• Effectiveness of Probabilistic Attacks on Anonymity of Users Communicating via Multiple Messages [pdf]
    Rajiv Bagai, Bin Tang, and Euna Kim
    IEEE Systems Journal – Special Issue on Security and Privacy in Complex Systems, June 2013.
  • Energy-Efficient Data Redistribution in Sensor Networks [pdf]
    Bin Tang, Neeraj Jaggi, Haijie Wu, and Rohini Kurkal
    ACM Transactions on Sensor Networks, Volume 9, Issue 2, February 2013
  • Data Replication in Data Intensive Scientific Applications With Performance Guarantee [pdf]
    Dharma Teja Nukarapu, Bin Tang, Liqiang Wang, and Shiyong Lu
    IEEE Transactions on Parallel and Distributed Systems, Volume 22, Number 8, 1299 – 1306, August 2011.
  • Achieving Data K-Availability in Intermittently Connected Sensor Networks [pdf]
    Bin Tang, Neeraj Jaggi, and Masaaki Takahashi
    Proceedings of the International Conference on Computer Communications and Networks (ICCCN’14).
  • A Generalized Data Preservation Problem in Sensor Networks – A Network Flow Perspective [pdf]
    Bin Tang, Rajiv Bagai, FNU Nilofar, and Mehmet Bayram Yildirim
    Proceedings of the 8th International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN), in conjunction with ADHOCNOW 2014.
  • Steady Status Study of Distributed Data Caching in Ad Hoc Networks [pdf]
    Julinda Taylor, Bin Tang, and Mehmet Yildirim
    Proceedings of the International Conference on Computer Communications and Networks (ICCCN’13).
  • Maximizing Number of Satisfiable Routing Requests in Static Ad Hoc Networks [pdf]
    Zane Sumpter, Lucas Burson, Bin Tang, Xiao Chen
    Proceedings of the IEEE Global Communications Conference (GLOBECOM 2013).
  • Data Preservation in Intermittently Connected Sensor Networks with Data Priority [pdf] [ppt]
    Xinyu Xu, Xiang Hou, Bin Tang, and Rajiv Bagai
    Proceedings of the IEEE International Conference on Sensing, Communication, and Networking (SECON’13).
  • Maximizing Data Preservation in Intermittently Connected Sensor Networks [pdf]
    Xiang Hou, Zane Sumpter, Lucas Burson, Xinyu Xue, Bin Tang
    Proceedings of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS’12).
  • Integrating Scheduling and Replication in Data Grids with Performance Guarantee [pdf]
    Lakshmi Anikode and Bin Tang
    Proceedings of the IEEE Global Communications Conference (GLOBECOM 2011), Houston, Texas, 2011.
  • An Accurate System-Wide Anonymity Metric for Probabilistic Attacks [pdf]
    Rajiv Bagai, Huabo Lu, Rong Li, and Bin Tang
    Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS-2011), Waterloo, Canada, 2011.
  • Energy-Efficient Data Preservation in Intermittently Connected Sensor Networks [pdf]
    Masaaki Takahashi, Bin Tang, and Neeraj Jaggi
    Proceedings of the International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN), in conjunction with IEEE INFOCOM 2011.
  • Data Caching for Enhancing Anonymity [pdf]
    Rajiv Bagai and Bin Tang
    Proceedings of the IEEE International Conference on Advanced Information Networking and Applications (AINA), Biopolis, Singapore, March 2011.
    (Best Paper Award)

 

Kazimierz Kowalski, Ph.D.
Professor of Computer Science
California State University, DH

  •  “Multi-factored Verification of Students in Online Testing“, World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (ELEARN) 2011, Oct 17, 2011
  • Continuous Biometric User Authentication in Online Examinations“. ITNG 2010 (Best Paper): 488-492
  • “A Knowledge-Based System Implementation of Intrusion Detection Rules”. ITNG 2010: 738-742
  • Users Authentication in Online Examinations“, World Conference on Educational Multimedia, Hypermedia and Telecommunications (EDMEDIA) 2009, Jun 22, 2009
  • Improving Security Through Analysis of Log Files Intersections“,  International Journal of Network Security, Vol.7, No. 1, July 2008,   pp. 25-31
  •  “A Fast Feature Selection Approach for Network Intrusion Detection  System“, Proceedings of the 15th Iranian Conference on Electrical  Engineering 2007 – ICEE’07
  • Learning Intrusion Detection Rules Using a Generalized Rough Set Model“, The Mediterranean Journal of Computers and Networks,
  • “Analysis of Log Files Intersections for Security Enhancement”,  Proceedings of the ITNG-2006 Annual Conference ITNG2006, Las Vegas, April 10 – 12, 2006, pp 452-456
  • “Detecting Network Intrusions Based on a Generalized Rough Set Model”, Proceedings of the International Symposium on Telecommunications  IST-2005, Sept. 10-12, 2005, Shiraz, Iran, pp 247-252

 

Mehrdad S. Sharbaf, Ph.D.
Adjunct Professor
Chair IEEE Coastal Los Angeles Section
Chair IEEE Computer Society Chapter-Coastal Los Angeles Section
Computer Science Department
California State University, Dominguez Hills
Title1–10 Cited by Year
Quantum cryptography: a new generation of information technology security systemMS SharbafInformation Technology: New Generations, 2009. ITNG’09. Sixth International … 19 2009
Quantum cryptography: An emerging technology in network securityMS SharbafTechnologies for Homeland Security (HST), 2011 IEEE International Conference … 6 2011
A New Perspective to Information Security: Total Quality Information Security ManagementMS SharbafProceedings of the 7th International Conference on Security of Information …   2014
Investigation of Vehicular Networks and its Main Security IssuesP Khani, MS SharbafSAE Technical Paper   2014
Investigation of Static and Dynamic Android Anti-virus StrategiesY Ma, MS SharbafInformation Technology: New Generations (ITNG), 2013 Tenth International …   2013
Exploration of Quantum Cryptography in Network Security: The Case Study of The DARPA Quantum Cryptography Network.M SharbafSecurity and Management, 28-33   2008
Biometric Authentication: A Pragmatic Model to Measure Effectiveness of Biometric System in Information Systems Security.M SharbafBIOCOMP, 339-344   2007
Investigation of System Performance of Quantum Cryptography Key Distribution in Network SecurityMS Sharbaf

Workshop

24th IEEE Annual Computer Communications Workshop (CCW)

http://committees.comsoc.org/tccc/ccw/2010/program.html

Special Track on Quantum Information Computing and Communications

(STQICC)