Process and System for Establishing a Moving Target Connection for Secure Communications in Client/Server Systems
Morrell, C; Moore, R; Tront, J; Marchany, R;
USMA Digital Commons
March 26, 2019;
Abstract: HTML Full Text: PDF
Rights and Permissions
Speed isn't Enough: Usability and Adoption of an Optimized Alert Notification System
Zeitz, K.; Marchany, R; Tront, J
IEEE Technology and Society Magazine
2016 Mar; 35(1):47-55.
Strengthening MT6D defenses with honeypot capabilities
Basam, D.; Ransbottom, J.; Marchany, R.; Tront, J.
Journal of Electrical and Computer Engineering [Special Issue: System and Network Security]
2015, Pending.
Attention: moving target defense networks, how well are you moving?
Basam, D.; Marchany, R.; Tront, J.
Proceedings of the 12th ACM International Conference on Computing Frontier (CF'15)
2015, To Appear.
Utilizing the BitTorrent DHT for Blind Rendezvous and Information Exchange
Moore, R.; Morrell, C.; Marchany, R.; Tront, J.
Cyber Security and Trusted Computing (Milcom 2015 Track 3)
2015, To Appear.
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses
Morrell, C.; Moore, R.; Marchany, R.; Tront, J.
Second ACM Workshop on Moving Target Defense at the ACM Conference on Computer and Communications Security (CCS)
2015; pp.77-84
Full Text: PDF
Rights and Permissions
Scaling IPv6 Address Bindings in Support of a Moving Target Defense
Morrell, C.; Ransbottom, J.S.; Marchany, R.; Tront, J.
International Conference for Internet Technology and Secured Transactions (ICITST)
Dec 8-10, 2014; pp.440-445
Full Text: PDF
Rights and Permissions
Implementing dynamic address changes in ContikiOS
Preiss, T.; Sherburne, M.; Marchany, R.; Tront, J.
In Information Society (i-Society '14)
Nov 10, 2014
Full Text: PDF
Rights and Permissions
Implementing moving target IPv6 defense to secure 6LoWPAN in the Internet of Things and Smart Grid
Sherburne, M.; Marchany, R; & Tront, J.
Cyber and Information Security Research Conference (CISR '14)
April 8, 2014
Full Text: PDF
Rights and Permissions
Poster: A comparative study of metaphors for investigating augmented reality artifacts
Zeitz, K.; Zeitz, R.; Tao, C.; Polys, N.
Proceedings of the IEEE Symposium on 3D User Interfaces (3DUI '14)
March 29, 2014
Full Text: PDF
Rights and Permissions
Designing an Optimized Alert System Based on Geospatial Location Data
Zeitz, K.; Marchany, R.; & Tront, J.
Hawaii International Conference on System Sciences (HICSS '14)
January 6, 2014
Full Text: PDF
Rights and Permissions
Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense
Groat, S., Moore, R., Marchany, R., & Tront, J.
International Workshop on the Engineering of Mobile-Enabled Systems - MOBS '13
May 25, 2013
Full Text: PDF | Slides: PDF
Rights and Permissions
Universal framework for unmanned system penetration testing
Kobezak, P.; Abbot-McCune, S.; Tront, J.; Marchany, R.; & Wicks, A.
Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing
May 17, 2013
Full Text: PDF
Rights and Permissions
UGV: security analysis of subsystem control network
Abbot-McCune, S.; Kobezak, P.; Tront, J.; Marchany, R.; & Wicks, A.
Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing
May 17, 2013
Full Text: PDF
Rights and Permissions
Using transport layer multihoming to enhance network layer moving target defenses
Moore, R., Groat, S., Marchany, R., & Tront, J.
Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13)
January 08, 2013
Full Text: PDF
Rights and Permissions
Dynamic Analysis of Large Datasets with Animated and Correlated Views
Cao, Y., Moore, R., Mi, P., Endert, A., North, C., & Marchany, R.
Visual Analytics Science and Technology (VAST)
October 14, 2012
Full Text: PDF
Rights and Permissions
An Evaluation of IPv6 in Simulation using OPNET Modeler
Clore, B.; Dunlop, M.; Marchany, R.; Tront, J.
Eighth Advanced International Conference on Telecommunications (AICT 2012)
May 27 - June 1, 2012
AbstractPlus | Full Text: PDF IARIA CNF
Rights and Permissions
Leveraging Cognitive Principles to Improve Security Visualization
Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.
Fourth International Conference on Networked Digital Technologies (NDT'2012)
April 24-26, 2012
AbstractPlus | Full Text: PDF Springer LNCS CNF
Rights and Permissions
The Blind Man's Bluff Approach to Security Using IPv6
Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, M.; Tront, J.
Security & Privacy, IEEE
TBP 2012; Volume: PP, Issue: 99, Page(s): 1-1
AbstractPlus | Full Text: PDF IEEE JNL
Rights and Permissions
Using an IPv6 Moving Target Defense to Protect the Smart Grid
Groat, S.; Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.
2012 IEEE PES Innovative Smart Grid Technologies Conference
January 16-19, 2012
AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions
MT6D: a Moving Target IPv6 Defense
Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, R.; Tront, J.
2011 Military Communications Conference (MILCOM)
November 7-10, 2011
AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions
Security and Privacy produced by DHCP Unique Identifiers
Tront, J.; Groat, S.; Dunlop, M.; Marchany, R.
16th North-East Asia Symposium on Nano, Information Technology and Reliability
October 24-26, 2011
AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions
IPv6 Dynamic Network Addressing and Its Impact on Network Forensic Investigations
Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Journal of Network Forensics
Autumn 2011; Volume: 3, Issue: 1, Page(s): 6-18
AbstractPlus | Full Text: PDF SECAU JNL
Rights and Permissions
Cover-VT: Converged Security Visualization Tool
Urbanski, W.; Dunlop, M.; Marchany, R.; Tront, J.
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011)
May 23-27, 2011
AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions
The Good, the Bad, the IPv6
Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Ninth Annual Conference on Communication Networks and Services Research (CNSR 2011)
May 2-5, 2011
AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions
Using Dynamic Addressing for a Moving Target Defense
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
6th International Conference on Information Warfare and Security (ICIW 2011)
March 17-18, 2011
Proceedings, p. 84
What DHCPv6 Says About You
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
World Congress on Internet Security (WorldCIS-2011)
February 21-23, 2011
AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions
IPv6: Now You See Me, Now You Don't
Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Tenth International Conference on Networks (ICN 2011)
January 23-28, 2011
AbstractPlus | Full Text: PDF IARIA CNF
Rights and Permissions
IPv6: Nowhere to Run, Nowhere to Hide
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
44th Hawaii International Conference on Systems Science (HICSS-44 2011)
January 4-7, 2011
AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions
Using Geographic Information Systems for Enhanced Network Security Visualization
Shelly, D.; Dunlop, M.; Marchany, R.; Tront, J.
1st International Conference on Computing for Geospatial Research & Application (COM.Geo 2010)
June 21-23, 2010
GoldPhish: Using Images for Content-Based Phishing Analysis
Dunlop, M.; Groat, S.; Shelly, D.
5th International Conference on Internet Monitoring and Protection (ICIMP 2010)
May 9-15, 2010; Page(s):123-128
Digital Object Identifier 10.1109/ICIMP.2010.24
AbstractPlus | Full Text: PDF(674 KB) IEEE CNF
Rights and Permissions
The Privacy Implications of Stateless IPv6 Addressing
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010)
April 21-23, 2010
Taming the Blue Beast: A Survey of Bluetooth Based Threats
Dunning, J.P.
Security & Privacy, IEEE
March-April 2010; Volume: 8, Issue: 2, Page(s):20-27
Digital Object Identifier: 10.1109/MSP.2010.3
AbstractPlus | Full Text: PDF(2966 KB) IEEE JNL
Rights and Permissions
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
Moyers, B.R.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.
System Sciences (HICSS), 2010 43rd Hawaii International Conference on
January 5-8, 2010; Page(s):1-9
Digital Object Identifier: 10.1109/HICSS.2010.170
AbstractPlus | Full Text: PDF(757 KB) IEEE CNF
Rights and Permissions
Validation of the Battery-Sensing Intrusion Protection System Through Enhanced Wi-Fi and Bluetooth Attack Correlation
Moyers, B.R.; Dunning, J.P.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
70th IEEE International Conference on Portable Information Devices (Portable 2009)
September 20-23, 2009; Page(s):1-5
Digital Object Identifier: 10.1109/VETECF.2009.5378889
AbstractPlus | Full Text: PDF(1238 KB) IEEE CNF
Rights and Permissions
Simulating the Deployment of Battery-Sensing Intrusion Protection Systems
Nelson, T.M.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on
January 5-8, 2009; Page(s):1-9
Digital Object Identifier: 10.1109/HICSS.2009.394
AbstractPlus | Full Text: PDF(300 KB) IEEE CNF
Rights and Permissions
Battery-Sensing Intrusion Protection System (B-SIPS)
Buennemeyer, T.K.
Doctoral Dissertation, Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University
December 5, 2008
Full Text: PDF(6 MB)
Mobile Device Profiling and Intrusion Detection using Smart Batteries
Buennemeyer, T.K.; Nelson, T.M.; Clagett, L.M.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.
System Sciences, Hawaii International Conference on System Sciences, Proceedings of the 41st Annual
January 7-10, 2008; Page(s):296
Digital Object Identifier: 10.1109/HICSS.2008.319
AbstractPlus | Full Text: PDF(754 KB) IEEE CNF
Rights and Permissions
Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile Devices
Buennemeyer, T.K.; Nelson, T.M.; Gora, M.A.; Marchany, R.C.; Tront, J.G.
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
June 20-22, 2007; Page(s):135-142
Digital Object Identifier : 10.1109/IAW.2007.381925
AbstractPlus | Full Text: PDF(11203 KB) IEEE CNF
Rights and Permissions
Battery Exhaustion Attack Detection with Small Handheld Mobile Computers
Buennemeyer, T.K.; Gora, M.; Marchany, R.C.; Tront, J.G.
Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on
May 25-29, 2007; Page(s):1-5
Digital Object Identifier : 10.1109/PORTABLE.2007.35
AbstractPlus | Full Text: PDF(452 KB) IEEE CNF
Rights and Permissions
Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems
Buennemeyer, T.K.; Nelson, T.M.; Marchany, R.C.; Tront, J.G.;
SoutheastCon, 2007. IEEE
March 2007 Page(s):740 - 745
Digital Object Identifier 10.1109/SECON.2007.342999
AbstractPlus | Full Text: PDF(299 KB) IEEE CNF
Rights and Permissionss
Internet Security: Intrusion Detection and Prevention in Mobile Systems
Tront, J.G.; Marchany, R.C.;
System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on
Jan. 2007 Page(s):162 - 162
Digital Object Identifier 10.1109/HICSS.2007.287
AbstractPlus | Full Text: PDF(121 KB) IEEE CNF
Rights and Permissions
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection
Buennemeyer, T.K.; Munshi, F.; Marchany, R.C.; Tront, J.G.;
System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on
Jan. 2007 Page(s):163b - 163b
Digital Object Identifier 10.1109/HICSS.2007.103
AbstractPlus | Full Text: PDF(408 KB) IEEE CNF
Rights and Permissions
Using Battery Constraints within Mobile Hosts to Improve Network Security
Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;
Security & Privacy Magazine, IEEE
Volume 4, Issue 5, Sept.-Oct. 2006 Page(s):40 - 49
Digital Object Identifier 10.1109/MSP.2006.139
AbstractPlus | Full Text: PDF(1707 KB) IEEE JNL
Rights and Permissions
Ubiquitous Security: Privacy versus Protection
Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
2006 International Conference on Pervasive Systems and Computing (PSC 2006)
June 26-29, 2006; Page(s):71-77
Full Text: PDF(162 KB)
Rights and Permissions
Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols
Raymond, D.; Marchany, R.; Brownfield, M.; Midkiff, S.;
2006 IEEE Information Assurance Workshop
June 21-23,2006; Page(s):297 - 304
AbstractPlus | Full Text: PDF(304 KB) IEEE CNF
Rights and Permissions
Battery-Sensing Intrusion Protection System
Buennemeyer, T.K.; Jacoby, G.A.; Chiang, W.G.; Marchany, R.C.; Tront, J.G.;
2006 IEEE Information Assurance Workshop
June 21-23 Page(s):176 - 183
AbstractPlus | Full Text: PDF(822 KB) IEEE CNF
Rights and Permissions
Cross-layer wireless sensor network radio power management
Brownfield, M.I.; Fayez, A.S.; Nelson, T.M.; Davis, N., IV;
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE
Volume 2, April 3-6, 2006; Page(s):1160 - 1165
AbstractPlus | Full Text: PDF(298 KB) IEEE CNF
Rights and Permissions
Wireless sensor network energy-adaptive mac protocol
Brownfield, M.I.; Mehrjoo, K.; Fayez, A.S.; Davis, N.J., IV;
Consumer Communications and Networking Conference, 2006. CCNC 2006. 2006 3rd IEEE
Volume 2, January 8-10, 2006; Page(s):778 - 782
AbstractPlus | Full Text: PDF(374 KB) IEEE CNF
Rights and Permissions
Symbiotic highway sensor network
Brownfield, M.I.; Davis, N.J.;
Vehicular Technology Conference, 2005. VTC-2005-Fall. 2005 IEEE 62nd
Volume 4, 25-28 Sept., 2005 Page(s):2701 - 2705
Digital Object Identifier 10.1109/VETECF.2005.1559039
AbstractPlus | Full Text: PDF(281 KB) IEEE CNF
Rights and Permissions
Wireless sensor network denial of sleep attack
Brownfield, M.; Yatharth Gupta; Davis, N.;
Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005. Proceedings from the Sixth Annual IEEE
15-17 June 2005 Page(s):356 - 364
Digital Object Identifier 10.1109/IAW.2005.1495974
AbstractPlus | Full Text: PDF(529 KB) IEEE CNF
Rights and Permissions
Chained puzzles: a novel framework for IP-layer client puzzles
McNevin, T.J.; Jung-Min Park; Marchany, R.;
Wireless Networks, Communications and Mobile Computing, 2005 International Conference on
Volume 1, 13-16 June 2005 Page(s):298 - 303 vol.1
Digital Object Identifier 10.1109/WIRLES.2005.1549426
AbstractPlus | Full Text: PDF(1952 KB) IEEE CNF
Rights and Permissions
Battery-based intrusion detection a first line of defense
Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
10-11 June 2004 Page(s):272 - 279
Digital Object Identifier 10.1109/IAW.2004.1437827
AbstractPlus | Full Text: PDF(1247 KB) IEEE CNF
Rights and Permissions
Reflections on operating in hostile environments
Bazaz, A.; Arthur, J.D.; Marchany, R.;
System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on
5-8 Jan. 2004 Page(s):10 pp.
Digital Object Identifier 10.1109/HICSS.2004.1265454
l AbstractPlus | Full Text: PDF(258 KB) IEEE CNF
Rights and Permissionss
Internet Security: Intrusion Detection & Prevention
Tront, J.G.; Marchany, R.C.;
System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on
5-8 Jan. 2004 Page(s):1 pp.
Digital Object Identifier 10.1109/HICSS.2004.1265449
AbstractPlus | Full Text: PDF(163 KB) IEEE CNF
Rights and Permissions
Introduction to internet security
Tront, J.G.; Marchany, R.C.;
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
6-9 Jan 2003 Page(s):203 - 203
Digital Object Identifier 10.1109/HICSS.2003.1174460
Abstract | Full Text: PDF(226 KB) IEEE CNF
Rights and Permissions
CANDI: a system for classifying the security risks in appliances
Tront, J.G.; Marchany, R.C.;
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
6-9 Jan 2003 Page(s):5 pp.
Digital Object Identifier 10.1109/HICSS.2003.1174461
Abstract | Full Text: PDF(1012 KB) IEEE CNF
Rights and Permissions
Introduction to the internet security minitrack
Marchany, R.C.; Tront, J.G.;
System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on
7-10 Jan 2002 Page(s):2491 - 2491
Abstract | Full Text: PDF(225 KB) IEEE CNF
Rights and Permission
E-commerce security issues
Marchany, R.C.; Tront, J.G.;
System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on
7-10 Jan 2002 Page(s):2500 - 2508
Abstract | Full Text: PDF(464 KB) IEEE CNF
Rights and Permissions