Publications

Office of the University Provost
Center for Cybersecurity & Information Assurance

FDU faculty members have been involved with research or have presented publications that are in areas related to Cybersecurity and Information Assurance.

 


 

ABDELAZIM, Sameh

Sameh Abdelazim, David Santoro, Mark Arend, Fred Moshary, Sam Ahmed, “ Development of All-fiber coherent Doppler LIDAR system for wind sensing” 15th Symposium on Meteorological Observation and Instrumentation, 90th Annual AMS Meeting, Atlanta, GA (2010).

Sameh Abdelazim, David Santoro, Mark Arend, Fred Moshary, Sam Ahmed, “All-fiber Coherent Doppler LIDAR for Wind Sensing” EPP Forum-Howard University, Washington DC (2009).

Sameh Abdelazim, David Santoro, Mark Arend, Fred Moshary, Sam Ahmed, “All-fiber Coherent Doppler LIDAR for Wind Sensing” 15th Coherent Laser Radar Conference, Toulouse France (2009).

Mark Arend, David Santoro, Sameh Abdelazim, Fred Moshary, Sam Ahmed, “Development of a NYC Meteorological Network with emphasis on vertical wind profiles in support of meteorological and dispersion models” ”, Eighth Symposium on the Urban Environment J1.2, 89th Annual AMS Meeting, Phoenix AZ (2009).

Mark Arend, David Santoro, Sameh Abdelazim, Fred Moshary, and Sam Ahmed “Wind field measurements for the mitigation of airborne health threats in a complex urban environment” Proc. SPIE, Vol. 7306, 730603 (2009)

CASTI, Alexander

Heiberg, T., Tetzlaff, T., Einevoll, G., and Casti, A.(2012) Firing-rate models can describe the dynamics of the retina-LGN connection.Under review, Journal of Computational Neuroscience.

Trexler, B., Casti, A., and Zhang, K. (2011) Nonlinearity and noise at the rod-rod bipolar cell synapse.Vis.Neurosci.28: 61-68.

Babadi, B., Casti, A., Xiao, Y., Paninski, L. (2010) A generalized linear model of the impact of direct and indirect inputs to the lateral geniculate nucleus. Journal ofVision10:10.

Uglesich, R., Casti, A., Hayot, F., and Kaplan, E. (2009) Stimulus size dependence of information transfer from retina to thalamus. Front.Sys.Neurosci.3:10.

Casti, A., Hayot, F., Xiao, Y., and Kaplan, E. (2008). A simple model of retina-LGN transmission. J.Comp.Neurosci.24, 232-252.

Casti, A., Omurtag, A., Sornborger, A., Kaplan, E., Knight, B., Sirovich, L., and Victor, J. (2002). A population study of integrate-and-fire-or-burst neurons. Neural.Comp.14, 957-986.

Other significant publications:

Casti, A. and Trexler, B. (2011) An analysis of noise in the rabbit rod retina. Submitted to J.Neurophysiol.

Xiao, Y.,Casti, A., Xiao, J., and Kaplan, E. (2007) Hue maps in primate striate cortex.Neuroimage35:771-786.

Casti, A., Xiao, Y., and Kaplan, E. (2006). How the LGN transforms retinal information. Perception35, ECVP supplement.

Casti, A., Morrison, P., and Spiegel, E. (1998) Negative energy modes and gravitational instability of interpenetrating fluids. in Nonlinear Dynamics and Chaos in Astrophysics, Annals of the NY Academy of Sciences 867: 93-108.

Balmforth, N. and Casti, A.(1998) Convection in a slowly diffusing, weakly stratified salt field. Physics Letters A 238: 35-42.

CHEN, Zong

Z. Chen, “Handgrip Recognition on Joystick”, International Journal of Latest Trends in Computing, pages 35-39, Volume 2, Issue 1, March 2011.

Z. Chen, L. Zhang, “Multi-stage Directional Median Filter”, International Journal of Signal Processing, pages 249-252, Volume 5 Number 4, 2009.

Z. Chen, “Handgrip Recognition on Joystick”, Proceedings of 2009 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2009), pages 713-717, Las Vegas, Nevada, July 2009.

Z. Chen, “Handwritten Digits Recognition”, Proceedings of 2009 International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV 2009), pages 690-693, Las Vegas, Nevada, July 2009.

Z. Chen, “Efficient Block Matching Algorithm for Motion Estimation”, International Journal of Signal Processing, pages 133-137, Volume 5 Number 2, Spring 2009.

DOHERTY, Eamon

Books

E. P. Doherty, Digital Forensics for Handheld Devices , CRC Press, ISBN 978-1-4398-9877-2, 303 pages, Published September 2012

E. P. Doherty, Tales of Cybercrime and Other Cyber Tales, Authorhouse, 2011, ISBN 9781463402044.

E.P. Doherty, et. al, (2008) Computing and Investigations for Everyone, Authorhouse, 257 pages, ISBN 978-1-4343-7231-4

E.P. Doherty, et. al, (2007) eForensics and Investigations for Everyone, Authorhouse, 253 pages, ISBN 978-1-4343-1614-1

E.P. Doherty, et. al., (2006), eForensics and Signal Intelligence for Everyone, Authorhouse, 207 pages, ISBN 978-1-4259-6861-8

E. P. Doherty and Gary Stephenson, Computer Recreation for Everyone,AuthorHouse, 2005, ISBN-13: 9781463458027. Sold by: Barnes & Noble, Format: eBook

Papers

E. P. Doherty and E. G. Doherty and E. Goei, “Using Forensic Images to Teach About White Collar Crime Online,”2014 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (July 21-24, 2014, Las Vegas, USA). Conference Proceedings, Pages 22-25, ISBN 1-60132-268-2

E. P. Doherty, “Teaching IPAD Forensics Online with a MOOC,”2014 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (July 21-24, 2014, Las Vegas, USA). Conference Proceedings, Pages35-39, ISBN 1-60132-268-2

E. P. Doherty and E. G. Doherty and E. Goei, “Moving Legacy Device Forensics to an Online Format,”2014 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (July 21-24, 2014, Las Vegas, USA). Conference Proceedings, Pages 57-63, ISBN 1-60132-268-2

E.P. Doherty,“New Challenges in Teaching e-Forensics Online, WorldComp 2013 12th International Conference on e-Learning, e-Business, Enterprise Information Systems and e-Government, July 22-25, 2013, Las Vegas, USA.

E. P. Doherty, “Teaching Mobile/GPS Forensics”, WorldComp 2012 Conference, Las Vegas, Nevada, July 16-20, 2012., Conference Proceedings ISBN 1-60132-209-7, Pages 287-291

E. P. Doherty, “Teaching Cell Phone Forensics and E-Learning”, 2011 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE'11: July 18-21, 2011, Las Vegas, Nevada, USA). Conference Proceedings, Pages 161-5, ISBN 1-60132-176-7

E. P. Doherty, “Teaching Digital Camera Forensics in a Virtual Reality Classroom,” 2011 International Conference on Computer Graphics and Virtual Reality (CGVR'11: July 18-21, 2011, Las Vegas, Nevada, USA).

E. P. Doherty and E. G. Doherty, “E-Learning, Teaching Cell Phones Usage for Emergency Managers and First Responders,”2011 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (July 18-21, 2011, Las Vegas, USA). Conference Proceedings, Pages 81-85, ISBN 1-60132-176-7

FARAG, Mark

van der Merwe, B., Farag, M., Geldenhuys, J., Counting minimal symmetric difference NFAs. Submitted.

Farag, M., (2007), Hill ciphers over near-fields. Mathematics and Computer Education 41(1), 46-54.

Cannon, G.A.; Farag, M.; Kabza, L., (2007), Centers and generalized centers of near-rings. Communications in Algebra 35(2), 443-453.

Farag, M., (2006), (F;M)-extensions of near-rings. Quaestiones Mathematicae 29(2), 135-139.

Aichinger, E.; Farag, M., (2004), On when the multiplicative center of a near-ring is a subnear-ring. Aequationes Mathematicae 68, 46-59.

Other Significant Publications

Farag, M.; van der Merwe, B., (2010) The near-ring of Lipschitz functions on a metric space. International Journal of Mathematics and Mathematical Sciences doi:10.1155/2010/284875, 14 pages.

Farag, M., (2002), Ideals in polynomial near-rings. Algebra Colloquium 9(2), 219- 232.

Birkenmeier, G.; Farag, M.; Heatherly, H., (2002), Near-ring extensions with a common ideal. Publicationes Mathematicae Debrecen 61/3-4, 603-612.

KHREISAT, Laila

L. Khreisat. “Arabic Text Classification Using N-Gram Frequency Statistics: A Comparative Study,”Proceedings of the 2006 International Conference on Data Mining (DMIN’06): June 26 - 29 2006, Las Vegas, USA.

L. Khreisat. “An Adaptive Probabilistic Reasoning Approach to Data Integration,”2005 International Conference on Data Mining (DMIN'05): June 20-23, 2005, Las Vegas, USA.

L. Khreisat, “Real Time Inference In Bayesian Networks An Anytime Approach,” International Journal of Artificial Intelligence Tools. IJAIT, Vol. 14, No. 3, June 2005.

L. Khreisat, Tarek Saadawi, “Algorithm for Anytime Probabilistic Reasoning Mobile Agent System for Network Testing,” Publications No. US-2002-0034942-A1, Publication Date: 03/21/2002

LEVINE, Gertrude

G.Levine and S.McIntosh, “Faculty mentorships for female participation in computer science”, ACM-W CIS Newsletter, December 2014.

G. Levine, “Formalizing service degradations in a security plan”, Software Summit 2014: The IEEE Computer Society International Conference SwSTE2014. June 12, 2014, Refereed Papers track in Reliability, Resilience & Security Session.

G. Levine, “Computer security with service degradations”, ACM SIGSOFT Software Engineering, Vol. 38, no. 6, Nov. 2013.

G. Levine, “Priority inversion with fungible resources”, ACM SIGAda Ada Letters, vol. 31, no. 2, August 2011, pp. 9-14.

G. Levine, “Fault tolerance with service degradations”, Crosstalk: Journal of Defense Software Engineering, vol. 31, no.2, March, April 2011, pp. 22- 24.

G. Levine, "Ada for the control of degradation of service", ACM Ada Letters, vol. 29, no.2, Aug. 2009, pp. 20-27.

G. Levine, “Defining defects, errors, and service degradations”, ACM SIGSOFT Software Engineering Notes, vol. 24, no. 2, March 2009, pp. 1-14.

G. Levine, "A model for anomalies of software engineering" CISSE 2005, International Joint Conferences on Computer, Information, and Systems Sciences, December 10-20, 2005.

G. Levine, “Ada and the control of intrusion, “ACM Ada Letters, vol 25, no. 3, September 2005, pp. 32-39.

G. Levine, “The classification of deadlock prevention and avoidance is erroneous”, Operating Systems Review, ACM Press, vol.39, no. 2, April 2005, pp. 47-50.

G. Levine, "Telephony, digital", "Computers, mainframes" entries in Encyclopedia of 20th-Century Technology, Colin A. Hempstead, Editor, Routledge, NY and London, 2004.

G. Levine, “Defining Deadlock with Fungible Resources,” ACM Operating Systems Review, ACM Press, vol. 37, no. 3, July 2003, pp. 5-11.

G. Levine, “Defining Deadlock,” Operating Systems Review, ACM Press, 37(1), pp. 54-64, January 2003.

G. Levine, “The Effect of the Internet on Women in Science and Engineering,” WEPAN, San Juan, Puerto Rico, June 9-11, 2002.

G. Levine, “Contention Control in Multi-Access Resource Systems” 2001 IEEE Conference on the History of Telecommunications. Memorial University of Newfoundland, July 25-27, 2001.

MAO, Zhiwei

Refereed Journal Publications

Z. Mao and J. Cheng, "Statistical characteristics of OFDM systems over frequency-selective Rician fading channels and its application to BER study," IEICE Trans. Commun., vol. E94-B, no. 9, pp. 2565-2573, Sept. 2011.

Z. Mao, K. Yuan, and X. M. Wang, "Second-order cone programming based joint design of OFDM systems," IEICE Trans. Commun., vol. E94-B, no. 2, pp. 508-514, Feb. 2011.

Z. Mao and X. M. Wang, "Efficient optimal and suboptimal radio resource allocation in OFDMA system,"IEEE Trans. Wireless Commun., vol. 7, no. 2, pp. 440-445, Feb. 2008.

Z. Mao,X. M. Wang, and X. F.Wang, "Semidefinite programming relaxation for multiuser detection of QAM signals,"IEEE Trans. Wireless Commun., vol. 6, no. 12, pp. 4275-4279, Dec. 2007.

X. M. Wang and Z. Mao, "Multiuser detection for MC-CDMA system using an RQP approach," IEICE Trans. Commun., vol. E88-B, no. 11, pp. 4394-4397, Nov. 2005.

Z. Mao and V. K. Bhargava, "Semi-blind linear parallel interference cancellation multiuser detectors for DS-CDMA systems," IEEE Trans. Wireless Commun., vol. 4, no. 4, pp. 1319-1324, July 2005.

Z. Mao and V. K. Bhargava, "Fast converging adaptive MMSE multiuser detector," International Journal of Wireless Personal Communications (Springer Science Business Media), vol. 32, no. 2, pp. 107-126, Jan. 2005.

Z. Mao and V. K. Bhargava, "Analysis of DS-CDMA system supporting heterogeneous traffic with decorrelating detector," IEEE Trans. Wireless Commun., vol. 3, pp. 1104-1117, July 2004.

Z. Mao and Y. Ji, "The performance comparison of pointer adjustment jitter reduction in SDH," Journal of BUPT, vol. 20, 1997.

Refereed Conference Publications

Z. Mao, J. Cheng, and J. Shen, "A new lower bound on error probability for nonuniform signals over AWGN channels," Proc. IEEE Wireless Communications and Networking Conference, Shanghai, China, April 2013.

Z. Mao and J. Cheng, "BER analysis of OFDM signals on frequency-selective Rician fading channels," Proc. Wireless Telecommunications Symposium, New York, NY, April 13-15, 2011.

X. Gao, N. Y. Yu, and Z. Mao, "Peak power control of MC-CDMA with special classes of binary sequences," accepted by IEEE Canadian Conference on Electrical and Computer Engineering, Calgary, Alberta, Canada, May, 2010.

Z. Mao, K. Yuan, and X. M. Wang, "Joint design in OFDM systems using constellation extension," Proc. IEEE Sarnoff Symposium, Princeton, New Jersey, April, 2010.

B. Zhang and Z. Mao, "BPF and MPF-based packet scheduling for AMC-based OFDMA wireless communication systems," Proc.IEEE Sarnoff Symposium, pp. 1-5, Princeton, New Jersey, March 30-April 1, 2009.

K. Yuan and Z. Mao, "Joint PAPR and PICR design in OFDM systems," Proc. IEEE Vehicular Technology Conference (VTC) Fall, Calgary, AB, Canada, Sept. 2008.

R. Wei, Z. Mao, and K. Yuan, "Aperiodic complex sequences from difference sets," Proc. IEEE International Conference on Communications (ICC), Beijing, China, May, 2008.

Z. Mao, X. M. Wang, X. F. Wang, "QAM-MIMO signal detection using semidefinite programming relaxation," Proc. IEEE Globecom, Washington, D.C., pp. 4232-4236, Nov. 2007.

Z. Mao and X. M. Wang, "Branch-and-bound approach to OFDMA radio resource allocation," Proc. IEEE Vehicular Technology Conference Fall, pp. 1-5, Montreal, QC, Canada, Sept. 2006.

J. Lin and Z. Mao, "A real-time radio resource allocation scheme in OFDMA system," Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 1757-1760, Ottawa, ON, Canada, May 2006.

X. M. Wang and Z. Mao, "A recursive quadratic programming approach to multiuser detection for MC-CDMA system with M-QAM," Proc. IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 468-471, Ottawa, ON, Canada, May 2006.

Z. Mao, X. M. Wang, and J. Lin, "Fast optimal radio resource allocation in OFDMA system based on branch-and-bound method," Proc. IEEE PacRim Conf. on Communications, Computers, and Signal Processing, pp. 348-351, Victoria, BC, Canada, Aug. 2005.

X. M. Wang and Z. Mao, "Multiuser detection for MC-CDMA system with M-QAM using SDP relaxation," Proc. IEEE PacRim Conf. on Communications, Computers, and Signal Processing, pp. 530-533, Victoria, BC, Canada, Aug. 2005.

Z. Mao and V. K. Bhargava, "Adaptive semi-blind linear parallel interference cancellation multiuser detection for DS-CDMA systems," Proc. Globecom, vol. 5, pp. 2813-2817, Dallas, TX, Nov. 2004.

Z. Mao and V. K. Bhargava, "Semi-blind linear parallel interference cancellation multiuser detectors for DS-CDMA systems," Proc. International Symposium on Information Theory and its Applications (ISITA), pp. 575-578, Xi'an, P. R. China, Oct. 2002.

Z. Mao and V. K. Bhargava, "Power allocation for DS-CDMA system supporting heterogeneous traffic with decorrelating detector," Proc. IEEE Vehicular Technology Conference Spring, vol. 2, pp. 537-541, Birmingham, AL, May 2002.

Z. Mao and V. K. Bhargava, "Fast converging blind adaptive multiuser detector," Proc. Globecom, vol. 2, pp. 772-775, San Antonio, TX, Nov. 2001.

Z. Mao and V. K. Bhargava, "Effect of imperfect channel estimation on the performance of multiuser detectors over multipath Rayleigh fading channel," Proc. 7th Canadian Workshop on Inform. Theory, pp. 134-137, Vancouver, BC, Canada, June 2001.

MONDAL, Kalyan

Mondal, “Teaching an embedded system course to electrical engineering and technology students,” Proc. ASEE Mid-Atlantic Symposium, Farmingdale State Univ, NY, Apr. 2011.

K. Mondal, “Challenges in teaching a digital signal processing course to international graduate students,” Proc.ASEE Mid-Atlantic Symposium, NJIT, New Jersey, Apr. 2007.

K. Mondal and S.K. Mitra, “Non-recursive decimation filters with arbitrary integer decimation factors,” to appear inIET Circuits, Devices & Systems, 2012.

S.K. Mitra, K. Mondal, M.K. Tchobanou and G.J. Dolecek, “General polynomial factorization-based design of sparse periodic linear arrays,”IEEE Trans. on Ultrasonics, Ferroelectrics and Frequency Control, vol. 57, no. 9, pp. 1952 – 1966, Sep. 2010.

P. Shah and K. Mondal, “Fixed WiMAX downlink spectral efficiency and throughput measurements under channel impairments,”2009 World Congress on Computer Science and Information Engineering (CSIE 09), Los Angeles, CA, pp. 394 – 398, Apr. 2009.

K. Mondal and S.K. Mitra, “Design of sparse arrays with high sidelobe rejection,” Proc.2008 IEEE Asia Pacific Conference on Circuits and Systems, Macao, China, pp. 980 – 983, Dec. 2008.

K. Mondal, J.Y. Boo, M.L. Carlomagno, O. Duardo, C.M. Gerveshi, H. Jiang, H.S. Li, H. Lim, S. Naganathan, R.A. Resuta, W.J. Santulli, C.A. Webb, H.T. Weston, G.A. Wilson, L.J. Wu, F. You, J.C. Lui, K.J. Raghunath, H. Farrokh, L.M. Pierce, M. Rambaud, E. Micca and M.P. Moturi, “A digital television demodulator IC with 256 tap equalizer,” Proc.1999 IEEE International Solid State Circuits Conference, pp. 336-337, Feb. 1999.

QIN, Li

L. Qin and V. Atluri, “Semantics-aware Security Policy Specification for the Semantic Web Data”, International Journal of Information and Computer Security, 4(1), 2010, pp. 52-75.

SHARMA, Kiron

A. Kiayias, A. Pagourtzis, K. Sharma and S. Zachos. “Acceptor-Definable Counting,” Lecture Notes in Computer Science, Heidelberg: Springer-Verlag, ISSN: 0302-9743, Vol. 2563, pp. 453 – 463, 2003.

A .Pagourtizs, K. Sharma and S. Zachos, Determining The Maximum Solution is Cook[1]-Equivalent to Counting. Advances In Informatics, World Scientific Books, ISBN: 978-981-02-4192-6, 2000.

A. Pagourtizs, K. Sharma and S. Zachos, “Tree Models and Probabilistic Polynomial Time Computations,”Australian Computer Science Communications, Springer-Verlag Vol.20-3, pp. 291-305, 1998.

C. P. Katti, K. Chopra, “On the Stability of Modified Numerov's Method for Solving a Class of Singular Two-point Boundary Value Problems,”International Journal of Computer Mathematics,, pp. 221-226, 1991.

K. Sharma, S. K. Sharma, “Capability, Progress, and Cooperative Strategies: A Framework for Sustainability,” International Journal of Global Business and Competitiveness, Vol. 4, No 1, 2009.

L. Khreisat, K. Sharma, N. Sinha, “Learner-Interface Interaction for Technology-Enhanced Active Learning,” Innovate Journal of Online Education, Vol. 5, Issue 3, 2009.

K. Sharma, S.K. Sharma, “Sustainability and Growth: A Framework for Change,” Proceedings of theGlobal Conference on Business and Finance, Vol 4, No 1, ISSN:1931-0285. 2009.

SINHA, Neelu

Articles in Refereed Journals

N. Sinha, L. Khreisat, and K. Sharma, “Learner-Interface Interaction for Technology-Enhanced Active Learning,”Innovate Journal of Online Education, Volume 5, Issue 3 Feb/Mar 2009. Available at: http://www.innovateonline.info/pdf/vol5issue3/Learner-InterfaceInteractionforTechnology-EnhancedActiveLearning.pdf

N. Sinha, “An Active Student Centered Learning (ASCL) Approach to Instruct and Assess a Software Engineering Course,” International Journal of Instructional Technology and Distance Learning, Volume 4, Number 6, ISSN 1550-6908, Jun 2007. Available online at: http://itdl.org/Journal/Jun_07/article04.htm

N. Sinha, “Writing Across the Curriculum: An Online Course in Computer Security,” Journal of Educators Online, Volume 3, Number 1, Jan 2006. Available online at: http://www.thejeo.com/Sinha Final.pdf

N. Sinha and A.J. Ferreira, “A Fast Algorithm for Computing two channel Odd Frequency Transforms with Application to Audio Coding,”TechOnLine Texas Instruments Audio and Video/Imaging Series, October 2005. Available online at: http://www.techonline.com/community/edresource/featurearticle/38782.

N. Sinha, “Secure Embedded Data Schemes for User Adaptive Multimedia Presentation,” Journal of Digital Information, Volume 6, Issue 4, Article No. 350, 2005-06-03. Available online at: http://jodi.tamu.edu/Articles/v06/i04/Sinha1/

V. Vittal, N. Sinha (Bhatia), and A. Fouad, “Analysis of Inter-Area Mode Phenomenon in Power Systems following large disturbances,” in the IEEE Transactions on Power Systems, Vol. 6, No. 4, pp 1515-1521, November 1991.

N. Sinha (Bhatia), et. al., “Incorporation of Non-Linear Load Modeling in the Transient Energy Function method,” in the IEEE Transactions on Power Systems, Vol. 4, No. 3, pp 1031-1036, August 1989.

Articles in Refereed Conference Proceedings

N. Sinha and M. Flores, “Programming the Smart Device,” 2011 NJEDge.Net Annual Conference 8.0 – Pedagogy, Methodology, Technology, November 2011. Abstract available at: http://njedge.net/conference/2011/?page_id=891

N. Sinha, Y.N. Sairam, and N. Ma, “A Novel Partial Prediction Algorithm for Fast 4x4 Intra Prediction Mode Decision in H.264/AV,” in IEEE Computer Society Press Proceedings of Data Compression Conference DCC 2008, IEEE Computer Society Order Number P3121, ISBN 0-7695-3121-0, ISSN 1068-0314, pp. 232-241, March 2008.

N. Sinha, “Design and Development of a Distance Learning Course in Computer Data Security,” in the Proceedings of IASTED International Conference on Computers and Advanced Technology in Education (CATE 2003), Rhodes, Greece, ISBN: 0-88986-361-X, pp. 391-394, June 2003.

N. Sinha, “A New Digital Rights Management Platform for Digital Images,” Proceedings of IASTED International Conference on Communications, Internet and Information Technology (CIIT 2002), St. Thomas, USA, ISBN 0-88986-327-X, pp. 444-448, Nov 2002.

N. Sinha, “Data Throughput and Robustness Studies in a Novel Digital Watermarking Technique based on Adaptive Segmentation and Space-Frequency Representation (WASSFR),” Proceedings of the IEEE Southwest Symposium on Image Analysis and Interpretation (SSIAI 2002), Santa Fe, New Mexico, ISBN 0-7695-1537-1, pp. 229-233, April, 2002.

N. Sinha, “A Novel Watermarking Technique for Digital Images based on Adaptive Segmentation and Space-Frequency Representation,” Proceedings of the IEEE 2000 International Symposium on Information Theory and its Applications (ISITA’2000), Vol. II, pp 972-975, Nov 2000.

V. Vittal, N. Sinha (Bhatia), and A. Fouad, "Analysis of the Inter-Area Mode Phenomenon in Power Systems Following Large Disturbances," Proceedings of the 1991 IEEE International Symposium on Circuits and Systems, pp. 982-985, Singapore, June 11-19, 1991.

V. Vittal, N. Sinha (Bhatia), and A. Fouad, “Investigation of Sparse Network Formulation of the Transient Energy Function Method,” (with), Proceedings of the IASTED International Symposium on High Technology in the Power Industry, Scottsdale, Arizona, pp 169-173, March 1988.

Other Conference Presentations and Industry Technical Reports (Peer-reviewed)

N. Sinha, D. Bitsack, and M. Lafranca, “Cyber Games – Fun To Play – That’s The Learning Way,” Tri-State Best Practices Conference, March 2013.

N. Sinha, et. al., “Developing Data Security Applications for Android Tablets,” Poster Presentation NJEDge.net 13thAnnual Faculty Best Practices Showcase, March 2012. Abstract available at: http://njedge.net/activities/facultyshowcase/2012/posters.php

N. Sinha and M. Flores, “Programming the Smart Device,” 2011 NJEDge.Net Annual Conference 8.0 – Pedagogy, Methodology, Technology, November 2011. Abstract available at: http://njedge.net/conference/2011/?page_id=891

N. Sinha and D. Bitsack, “Using MATLAB for Digital Signal Processing Applications on Notebook Computers,” 22nd Annual Saint Joseph's University Sigma Xi Student Research Symposium, April 2011.

N. Sinha, “Digital Signal Processing on Desktop Computers,” Edge.Networks 12th Annual Faculty Best Practices Showcase, March 2011. Poster abstract available at: http://njedge.net/activities/facultyshowcase/2011/posters.php

N. Sinha, L. Khreisat, and K. Sharma, “Technology-Enhanced Active Learning using Pen-based Computing,” 2010 NJEDge.Net Annual Faculty Best Practices Showcase, March 2010. Poster abstract available at: http://njedge.net/activities/facultyshowcase/2010/posters.php

N. Sinha, K. Sharma, and L. Khreisat, “Using Pen-Based Technology to Implement the Active Learning Methodology,” Workshop on the Impact of Pen-Based Technology on Education, WIPTE 2009, October 2009. Poster abstract available at: http://www.wipte.org/docs/WIPTE2009ScheduleAndAbstracts.pdf

N. Sinha, L. Khreisat, and K. Sharma, “Learner-Interface Interaction for Technology-Enhanced Active Learning,” ULiveandLearn webcast, February 26, 2009, Innovate Webcast available at http://innovateonline.info/?view=event&type=webcast

N. Sinha and N. Mitricka, “Robustness Studies (in particular JPEG Compression) for Watermarking Scheme WASSFR (Watermarking based on Adaptive Segmentation and Space Frequency Representation) for digital images in Medicine and Biology,” FDU Science Scholars Symposium, April 2007.

N. Sinha and N. Mitricka, “MATLAB Watermarking Project,” Summer 2006 Pfizer Project, May-Aug 2006.

N. Sinha,J. Bosire, and M. Jean, “Audio Watermarking,” Poster Presentation - FDU Science Scholars Symposium, May 1, 2006.

N. Sinha and D. Eliades, “Implementation of the Card Game 31 using C# in the Visual Studio .NET 2005 environment,” Poster Presentation -FDU Science Scholars Symposium, May 1, 2006.

N. Sinha and D. Eliades, “Robustness Studies of Digital Watermarking using WASSFR,” Poster Presentation - Science Scholars Symposium, FDU, April 28, 2005.

N. Sinha,J. Bosire, and M. Jean, “Audio Watermarking,” Poster Presentation - 17th Annual Sigma Xi Research Symposium and 60th Annual Eastern Colleges Science Conference, Philadelphia, PA, April 22, 2006.

N. Sinha and D. Eliades, “Implementation of the Card Game 31 using C# in the Visual Studio .NET 2005 environment,” Poster Presentation - 17th Annual Sigma Xi Research Symposium and 60th Annual Eastern Colleges Science Conference, Philadelphia, PA, April 22, 2006.

N. Sinha and D. Eliades, “Robustness Studies of Digital Watermarking using WASSFR,” Poster Presentation - 16th Annual Saint Joseph’s University Sigma Xi Student Research Symposium, Philadelphia, PA, April 22, 2006.

N. Sinha and D. Eliades, "Implementation of the Card Game 31 using C# in the Visual Studio .NET 2005 environment," Poster Presentation - 17th Annual Sigma Xi Research Symposium and 60th Annual Eastern Colleges Science Conference, Philadelphia, PA, April 22, 2006.

N. Sinha and D. Eliades, "Robustness Studies of Digital Watermarking using WASSFR," Poster Presentation - 16th Annual Saint Joseph's University Sigma Xi Student Research Symposium, Philadelphia, PA, April 22, 2006.

N. Sinha and D. Eliades, "Robustness Studies of Digital Watermarking using WASSFR," Poster Presentation - 16th Annual Saint Joseph's University Sigma Xi Student Research Symposium, Philadelphia, PA, April 8, 2005.

N. Sinha,"A Digital Rights Management System for Digital Images," Poster Presentation - State of New Jersey Homeland Security Conference, Rutgers University, Piscataway, NJ, Oct 29th 2003.

N. Sinha, "Configuration Manager & Shelf Manager--Resource Package and Software Framework Package," Lucent Technologies Technical Report (Anymedia project), Feb 1999.

N. Sinha,"Software Architecture for the Anymedia Broadband Access System," Lucent Technologies Technical Report, Nov 1998.

N. Sinha, "Physical Network Element", Lucent Technologies Technical Report, Jan 1996.

Dissertations

Doctoral

N. Sinha, "Incorporation of Nonlinear Load Models and Identification of the Inter-Area Mode Oscillations in the Transient Energy Function Method," Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 1989.

Masters

N. Sinha, "Sparse Network Formulation of the Transient Energy Function," Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 1987.

Bachelors

N. Sinha, "Design and Implementation of a Simple Filing System for TDC-316," Dept. of Electrical and Computer Engineering, University of Bombay, Bombay, India 1983.

TAN, Xin

Tan, X., and Kim, Y. (2015) “User Acceptance of SaaS-based Collaboration Tools: A Case of Google Docs” Journal of Enterprise Information Systems, 28(3), pp 131-146

Tan, X., Qin, L., Kim, Y., and Hsu, J. (2012) “Impact of Privacy Concern in Social Networking Websites” Internet Research, 22(2), pp 211-233

Tan, X., Alter, S., and Siau, K. (2011) “Using Service Responsibility Tables to Supplement UML in Analyzing e-Service Systems” Decision Support Systems and Electronic Commerce, 51, pp 350-360

Qin, L., Kim, Y., Hsu, J., and Tan, X. (2011) “The Effects of Social Influence on User Acceptance of Online Social Networks” International Journal of Human-Computer Interaction, 27:9, pp 885-899

TOMS, William M.

Toms, W. M. (in press). Differing perspectives when assessing the size of government staffing. PA Times.

Toms, W. M. (2014, October). Cyber security and the need for strategic collaboration: A case study. Homeland Security & Defense Education Summit. Symposium conducted at the meeting of Naval Postgraduate School, Colorado Springs, Co.

Toms, W. M., Kovacs, E., & Immordino, K. (2011). Planned radical change in organizations: Unintended consequences on roles and continuity. Journal of Enterprise Transformation, 1(2), 98-118.

Kovacs, E., & Toms, W. M. (2010, Summer). Scenario-based learning improves trooper performance. The Public Manager, 39(2), 34-37.

Toms, W. M., & Kovacs, E. (2010, Spring). Leadership behavior and learning styles: Considerations in leadership development. International Leadership Journal, 2(3/4), 53-71.

Toms, W. M. (2009, November). Risk management and internal affairs: An integrative approach. Symposium conducted at 2009 Law Enforcement Accreditation Conference, Princeton, NJ.

Toms, W. M., & Kovacs, E. (2009, November). Transforming the organization through leading the accreditation process. Symposium conducted at 2009 Law Enforcement Accreditation Conference, Princeton, NJ.

Toms, W. M., & Kovacs, E. (2008, June). Scenario based simulation training at the New Jersey State Police Academy. Symposium conducted at the 20th Annual Conference of the National Institute on the Assessment of Experiential Learning, Princeton, NJ.

Toms, W. M. (2008, March). Leadership behavior and learning styles: Considerations in leadership development. Symposium conducted at the 5th Annual Educational Symposium for Research and Innovations, The George Washington University, Washington, D.C.

Toms, W. M. (2007). Exploring the relationship between Kolb’s learning styles and TLP leadership styles in the New Jersey State Police. (UMI No. 3260163)

Toms, W. M., & McAllister, S. G. (1996, November). Interagency drug training. The FBI Law Enforcement Bulletin, 8-12.

ZHAO, Hong

Hong Zhao and Minxiu Chen, “WLAN Covert Timing Channel Detection”, accepted by WTS 2015 (Wireless Telecommunications Symposium), New York City, April 15-17, 2015

Hong Zhao, “Covert Channels in 802.11e Wireless Networks”, WTS 2014, Washington DC, April 9-11, 2014.

Hong Zhao and Yun Q. Shi, “Detecting Covert Channels in Computer Networks based on Chaos Theory”, IEEE Transactions on Information Forensics and Security, vol. 8, No. 2, pp. 273-282, February, 2013.

Hong Zhao and Yun Q. Shi, “A Phase-Space Reconstruction Approach to Detect Covert Channels in TCP ISNs,” provisional patent, patent #: 61/368948

Hong Zhao and Xueying Zhang, “SIP Steganalysis Using Chaos Theory,” CMCSN2012 (The First International Conference on Computing, Measurement, Control and Sensor Network), Taiyuan, China, July 7-9, 2012.

Hong Zhao and Nirwan Ansari, “Detecting Covert Channels within VoIP,” IEEE Sarnoff Symposium,2012, May 21-22, 2012. Hong Zhao, Yun. Q. Shi and Nirwan Ansari, “Steganography in Streaming Multimedia over Networks”,Transaction on Multimedia SecurityLNCS 7110, pp. 96-114, 2012.

Hong Zhao and Yun Q. Shi, “A Phase-Space Reconstruction Approach to Detect Covert Channels in TCP/IP Protocols,” WIFS2010 (IEEE international Workshop on Information Forensics and Security),Dec. 12-15, 2010.

Hong Zhao, Yun Q. Shi and Nirwan Ansari, “Hiding Data in Multimedia Streaming over Networks,” CNSR 2010IEEE Communication Networks and Services Research, May 11-14, 2010

Hong Zhao, “Selective Encryption for MPEG-4 FGS videos,” DESIRT 2006 (1ST International Conference on Design Science Research in Information System and Technology), Feb. 24-25, 2006.