Publications
Process and System for Establishing a Moving Target Connection for Secure Communications in Client/Server Systems
Morrell, C; Moore, R; Tront, J; Marchany, R;
USMA Digital Commons
Speed isn’t Enough: Usability and Adoption of an Optimized Alert Notification System
Strengthening MT6D defenses with honeypot capabilities
Basam, D.; Ransbottom, J.; Marchany, R.; Tront, J.
Journal of Electrical and Computer Engineering [Special Issue: System and Network Security]
Attention: moving target defense networks, how well are you moving?
Basam, D.; Marchany, R.; Tront, J.
Proceedings of the 12th ACM International Conference on Computing Frontier (CF'15)
Utilizing the BitTorrent DHT for Blind Rendezvous and Information Exchange
Moore, R.; Morrell, C.; Marchany, R.; Tront, J.
Cyber Security and Trusted Computing (Milcom 2015 Track 3)
DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses
Morrell, C.; Moore, R.; Marchany, R.; Tront, J.
Second ACM Workshop on Moving Target Defense at the ACM Conference on Computer and Communications Security (CCS)
Full Text: PDF
Scaling IPv6 Address Bindings in Support of a Moving Target Defense
Morrell, C.; Ransbottom, J.S.; Marchany, R.; Tront, J.
International Conference for Internet Technology and Secured Transactions (ICITST)
Full Text: PDF
Implementing dynamic address changes in ContikiOS
Preiss, T.; Sherburne, M.; Marchany, R.; Tront, J.
In Information Society (i-Society '14)
Full Text: PDF
Implementing moving target IPv6 defense to secure 6LoWPAN in the Internet of Things and Smart Grid
Sherburne, M.; Marchany, R; & Tront, J.
Cyber and Information Security Research Conference (CISR '14)
Full Text: PDF
Poster: A comparative study of metaphors for investigating augmented reality artifacts
Zeitz, K.; Zeitz, R.; Tao, C.; Polys, N.
Proceedings of the IEEE Symposium on 3D User Interfaces (3DUI '14)
Full Text: PDF
Designing an Optimized Alert System Based on Geospatial Location Data
Zeitz, K.; Marchany, R.; & Tront, J.
Hawaii International Conference on System Sciences (HICSS '14)
Full Text: PDF
Securing Static Nodes in Mobile-Enabled Systems using a Network-Layer Moving Target Defense
Groat, S., Moore, R., Marchany, R., & Tront, J.
International Workshop on the Engineering of Mobile-Enabled Systems - MOBS '13
Universal framework for unmanned system penetration testing
Kobezak, P.; Abbot-McCune, S.; Tront, J.; Marchany, R.; & Wicks, A.
Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing
Full Text: PDF
UGV: security analysis of subsystem control network
Abbot-McCune, S.; Kobezak, P.; Tront, J.; Marchany, R.; & Wicks, A.
Unmanned Systems Technology XV - SPIE Defense, Security, and Sensing
Full Text: PDF
Using transport layer multihoming to enhance network layer moving target defenses
Moore, R., Groat, S., Marchany, R., & Tront, J.
Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13)
Full Text: PDF
Dynamic Analysis of Large Datasets with Animated and Correlated Views
Cao, Y., Moore, R., Mi, P., Endert, A., North, C., & Marchany, R.
Visual Analytics Science and Technology (VAST)
Full Text: PDF
An Evaluation of IPv6 in Simulation using OPNET Modeler
Clore, B.; Dunlop, M.; Marchany, R.; Tront, J.
Eighth Advanced International Conference on Telecommunications (AICT 2012)
Leveraging Cognitive Principles to Improve Security Visualization
Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.
Fourth International Conference on Networked Digital Technologies (NDT'2012)
The Blind Man’s Bluff Approach to Security Using IPv6
Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, M.; Tront, J.
Security & Privacy, IEEE
TBP 2012; Volume: PP, Issue: 99, Page(s): 1-1
AbstractPlus | Full Text: PDF IEEE JNL
Using an IPv6 Moving Target Defense to Protect the Smart Grid
Groat, S.; Dunlop, M.; Urbanski, W.; Marchany, R.; Tront, J.
2012 IEEE PES Innovative Smart Grid Technologies Conference
MT6D: a Moving Target IPv6 Defense
Dunlop, M.; Groat, S.; Urbanski, W.; Marchany, R.; Tront, J.
2011 Military Communications Conference (MILCOM)
AbstractPlus | Full Text: PDF IEEE CNF
Security and Privacy produced by DHCP Unique Identifiers
Tront, J.; Groat, S.; Dunlop, M.; Marchany, R.
16th North-East Asia Symposium on Nano, Information Technology and Reliability
AbstractPlus | Full Text: PDF IEEE CNF
IPv6 Dynamic Network Addressing and Its Impact on Network Forensic Investigations
Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Journal of Network Forensics
Autumn 2011; Volume: 3, Issue: 1, Page(s): 6-18
Cover-VT: Converged Security Visualization Tool
Urbanski, W.; Dunlop, M.; Marchany, R.; Tront, J.
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011)
AbstractPlus | Full Text: PDF IEEE CNF
The Good, the Bad, the IPv6
Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Ninth Annual Conference on Communication Networks and Services Research (CNSR 2011)
AbstractPlus | Full Text: PDF IEEE CNF
Using Dynamic Addressing for a Moving Target Defense
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
6th International Conference on Information Warfare and Security (ICIW 2011)
Proceedings, p. 84
What DHCPv6 Says About You
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
World Congress on Internet Security (WorldCIS-2011)
AbstractPlus | Full Text: PDF IEEE CNF
IPv6: Now You See Me, Now You Don’t
Dunlop, M.; Groat, S.; Marchany, R.; Tront, J.
Tenth International Conference on Networks (ICN 2011)
AbstractPlus | Full Text: PDF IARIA CNF
IPv6: Nowhere to Run, Nowhere to Hide
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
44th Hawaii International Conference on Systems Science (HICSS-44 2011)
AbstractPlus | Full Text: PDF IEEE CNF
Using Geographic Information Systems for Enhanced Network Security Visualization
Shelly, D.; Dunlop, M.; Marchany, R.; Tront, J.
1st International Conference on Computing for Geospatial Research & Application (COM.Geo 2010)
GoldPhish: Using Images for Content-Based Phishing Analysis
Dunlop, M.; Groat, S.; Shelly, D.
5th International Conference on Internet Monitoring and Protection (ICIMP 2010)
May 9-15, 2010; Page(s):123-128
Digital Object Identifier 10.1109/ICIMP.2010.24
AbstractPlus | Full Text: PDF(674 KB) IEEE CNF
The Privacy Implications of Stateless IPv6 Addressing
Groat, S.; Dunlop, M.; Marchany, R.; Tront, J.
6th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW 2010)
Taming the Blue Beast: A Survey of Bluetooth Based Threats
Dunning, J.P.
Security & Privacy, IEEE
March-April 2010; Volume: 8, Issue: 2, Page(s):20-27
Digital Object Identifier: 10.1109/MSP.2010.3
AbstractPlus | Full Text: PDF(2966 KB) IEEE JNL
Effects of Wi-Fi and Bluetooth Battery Exhaustion Attacks on Mobile Devices
Moyers, B.R.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.
System Sciences (HICSS), 2010 43rd Hawaii International Conference on
January 5-8, 2010; Page(s):1-9
Digital Object Identifier: 10.1109/HICSS.2010.170
AbstractPlus | Full Text: PDF(757 KB) IEEE CNF
Validation of the Battery-Sensing Intrusion Protection System Through Enhanced Wi-Fi and Bluetooth Attack Correlation
Moyers, B.R.; Dunning, J.P.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
70th IEEE International Conference on Portable Information Devices (Portable 2009)
September 20-23, 2009; Page(s):1-5
Digital Object Identifier: 10.1109/VETECF.2009.5378889
AbstractPlus | Full Text: PDF(1238 KB) IEEE CNF
Simulating the Deployment of Battery-Sensing Intrusion Protection Systems
Nelson, T.M.; Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
System Sciences, 2009. HICSS '09. 42nd Hawaii International Conference on
January 5-8, 2009; Page(s):1-9
Digital Object Identifier: 10.1109/HICSS.2009.394
AbstractPlus | Full Text: PDF(300 KB) IEEE CNF
Battery-Sensing Intrusion Protection System (B-SIPS)
Buennemeyer, T.K.
Doctoral Dissertation, Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University
Full Text: PDF(6 MB)
Mobile Device Profiling and Intrusion Detection using Smart Batteries
Buennemeyer, T.K.; Nelson, T.M.; Clagett, L.M.; Dunning, J.P.; Marchany, R.C.; Tront, J.G.
System Sciences, Hawaii International Conference on System Sciences, Proceedings of the 41st Annual
January 7-10, 2008; Page(s):296
Digital Object Identifier: 10.1109/HICSS.2008.319
AbstractPlus | Full Text: PDF(754 KB) IEEE CNF
Battery Polling and Trace Determination for Bluetooth Attack Detection in Mobile Devices
Buennemeyer, T.K.; Nelson, T.M.; Gora, M.A.; Marchany, R.C.; Tront, J.G.
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC
June 20-22, 2007; Page(s):135-142
Digital Object Identifier : 10.1109/IAW.2007.381925
AbstractPlus | Full Text: PDF(11203 KB) IEEE CNF
Battery Exhaustion Attack Detection with Small Handheld Mobile Computers
Buennemeyer, T.K.; Gora, M.; Marchany, R.C.; Tront, J.G.
Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on
Digital Object Identifier : 10.1109/PORTABLE.2007.35
AbstractPlus | Full Text: PDF(452 KB) IEEE CNF
Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems
Buennemeyer, T.K.; Nelson, T.M.; Marchany, R.C.; Tront, J.G.;
SoutheastCon, 2007. IEEE
Digital Object Identifier 10.1109/SECON.2007.342999
AbstractPlus | Full Text: PDF(299 KB) IEEE CNF
Internet Security: Intrusion Detection and Prevention in Mobile Systems
Tront, J.G.; Marchany, R.C.;
System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on
Digital Object Identifier 10.1109/HICSS.2007.287
AbstractPlus | Full Text: PDF(121 KB) IEEE CNF
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack Detection
Buennemeyer, T.K.; Munshi, F.; Marchany, R.C.; Tront, J.G.;
System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on
Digital Object Identifier 10.1109/HICSS.2007.103
AbstractPlus | Full Text: PDF(408 KB) IEEE CNF
Using Battery Constraints within Mobile Hosts to Improve Network Security
Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;
Security & Privacy Magazine, IEEE
Volume 4, Issue 5, Sept.-Oct. 2006 Page(s):40 - 49
Digital Object Identifier 10.1109/MSP.2006.139
AbstractPlus | Full Text: PDF(1707 KB) IEEE JNL
Ubiquitous Security: Privacy versus Protection
Buennemeyer, T.K.; Marchany, R.C.; Tront, J.G.
2006 International Conference on Pervasive Systems and Computing (PSC 2006)
June 26-29, 2006; Page(s):71-77
Full Text: PDF(162 KB)
Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols
Raymond, D.; Marchany, R.; Brownfield, M.; Midkiff, S.;
2006 IEEE Information Assurance Workshop
June 21-23,2006; Page(s):297 - 304
AbstractPlus | Full Text: PDF(304 KB) IEEE CNF
Battery-Sensing Intrusion Protection System
Buennemeyer, T.K.; Jacoby, G.A.; Chiang, W.G.; Marchany, R.C.; Tront, J.G.;
2006 IEEE Information Assurance Workshop
AbstractPlus | Full Text: PDF(822 KB) IEEE CNF
Cross-layer wireless sensor network radio power management
Brownfield, M.I.; Fayez, A.S.; Nelson, T.M.; Davis, N., IV;
Wireless Communications and Networking Conference, 2006. WCNC 2006. IEEE
Volume 2, April 3-6, 2006; Page(s):1160 - 1165
AbstractPlus | Full Text: PDF(298 KB) IEEE CNF
Wireless sensor network energy-adaptive mac protocol
Brownfield, M.I.; Mehrjoo, K.; Fayez, A.S.; Davis, N.J., IV;
Consumer Communications and Networking Conference, 2006. CCNC 2006. 2006 3rd IEEE
Volume 2, January 8-10, 2006; Page(s):778 - 782
AbstractPlus | Full Text: PDF(374 KB) IEEE CNF
Symbiotic highway sensor network
Brownfield, M.I.; Davis, N.J.;
Vehicular Technology Conference, 2005. VTC-2005-Fall. 2005 IEEE 62nd
Volume 4, 25-28 Sept., 2005 Page(s):2701 - 2705
Digital Object Identifier 10.1109/VETECF.2005.1559039
AbstractPlus | Full Text: PDF(281 KB) IEEE CNF
Wireless sensor network denial of sleep attack
Brownfield, M.; Yatharth Gupta; Davis, N.;
Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005. Proceedings from the Sixth Annual IEEE
15-17 June 2005 Page(s):356 - 364
Digital Object Identifier 10.1109/IAW.2005.1495974
AbstractPlus | Full Text: PDF(529 KB) IEEE CNF
Chained puzzles: a novel framework for IP-layer client puzzles
McNevin, T.J.; Jung-Min Park; Marchany, R.;
Wireless Networks, Communications and Mobile Computing, 2005 International Conference on
Volume 1, 13-16 June 2005 Page(s):298 - 303 vol.1
Digital Object Identifier 10.1109/WIRLES.2005.1549426
AbstractPlus | Full Text: PDF(1952 KB) IEEE CNF
Battery-based intrusion detection a first line of defense
Jacoby, G.A.; Marchany, R.; Davis, N.J., IV;
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
10-11 June 2004 Page(s):272 - 279
Digital Object Identifier 10.1109/IAW.2004.1437827
AbstractPlus | Full Text: PDF(1247 KB) IEEE CNF
Reflections on operating in hostile environments
Bazaz, A.; Arthur, J.D.; Marchany, R.;
System Sciences, 2004. Proceedings of the 37th Annual Hawaii
International Conference on
Digital Object Identifier 10.1109/HICSS.2004.1265454
AbstractPlus | Full Text: PDF(258 KB) IEEE CNF
Internet Security: Intrusion Detection & Prevention
Tront, J.G.; Marchany, R.C.;
System Sciences, 2004. Proceedings of the 37th Annual Hawaii International Conference on
Digital Object Identifier 10.1109/HICSS.2004.1265449
AbstractPlus | Full Text: PDF(163 KB) IEEE CNF
Introduction to internet security
Tront, J.G.; Marchany, R.C.;
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
6-9 Jan 2003 Page(s):203 - 203
Digital Object Identifier 10.1109/HICSS.2003.1174460
CANDI: a system for classifying the security risks in appliances
Tront, J.G.; Marchany, R.C.;
System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on
Digital Object Identifier 10.1109/HICSS.2003.1174461
Introduction to the internet security minitrack
Marchany, R.C.; Tront, J.G.;
System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on
7-10 Jan 2002 Page(s):2491 - 2491