Process and System for Establishing a Moving Target Connection for Secure Communications in Client/Server Systems

Morrell, C; Moore, R; Tront, J; Marchany, R;
USMA Digital Commons
March 26, 2019;

Abstract: HTML Full Text: PDF
Rights and Permissions


Speed isn't Enough: Usability and Adoption of an Optimized Alert Notification System

Zeitz, K.; Marchany, R; Tront, J
IEEE Technology and Society Magazine
2016 Mar; 35(1):47-55.


Strengthening MT6D defenses with honeypot capabilities

Basam, D.; Ransbottom, J.; Marchany, R.; Tront, J.
Journal of Electrical and Computer Engineering [Special Issue: System and Network Security]
2015, Pending.


Attention: moving target defense networks, how well are you moving?

Basam, D.; Marchany, R.; Tront, J.
Proceedings of the 12th ACM International Conference on Computing Frontier (CF'15)
2015, To Appear.


Utilizing the BitTorrent DHT for Blind Rendezvous and Information Exchange

Moore, R.; Morrell, C.; Marchany, R.; Tront, J.
Cyber Security and Trusted Computing (Milcom 2015 Track 3)
2015, To Appear.


DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses

Morrell, C.; Moore, R.; Marchany, R.; Tront, J.
Second ACM Workshop on Moving Target Defense at the ACM Conference on Computer and Communications Security (CCS)
2015; pp.77-84

Full Text: PDF
Rights and Permissions


Scaling IPv6 Address Bindings in Support of a Moving Target Defense

Morrell, C.; Ransbottom, J.S.; Marchany, R.; Tront, J.
International Conference for Internet Technology and Secured Transactions (ICITST)
Dec 8-10, 2014; pp.440-445

Full Text: PDF
Rights and Permissions


Implementing dynamic address changes in ContikiOS

Preiss, T.; Sherburne, M.; Marchany, R.; Tront, J.
In Information Society (i-Society '14)
Nov 10, 2014

Full Text: PDF
Rights and Permissions


Implementing moving target IPv6 defense to secure 6LoWPAN in the Internet of Things and Smart Grid

Sherburne, M.; Marchany, R; & Tront, J.
Cyber and Information Security Research Conference (CISR '14)
April 8, 2014

Full Text: PDF
Rights and Permissions


Poster: A comparative study of metaphors for investigating augmented reality artifacts

Zeitz, K.; Zeitz, R.; Tao, C.; Polys, N.
Proceedings of the IEEE Symposium on 3D User Interfaces (3DUI '14)
March 29, 2014

Full Text: PDF
Rights and Permissions


Designing an Optimized Alert System Based on Geospatial Location Data

Zeitz, K.; Marchany, R.; & Tront, J.
Hawaii International Conference on System Sciences (HICSS '14)
January 6, 2014

Full Text: PDF
Rights and Permissions


Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense

Groat, S., Moore, R., Marchany, R., & Tront, J.
International Workshop on the Engineering of Mobile-Enabled Systems - MOBS '13
May 25, 2013

Full Text: PDF | Slides: PDF
Rights and Permissions


Universal framework for unmanned system penetration testing

Kobezak, P.; Abbot-McCune, S.; Tront, J.; Marchany, R.; & Wicks, A.
Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing
May 17, 2013

Full Text: PDF
Rights and Permissions


UGV: security analysis of subsystem control network

Abbot-McCune, S.; Kobezak, P.; Tront, J.; Marchany, R.; & Wicks, A.
Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing
May 17, 2013

Full Text: PDF
Rights and Permissions


Using transport layer multihoming to enhance network layer moving target defenses

Moore, R., Groat, S., Marchany, R., & Tront, J.
Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13)
January 08, 2013

Full Text: PDF
Rights and Permissions


Dynamic Analysis of Large Datasets with Animated and Correlated Views

Cao, Y., Moore, R., Mi, P., Endert, A., North, C., & Marchany, R.
Visual Analytics Science and Technology (VAST)
October 14, 2012

Full Text: PDF
Rights and Permissions


An Evaluation of IPv6 in Simulation using OPNET Modeler

Clore, B.; Dunlop, M.; Marchany, R.; Tront, J.
Eighth Advanced International Conference on Telecommunications (AICT 2012)
May 27 - June 1, 2012

AbstractPlus | Full Text: PDF IARIA CNF
Rights and Permissions


Leveraging Cognitive Principles to Improve Security Visualization

Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.
Fourth International Conference on Networked Digital Technologies (NDT'2012)
April 24-26, 2012

AbstractPlus | Full Text: PDF Springer LNCS CNF
Rights and Permissions


The Blind Man's Bluff Approach to Security Using IPv6

Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, M.; Tront, J.
Security & Privacy, IEEE
TBP 2012; Volume: PP, Issue: 99, Page(s): 1-1

AbstractPlus | Full Text: PDF IEEE JNL
Rights and Permissions


Using an IPv6 Moving Target Defense to Protect the Smart Grid

Groat, S.; Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.
2012 IEEE PES Innovative Smart Grid Technologies Conference
January 16-19, 2012

AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions


MT6D: a Moving Target IPv6 Defense

Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, R.; Tront, J.
2011 Military Communications Conference (MILCOM)
November 7-10, 2011

AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions


Security and Privacy produced by DHCP Unique Identifiers

Tront, J.; Groat, S.; Dunlop, M.; Marchany, R.
16th North-East Asia Symposium on Nano, Information Technology and Reliability
October 24-26, 2011

AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions


IPv6 Dynamic Network Addressing and Its Impact on Network Forensic Investigations

Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Journal of Network Forensics
Autumn 2011; Volume: 3, Issue: 1, Page(s): 6-18

AbstractPlus | Full Text: PDF SECAU JNL
Rights and Permissions


Cover-VT: Converged Security Visualization Tool

Urbanski, W.; Dunlop, M.; Marchany, R.; Tront, J.
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011)
May 23-27, 2011

AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions


The Good, the Bad, the IPv6

Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Ninth Annual Conference on Communication Networks and Services Research (CNSR 2011)

May 2-5, 2011

AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions


Using Dynamic Addressing for a Moving Target Defense

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
6th International Conference on Information Warfare and Security (ICIW 2011)
March 17-18, 2011

Proceedings, p. 84


What DHCPv6 Says About You

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
World Congress on Internet Security (WorldCIS-2011)
February 21-23, 2011

AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions


IPv6: Now You See Me, Now You Don't

Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Tenth International Conference on Networks (ICN 2011)
January 23-28, 2011

AbstractPlus | Full Text: PDF IARIA CNF
Rights and Permissions


IPv6: Nowhere to Run, Nowhere to Hide

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
44th Hawaii International Conference on Systems Science (HICSS-44 2011)
January 4-7, 2011

AbstractPlus | Full Text: PDF IEEE CNF
Rights and Permissions


Using Geographic Information Systems for Enhanced Network Security Visualization

Shelly, D.; Dunlop, M.; Marchany, R.; Tront, J.
1st International Conference on Computing for Geospatial Research & Application (COM.Geo 2010)
June 21-23, 2010


GoldPhish: Using Images for Content-Based Phishing Analysis

Dunlop, M.; Groat, S.; Shelly, D.
5th International Conference on Internet Monitoring and Protection (ICIMP 2010)
May 9-15, 2010; Page(s):123-128
Digital Object Identifier 10.1109/ICIMP.2010.24

AbstractPlus | Full Text: PDF(674 KB) IEEE CNF
Rights and Permissions


The Privacy Implications of Stateless IPv6 Addressing

Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010)
April 21-23, 2010


Taming the Blue Beast: A Survey of Bluetooth Based Threats

Dunning, J.P.
Security & Privacy, IEEE
March-April 2010; Volume: 8, Issue: 2, Page(s):20-27
Digital Object Identifier: 10.1109/MSP.2010.3

AbstractPlus | Full Text: PDF(2966 KB) IEEE JNL
Rights and Permissions


Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices

Moyers, B.R.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.
System Sciences (HICSS), 2010 43rd Hawaii International Conference on
January 5-8, 2010; Page(s):1-9
Digital Object Identifier: 10.1109/HICSS.2010.170

AbstractPlus | Full Text: PDF(757 KB) IEEE CNF
Rights and Permissions


Validation of the Battery-Sensing Intrusion Protection System Through Enhanced Wi-Fi and Bluetooth Attack Correlation

Moyers, B.R.; Dunning, J.P.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
70th IEEE International Conference on Portable Information Devices (Portable 2009)
September 20-23, 2009; Page(s):1-5
Digital Object Identifier: 10.1109/VETECF.2009.5378889

AbstractPlus | Full Text: PDF(1238 KB) IEEE CNF
Rights and Permissions


Simulating the Deployment of Battery-Sensing Intrusion Protection Systems

Nelson, T.M.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on
January 5-8, 2009; Page(s):1-9
Digital Object Identifier: 10.1109/HICSS.2009.394

AbstractPlus | Full Text: PDF(300 KB) IEEE CNF
Rights and Permissions


Battery-Sensing Intrusion Protection System (B-SIPS)

Buennemeyer, T.K.
Doctoral Dissertation, Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University
December 5, 2008

Full Text: PDF(6 MB)


Mobile Device Profiling and Intrusion Detection using Smart Batteries

Buennemeyer, T.K.; Nelson, T.M.; Clagett, L.M.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.
System Sciences, Hawaii International Conference on System Sciences, Proceedings of the 41st Annual
January 7-10, 2008; Page(s):296
Digital Object Identifier: 10.1109/HICSS.2008.319

AbstractPlus | Full Text: PDF(754 KB) IEEE CNF
Rights and Permissions


Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile Devices

Buennemeyer, T.K.; Nelson, T.M.; Gora, M.A.; Marchany, R.C.; Tront, J.G.
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
June 20-22, 2007; Page(s):135-142
Digital Object Identifier : 10.1109/IAW.2007.381925

AbstractPlus | Full Text: PDF(11203 KB) IEEE CNF
Rights and Permissions


Battery Exhaustion Attack Detection with Small Handheld Mobile Computers

Buennemeyer, T.K.; Gora, M.; Marchany, R.C.; Tront, J.G.
Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on
May 25-29, 2007; Page(s):1-5
Digital Object Identifier : 10.1109/PORTABLE.2007.35

AbstractPlus | Full Text: PDF(452 KB) IEEE CNF
Rights and Permissions


Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems

Buennemeyer, T.K.; Nelson, T.M.; Marchany, R.C.; Tront, J.G.;
SoutheastCon, 2007. IEEE
March 2007 Page(s):740 - 745
Digital Object Identifier 10.1109/SECON.2007.342999

AbstractPlus | Full Text: PDF(299 KB) IEEE CNF
Rights and Permissionss


Internet Security: Intrusion Detection and Prevention in Mobile Systems

Tront, J.G.; Marchany, R.C.;
System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on
Jan. 2007 Page(s):162 - 162
Digital Object Identifier 10.1109/HICSS.2007.287

AbstractPlus | Full Text: PDF(121 KB) IEEE CNF
Rights and Permissions


Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection

Buennemeyer, T.K.; Munshi, F.; Marchany, R.C.; Tront, J.G.;
System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on
Jan. 2007 Page(s):163b - 163b
Digital Object Identifier 10.1109/HICSS.2007.103

AbstractPlus | Full Text: PDF(408 KB) IEEE CNF
Rights and Permissions


Using Battery Constraints within Mobile Hosts to Improve Network Security

Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;
Security & Privacy Magazine, IEEE
Volume 4, Issue 5, Sept.-Oct. 2006 Page(s):40 - 49
Digital Object Identifier 10.1109/MSP.2006.139

AbstractPlus | Full Text: PDF(1707 KB) IEEE JNL
Rights and Permissions


Ubiquitous Security: Privacy versus Protection

Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
2006 International Conference on Pervasive Systems and Computing (PSC 2006)
June 26-29, 2006; Page(s):71-77

Full Text: PDF(162 KB)
Rights and Permissions


Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols

Raymond, D.; Marchany, R.; Brownfield, M.; Midkiff, S.;
2006 IEEE Information Assurance Workshop
June 21-23,2006; Page(s):297 - 304

AbstractPlus | Full Text: PDF(304 KB) IEEE CNF
Rights and Permissions


Battery-Sensing Intrusion Protection System

Buennemeyer, T.K.; Jacoby, G.A.; Chiang, W.G.; Marchany, R.C.; Tront, J.G.;
2006 IEEE Information Assurance Workshop
June 21-23 Page(s):176 - 183

AbstractPlus | Full Text: PDF(822 KB) IEEE CNF
Rights and Permissions


Cross-layer wireless sensor network radio power management

Brownfield, M.I.; Fayez, A.S.; Nelson, T.M.; Davis, N., IV;
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE
Volume 2, April 3-6, 2006; Page(s):1160 - 1165

AbstractPlus | Full Text: PDF(298 KB) IEEE CNF
Rights and Permissions


Wireless sensor network energy-adaptive mac protocol

Brownfield, M.I.; Mehrjoo, K.; Fayez, A.S.; Davis, N.J., IV;
Consumer Communications and Networking Conference, 2006. CCNC 2006. 2006 3rd IEEE
Volume 2, January 8-10, 2006; Page(s):778 - 782

AbstractPlus | Full Text: PDF(374 KB) IEEE CNF
Rights and Permissions


Symbiotic highway sensor network

Brownfield, M.I.; Davis, N.J.;
Vehicular Technology Conference, 2005. VTC-2005-Fall. 2005 IEEE 62nd
Volume 4, 25-28 Sept., 2005 Page(s):2701 - 2705
Digital Object Identifier 10.1109/VETECF.2005.1559039

AbstractPlus | Full Text: PDF(281 KB) IEEE CNF
Rights and Permissions


Wireless sensor network denial of sleep attack

Brownfield, M.; Yatharth Gupta; Davis, N.;
Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005. Proceedings from the Sixth Annual IEEE
15-17 June 2005 Page(s):356 - 364
Digital Object Identifier 10.1109/IAW.2005.1495974

AbstractPlus | Full Text: PDF(529 KB) IEEE CNF
Rights and Permissions


Chained puzzles: a novel framework for IP-layer client puzzles

McNevin, T.J.; Jung-Min Park; Marchany, R.;
Wireless Networks, Communications and Mobile Computing, 2005 International Conference on
Volume 1, 13-16 June 2005 Page(s):298 - 303 vol.1
Digital Object Identifier 10.1109/WIRLES.2005.1549426

AbstractPlus | Full Text: PDF(1952 KB) IEEE CNF
Rights and Permissions


Battery-based intrusion detection a first line of defense

Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
10-11 June 2004 Page(s):272 - 279
Digital Object Identifier 10.1109/IAW.2004.1437827

AbstractPlus | Full Text: PDF(1247 KB) IEEE CNF
Rights and Permissions


Reflections on operating in hostile environments

Bazaz, A.; Arthur, J.D.; Marchany, R.;
System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on
5-8 Jan. 2004 Page(s):10 pp.
Digital Object Identifier 10.1109/HICSS.2004.1265454

l AbstractPlus | Full Text: PDF(258 KB) IEEE CNF
Rights and Permissionss


Internet Security: Intrusion Detection & Prevention

Tront, J.G.; Marchany, R.C.;
System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on
5-8 Jan. 2004 Page(s):1 pp.
Digital Object Identifier 10.1109/HICSS.2004.1265449

AbstractPlus | Full Text: PDF(163 KB) IEEE CNF
Rights and Permissions


Introduction to internet security

Tront, J.G.; Marchany, R.C.;
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
6-9 Jan 2003 Page(s):203 - 203
Digital Object Identifier 10.1109/HICSS.2003.1174460

Abstract | Full Text: PDF(226 KB) IEEE CNF
Rights and Permissions


CANDI: a system for classifying the security risks in appliances

Tront, J.G.; Marchany, R.C.;
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
6-9 Jan 2003 Page(s):5 pp.
Digital Object Identifier 10.1109/HICSS.2003.1174461

Abstract | Full Text: PDF(1012 KB) IEEE CNF
Rights and Permissions


Introduction to the internet security minitrack

Marchany, R.C.; Tront, J.G.;
System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on
7-10 Jan 2002 Page(s):2491 - 2491

Abstract | Full Text: PDF(225 KB) IEEE CNF
Rights and Permission


E-commerce security issues

Marchany, R.C.; Tront, J.G.;
System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on
7-10 Jan 2002 Page(s):2500 - 2508

Abstract | Full Text: PDF(464 KB) IEEE CNF
Rights and Permissions