ATCorp staff actively participate in the academic community, publishing conference papers, journal articles, and books, as well as serving on the organizing committee of conferences.
Below is a selection of publications from the last several years. Click on a year below to jump directly to that year.
J. Wu, S. Schneider, R. Ramanujan, and M. Rambo, "ADNS IPv6 Transition Architecture and Analysis," Proceedings of the IEEE MILCOM 2014, Oct 2014.
C. Webster, M. Kaddoura, B. Burnett, and R. Ramanujan, "AppShiedler: A Software Applique Implementing GMSEC Security Services, "Proceedings of the IEEE Classified US Military Communications Conference (CUMC), Nov 2013.
M. Kaddoura, B. Trent, R. Ramanujan, and G. Hadynski, "BGP-MX: Border Gateway Protocol with Mobility Extensions", Proceedings of IEEE MILCOM 2011, Oct 2011.
R.S. Ramanujan and J.A.K. Baker, editors. Trends in Tactical Networking, Digital Systems Press, New York, 2011, 152 pages, ISBN: 978-0-9833424-2-7.
J.A.K. Baker and K. J. Thurber. Developing Computer Systems Requirements, Digital Systems Press, New York, 2011, 146 pages, ISBN: 978-0-9833424-0-3.
H. Inoue, F. Adelstein, M. Donovan, S. Brueckner, "Automatically Bridging the Semantic Gap Using a C Interpreter". Proceedings of the 2011 Annual Symposium on Information Assurance. Albany, NY. June. 7-8, 2011
H. Inoue, F. Adelstein, R. A. Joyce, "Visualization in Testing a Digital Forensics Tool". Proceedings of the 2011 Digital Forensics Research Conference. New Orleans, LA. August 1-3, 2011. http://www.dfrws.org/2011/proceedings/10-342.pdf
A. Somayaji, Y. Li, H. Inoue, J.M. Fernandez, R. Ford, "Evaluating Security Products with Clinical Trials." 2nd Workshop on Cyber Security Experimentation and Test (CSET '09) Montreal, QC (2009). http://people.scs.carleton.ca/~soma/pubs/somayaji-cset2009.pdf
John Wu, Yongdae Kim, Ryan Marotz, Ranga Ramanujan and James Tyra, "Logical Network Boundary Controller," IEEE Proceedings of Cybersecurity Applications & Technology Conference for Homeland Security, March 2009.
Ranga Ramanujan, Ben Burnett, and John Wu, "Anticipatory Information Pre-Positioning System (AIPS)," Proceedings of the 2009 IEEE Aerospace Conference, March 2009.
Frank Adelstein and Carla Marceau, “Snapshot Filtering Based On Resource-Usage Profiles,” Proceedings of the IEEE Systematic Approaches to Digital Forensic Engineering Workshop (IEEE/SADFE'09), May 2009.
Maher Kaddoura and Ranga Ramanujan, "IQSM: An End-to-end IntServ QoS Signaling Mechanism for Crypto-partitioned Networks," MILCOM 2009, October 2009, Boston.
J. Bonney, G. Bowering, R. Marotz, and K. Swanson, “Hardware-in-the-Loop Emulation of Mobile Wireless Communication Environments,” 2008 IEEE Aerospace Conference, Paper #1383.
Abdulrahman Hijazi, Hajime Inoue, Paul van Oorschot, Ashraf Matrawy, and Anil Somayaji, “Discovering Packet Structure through Lightweight Hierarchical Clustering,” IEEE International Conference on Communications (ICC 2008), May 2008.
Ranga Ramanujan, Ben Burnett, Clint Sanders, and John Wu, “Geographically Targeted Information Dissemination System,” in Proceeding of the 2008 IEEE Aerospace Conference, March 2008.
Robert A. Joyce, Judson Powers and Frank Adelstein, "MEGA: A Tool For Mac OS X Operating System and Application Forensics," Proc. Digital Forensic Research Workshop (DFRWS) 2008, Digital Investigation, 5 (2008) S83-S90, Baltimore, Maryland, August 2008. http://www.dfrws.org/2008/proceedings/p83-joyce.pdf
Frank Adelstein and Robert Joyce, “File Marshal: Automatic Extraction of Peer-to-Peer Data” in the Proceedings of the 7th Digital Forensics Research Workshop (DFRWS07), Pittsburgh, PA, August 2007. http://www.dfrws.org/2007/proceedings/p43-adelstein.pdf
Ben Burnett, Glenn Bowering, Ryan Hagelstrom, Don Tate, and Ranga Ramanujan, “Multi-Radio Nodes for Mobile Mesh Networks for Emergency Response and Battle Command Systems,” Proceedings of MILCOM 2007, October 2007.
R. Carl, K. Swanson, J. Bonney, and B. Trent, “Transport Protocols in the Tactical Network Environment,” 2007 IEEE Aerospace Conference, March 2007, Paper #1638.
J. Figueroa and K. Swanson, “An Operational Evaluation of the Final Approach Runway Occupancy Signal at Long Beach Airport,” 7th ICNS Conference, Herndon, VA, May 2007.
Marisa M. Gioioso, S. Daryl McCullough, Jennifer P. Cormier, Carla Marceau and Robert A. Joyce, “PMAF: Pedigree Managment and Assessment in a Net-centric Environment,” in the Proceedings of the SPIE Symposium on Defense and Security, Orlando, Florida, April 2007. http://www.raesoftware.com/docs/PMAF_0507.pdf
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, and Anil Somayaji, “NetADHICT: A Tool for Understanding Network Traffic,” Proceedings of the 21st Large Installation Systems Administration Conference (LISA '07), Dallas, TX, November 2007.
J. Horrocks, M. McVeigh, J. Snow, D. Ball, and N. Schmidt, “Availability is Inadequate, A New Paradigm for Specifying NAS-level RMA Requirements,” Parts 1, 2 & 3, The Journal of Air Traffic Control, Summer 2007.
Robert A. Joyce and Jennifer P. Cormier, “iFUSE: A development environment for composable, easy-to-assemble information transforms,” in Proceedings of the SPIE Symposium on Defense and Security, Orlando, Florida, April 2007.
Frank Adelstein, “Live Forensics: Diagnosing your system without killing it first,” Communications of the ACM, 49(2):63-66, February, 2006. Abstract
The Common Digital Evidence Storage Format Working Group (Frank Adelstein, Brian Carrier, Eoghan Casey, Simson Garfinkel, Chet Hosmer, Jessie Kornblum, James Lyle, Marcus Rogers, Phil Turner), “Standardizing Digital Evidence,” Communications of the ACM, 49(2):67-68, February, 2006.
Jennifer P. Cormier, “A Paradigm Shift in E-mail Treatment,” Proceedings of the 2006 International Symposium on Technology and Society, Flushing, NY, June 2006
J. Figueroa and K. Swanson, “An Operational Evaluation of the Final Approach Runway Occupancy Signal, ” AIAA ATIO Conference, Wichita, KS, September 2006.
Maher Kaddoura , “A QoS-aware Mobility Management Mechanism,” 2nd ACIS International Workshop on Self- Assembling Wireless Networks, June 2006, Nevada.
Carla Marceau and Matt Stillerman, “Modular Behavior Profiles in Systems with Shared Libraries,” (Short Paper) in Proceedings of the 2006 International Conference on Information and Communications Security (ICICS '06), volume 4307 of Lecture Notes in Computer Science (LNCS), Raleigh NC, Dec. 4-7 2006.
Vassil Roussev, Golden Richard III, and Daniel Tingstrom, “dRamDisk: Efficient RAM Sharing on a Commodity Cluster,” in Proceedings of the 25th IEEE International Performance Computing and Communications Conference, Phoenix, Arizona, April 2006.
N. Schmidt, K. Swanson, and J. Figueroa, “An Operational Evaluation of the Final Runway Occupancy Signal,” 6th ICNS Conference, Baltimore, MD, May 2006.
K. Swanson and J. Judt, “CompreX: Further Developments in XML Compression,” 2006 IEEE Aerospace Conference, Paper #10.1101.
Frank Adelstein, Prasanth Alla, Robert Joyce, and Golden G. Richard, III, “Physically Locating Wireless Intruders,” in Journal of Universal Computer Science, 11(1), January 2005,
Frank Adelstein, Yun Gao, and Golden G. Richard III, “Automatically creating Realistic Targets for Digital Forensics Investigations” in the Proceedings of the Fifth Digital Forensics Research Workshop (DFRWS05), New Orleans, LA, August 2005. http://www.dfrws.org/2005/proceedings/adelstein_falcon.pdf
Frank Adelstein, Sandeep Gupta, Golden G. Richard, III, and Loren Schwiebert, Fundamentals of Mobile and Pervasive Computing, McGraw-Hill Professional, New York, 2005, 404 pages, ISBN: 0071412379.
M. Bickford and D. Guaspari, “A Programming Logic for Distributed Systems”, ATC-NY Technical Report, 2005. http://www.nuprl.org/documents/Bickford/SCorES_10.html
M. Bickford and R.L. Constable, “A Causal Logic of Events in Formalized Computational Type Theory,” Cornell University Technical Report, 2005. http://www.nuprl.org/documents/Bickford/TechReportCLEinCTT.html
M. Bickford, R.L. Constable, J.Y. Halpern, and S, Petride, “Knowledge-based synthesis of distributed systems using event structures,” In Logic for Programming, Artificial Intelligence, and Reasoning (Franz Baader and Andreo Voronsky, editors), LNCS 3452, 449-465. Springer-Verlag, 2005. http://www.nuprl.org/documents/Bickford/Knowledge-BasedSynthesisConference.html
Maher Kaddoura, Ranga Ramanujan and Steven Schneider, “Routing Optimization Techniques for Wireless Ad Hoc Networks,” 1st ACIS International Workshop on Self-Assembling Wireless Networks, May 2005, Maryland.
Carla Marceau and Rob Joyce, “Empirical Privilege Profiling,” Proceedings of the New Security Paradigms Workshop, September 2005.
Carla Marceau, James Hanna, Daryl Mccullough, Ashish Popli, and Matt Stillerman, “A Peer-to-Peer Architecture for Secure Data Storage With Query,” in the Proceedings of the SPIE International Society for Optical Engineering, Orlando, FL, March 29-31 2005.
K. Swanson and J. Judt, “CompreX: XML Compression applied to the Airborne Internet,” 2005 IEEE Aerospace Conference, Paper #1186.
K. Swanson and J. Judt, “XML Compression and the Airborne Internet,” 5th ICNS Conference, Fairfax, VA, May 2005.
John Wu, Ranga Ramanujan, Sid Kudige, Tuyen Nguyen, and Clint Sanders, “Agent Based Network Services,” Proceedings of MILCOM 2005, October 2005.
J. Figueroa and K. Swanson, “A Demonstration of the Final Approach Runway Occupancy Signal,” 4th ICNS Conference, Fairfax, VA, May 2004.
Maher Kaddoura and Steven Schneider, “SEEHOC: Scalable and Robust End-to-End Header Compression Techniques for Wireless Ad Hoc Networks,” IEEE GLOBECOM Wireless Ad Hoc and Sensor Networks workshop, 29 November 2004.
K. Swanson and D. Hicok, “Airport Surface Surveillance Service—an Alternate Approach,” 4th ICNS Conference, Fairfax, VA, May 2004.
Ranga Ramanujan, Maher Kaddoura, John Wu, Clint Sanders, and Kevin Millikin, “VPNshield: Protecting VPN Services from Denial-of-Service (DoS) Attacks,” 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), May 2003.
R. Ramanujan, S. Kudige, T. Nguyen, “Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA),” 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), May 2003.
J. Budenske, “Expectation Verification Checking via Investigation of On-line Data Sources,” Proc of the International Conference on Artificial Intelligence (IC-AI'2002), June 2002.
J. Budenske, “Flight Plan Monitoring using Agent-Based Technology,” 2nd Annual NASA Integrated Communications, Navigation, and Surveillance Workshop, May 2002.
Budenske, J., R. Ramanujan J. Bonney, K. Millikin, and O. S. Sands, “Space Network Architecture Technologies,” 2002 IEEE Aerospace Conference, March 2002.
K. Millikin, and R. Ramanujan, “Geographically Targeted Information Dissemination Services (GeoTIDeS),” 2nd Annual NASA Integrated Communications, Navigation, and Surveillance Workshop, May 2002.
R. Ramanujan, M. Kaddoura, J. Wu, K. Millikin, D. Harper, and D. Baca, “Organic Techniques for Protecting Virtual Private Network (VPN) Services from Access Link Flooding Attacks,” Proceeding of the 2002 IEEE International Conference on Networking (Networks 2002), August 2002.
R. Ramanujan, S. Kudige, T. Nguyen, and F. Adelstein, “Intrusion-Resistant Ad Hoc Wireless Networks,” Proceedings of MILCOM 2002, October 2002.
M. Bickford, C. Kreitz, R. van Renesse, and X. Liu. “Proving Hybrid Protocols Correct,” TPHOLS 2001, pp.105-120. http://www.nuprl.org/documents/Bickford/01tphols-hybridcorrect.html
J. Budenske, J. Judt, and J. Newhouse, “Distance Learning Using a WWW Lesson Composer, Presenter, & Organizer,” Proceedings of the 2001 AACE WebNet World Conference on the WWW and the Internet, (WebNet'2001), October 2001.
J. Budenske and J. Newhouse, “Multi-Agent Allocation of Resources to Multiple Dynamic Tasks,” Proceedings of the International Conference on Artificial Intelligence (IC-AI'2001), June 2001.
J. Budenske, J. Newhouse, J. Bonney, and J. Wu, “Agent-Based Schedule Validation and Verification,” Proceedings of the IEEE Intnational Conference on Systems, Man, and Cybernetics, October 2001.
X. Liu, R. van Renesse, M. Bickford, C. Kreitz, and R.L. Constable. “Protocol Switching: Exploiting Meta-Properties,” ICDS Workshops, 2001, pp.37-42, http://www.nuprl.org/documents/Liu/01wargc-switching.html
S. Schneider, J. Bonney, and R. Ramanujan, “Modeling and Simulation of a Distributed Intelligent Agent Based Network Fault Diagnosis Technique,” OPNETWORK 2001, August 2001.
A. Streigel, R. Ramanujan, and J. Bonney, “A Protocol Independent Internet Gateway for Ad Hoc Wireless Networks,” Proceedings of the 26th IEEE Conference on Local Computer Networks (LCN'2001), October 2001.
M. Bickford, “Verifying a pipelined microprocessor,” In Proceedings of the 19th Digital Avionics Systems Conferences (DASC), vol. 1, pages 1A5/1-1A5/8, 2000. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=886876
D. Guaspari and D. Naydich, D, “Analysis of real-time code by model checking,” In Proceedings of the 19th Digital Avionics Systems Conferences (DASC), vol. 1, pages D5/1 - 1D5/8, 2000. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=886892
R. Ramanujan, A. Ahamad, J. Bonney, R. Hagelstrom, and K. Thurber, “Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA),” Proceedings of MILCOM'2000, October 2000.
J. Budenske, J. Judt, J. Bonney, and J. Newhouse, “Applying Technology to Science and Technology Literacy in the Classroom,” Proceedings of the 2000 AACE WebNet World Conference on the WWW and the Internet, (WebNet'2000), October 2000.
J. Budenske, J. Bonney, A. Ahamad, R. Ramanujan, D.F. Hougen, and N. Papanikolopoulos, “Nomadic Routing Applications for Wireless Networking in a Team of Miniature Robots,” Proceedings of the IEEE Conference on Systems, Man, and Cybernetics, October 2000.
J. Budenske, J. Judt, J. Bonney, and J. Newhouse, “A Science and Technology Literacy Browser,” Proceedings of the IEEE Conference on Systems, Man, and Cybernetics, October 2000.
C. Marceau, “Characterizing the behavior of a program using multiple-length N-grams” in Proceedings of the 2000 New Security Paradigms Workshop (NSPW 2000), Ballycotton, County Cork, Ireland, pp.101 - 110. September 2000.
J. Budenske, J. Bonney, J. Wu, J. Newhouse, M. Gini, and M. Reilly, “Multi-Agent Planning, Execution and Monitoring,” Proceedings of the International Conference on Artificial Intelligence (IC-AI'2000), June 2000.
R.S. Ramanujan, R. Hagelstrom, M. Kaddoura, S. Takkella, K. Thurber, and J. Wu, “Active Network Services for Mobile Wireless Environments,” Proceedings of SPIE's Aerosense 2000 Conference, April 2000.
D. F. Hougen, S. Benjaafar, J. C. Bonney, J. R. Budenske, M. Dvorak, M. Gini, H. French, D. G. Krantz, P. Y. Li, F. Malver, B. Nelson, N. Papanikolopoulos, P. E. Rybski, S. A. Stoeter, R. Voyles and K. B. Yesin, “A Miniature Robotic System for Reconnaissance and Surveillance,” Proceedings of the 2000 IEEE International Conference on Robotics and Automation, April 2000.
N. Papanikolopoulos, M. Gini, D. G. Krantz, B. Nelson, R. Voyles, D. F. Hougen, P. E. Rybski, S. A. Stoeter, K. B. Yesin, S. Benjaafar, and J. R. Budenske, “Team of Miniature Robots for Reconnaissance and Surveillance,” Winner of Best Video Award at the 2000 IEEE International Conference on Robotics and Automation, April 2000.
R.S. Ramanujan, S. Takkella, and K. Thurber, “MobiWeb: An Approach for Mobile Web Access over Satellite Links,” Proceedings of the 2000 IEEE Aerospace Conference, March 2000.
D. F. Hougen, J. Bonney, J. Budenske, M. Dvorak, M. Gini, D. Krantz, F. Malver, B. Nelson, N. Papanikolopoulos, P. Rybski, S. Stoeter, R. Voyles, and K. Yesin. “Reconfigureable robots for distributed robotics,” Government Microcircuit Applications Conference, (GOMAC'2000), March 2000.
M. Ubnoske and S. Edgerton, “Application of Modern Software Architecture Principles for the Design of an Embedded Weapon System,” Presented at the Software Technology Conference, February 2000.