editors, San Diego, California, July 2003.

  149. Pokémon® cards and the shortest common superstring, with A. E Stamp, Graph Theory Notes of New York, XLVII:19–24, 2004, MR2134214.

  150. Risks of digital rights management, Inside Risks 147, Communications of the ACM, 45(9):120, September 2002.

  151. Digital rights management: The technology behind the hype, Journal of Electronic Commerce Research, 4(3):102–112, 2003.

  152. NSA paper, A stroll through WOK THROUGH, status unknown.

  153. Rush Hour® and Dijkstra's algorithm, with B. Engel (student), M. Ewell (student), and V. Morrow (student), Graph Theory Notes of New York XL:23–30, 2001, MR1823243.

  154. NSA paper, Let me count the ways..., status unknown.

  155. NSA paper, Hitchhiker's guide to dynamic programming, status unknown.

  156. NSA paper, STA PUF is no marshmallow, status unknown.

  157. Random walks on wheels, with M. Lee (student), Graph Theory Notes of New York XXXIII, 1997, pp. 24–25.

  158. NSA paper R51/TECH/038/93, S-243,676, November 1996: Title and subject classified.

  159. NSA paper Z52 TSR-007-95, August 1995: Title and subject classified.

  160. NSA paper Z21 TSR-21-94, December 1994: Title and subject classified.

  161. NSA paper Z52 ITN-004-94, February 1994: Title and subject classified.

  162. A model for the optimal control of a measles epidemic, with C. F. Martin, L. Allen, M. Jones, and R. Carpio, Computation and Control III: Proceedings of the Third Bozeman Conference, Progress in Systems and Control Theory, Vol. 15, K. Bowers and J. Lund, editors, Boston: Birkhäuser, 1993, MR1247482.

  163. Urn model simulations of a sexually transmitted disease epidemic, with C. F. Martin, and L. J. S. Allen, Applied Mathematics and Computation, 71:179–199, 1995.

  164. Pseudo-random sequences in secret key cryptography, with C. F. Martin, Proceedings of the 1992 International Computer Symposium, Vol. 1, Feng Chia University, Taichung, Taiwan, 1992, pp. 166–173.

  165. Stochastic analysis of vaccination strategies, with L. Allen, T. Lewis, C. Martin, R. Carpio, M. Jones, G. Mundel, and A. Way, Stochastic Theory and Adaptive Control, Proceedings of a workshop held in Lawrence, Kansas, September 26–28, 1991, Lecture Notes in Control and Information Sciences 184, T. E. Duncan and B. Pasik-Duncan, editors, Springer-Verlag, 1992, pp. 1–11.

  166. An analysis of the transmission of Chlamydia in a closed population, with C. F. Martin and L. J. S. Allen, Journal of Difference Equations and Applications, 2(1):1–29, 1996, MR1375593.

  167. An algorithm for the k-error linear complexity of binary sequences with period 2n, with C. F. Martin, IEEE Transactions on Information Theory, 39(4):1398–1401, July 1993, MR1267161.

  168. Gaussian quadrature and linear systems, with C. F. Martin, Computation and Control II: Proceedings of the Second Bozeman Conference, Progress in Systems and Control Theory, Vol. 11, K. Bowers and J. Lund, editors, Boston: Birkhäuser, 1991, pp. 263–277, MR1140027.

  169. Analysis of a measles epidemic, with L. J. S. Allen, T. Lewis, C. F. Martin, G. Mundel, A. B. Way, C. K. Lo, and M. A. Jones, Statistics in Medicine, 12:229–239, 1993.

  170. A note on the error in Gaussian quadrature, with C. F. Martin, Applied Mathematics and Computation, 47:25–35, 1992, MR1137059.

  171. A generalized linear complexity, Ph.D. dissertation, Department of Mathematics, Texas Tech University, May 1992.

  172. Analysis of infinite dimensional dynamic systems with nonlinear observation over a finite field, with C. F. Martin, Modeling, Estimation and Control of Systems with Uncertainty, Progress in Systems and Control Theory, Vol. 10, G. B. DiMasi, A. Gombani, and A. B. Kurzhansky, editors, Boston: Birkhäuser, 1991, pp. 301–323, MR1133379.

  173. Discrete observability and numerical quadrature, with C. F. Martin and X. Wang, IEEE Transacations on Automatic Control, 36(11):1337–1340, November 1991, MR1130511.

  174. Mathematical analyses and simulations of a measles epidemic, with L. Allen, T. Lewis, C. Martin, M. Jones, C. Lo, G. Mundel, and A. Way Proceedings of the American Statistical Association Biometric Society-Eastern North American Region (ENAR) Spring Meeting, March 24–27, 1991, Houston, Texas.

  175. A mathematical analysis and simulation of a localized measles epidemic, with L. J. S. Allen, T. Lewis, and C. F. Martin, Applied Mathematics and Computation, 39:61–77, 1990.

  176. Classification and realization of pseudo-random number generators, with C. F. Martin, Systems and Control Letters, 14:169–175, 1990, MR1044323.

  177. Constructing polynomials over finite fields, with C. F. Martin, Computation and Control: Proceedings of the Bozeman Conference, Progress in Systems and Control Theory, Vol. 1, K. Bowers and J. Lund, editors, Boston: Birkhäuser, 1989, pp. 233–252, MR1046854.

  178. Constructing polynomials over finite fields, Master's thesis, Department of Mathematics, Texas Tech University, December 1988.


Cryptanalysis Challenge Problems

  1. Typex — Part 1, with K. Chang and R. M. Low. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  2. Typex — Part 2, with K. Chang and R. M. Low. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  3. Substitution Cipher with Non-Prefix Codes, with R. Muralidhar. Level III challenge at MysteryTwister C3: The Crypto Challenge Contest.

  4. Zodiac Cipher. Level I challenge at MysteryTwister C3: The Crypto Challenge Contest.

  5. CMEA 1. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  6. CMEA 2. Level III challenge at MysteryTwister C3: The Crypto Challenge Contest.

  7. Akelarre Part 1. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  8. Purple 1. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  9. ORYX Stream Cipher Part I. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  10. ORYX Stream Cipher Part II. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  11. ORYX Stream Cipher Part III (known keystream with unknown "L" table). Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  12. Enigma Part 1. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  13. Enigma Part 2. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  14. Sigaba Part 1. Level II challenge at MysteryTwister C3: The Crypto Challenge Contest.

  15. Sigaba Part 2. Level III challenge at MysteryTwister C3: The Crypto Challenge Contest.


Unpublished Writings

  1. Alphabet soup of deep learning topics, 2019.

  2. Deep thoughts on deep learning, 2018.

  3. Boost your knowledge of AdaBoost, 2017.

  4. Efficient cryptanalysis of homophonic substitution ciphers, 2011.

  5. A revealing introduction to hidden Markov models, 2004.

  6. Once upon a time-memory tradeoff, 2003.

  7. Pokémon® trading card sequences, with A. E Stamp, 2002.


Students



Other