Sachin Shetty - Publications

Publications

2022    2021    2020    2019   2018    2017    2016    2015    2014    2013    2012    2007-2011    2002-2006
2022
  1. Mohammad Wazid, Ashok Das and Sachin Shetty, "TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge Enabled IoT Systems," , IEEE Internet of Things Journal,2022 (Accepted)

  2. Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel Rodrigues, ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things,," , IEEE Access,2022 (Accepted)

  3. Tan Le and Sachin Shetty, " Artificial Intelligence-aided Privacy Preserving Trustworthy Computation and Communication in 5G-based IoT Networks," , Adhoc Network Journal, vol 126, March 2022

  4. Eranga Herath,Sachin Shetty, Abdul Rahman, Ravi Mukkamalla, Xueping Liang, "Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing," 2022 IEEE Wireless Communications and Networking Conference (WCNC), Track 4- Emerging Technologies, Standards and Applications

  5. Md Ali Reza Al Amin, Peter Foytik,Sachin Shetty Jessica Dorismond, Marco Gamarra, "Deception for Characterizing Adversarial Strategies in Complex Networked Systems," IEEE CCNC 2022.

  6. Eranga Herath, Sachin Shetty, Abdul Rahman, Ravi Mukkamala,Juan Zhao, Xueping Liang, "Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform," IEEE CCNC 2022.

  7. Ying Wang,Shashank Jere, Soumya Banerjee, Lingjia Liu, Sachin Shetty, Shehadi Dayekh, "Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis," IEEE HPSR 2022.

  8. Kamrul Hasan, Sachin Shetty, Tariqul Islam, Imtiaz Ahmed, "Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems ," IEEE ICCCN 2022- Track 5: Security, Privacy, Trust, and Incentives.

  9. Joseph Zalameda, Brady Kruse, Alexander Glandon, Megan Witherow, Sachin Shetty, Khan Iftekharuddin, "Generalized Adversarial and Hierarchical Co-occurrence Network based Synthetic Skeleton Generation and Human Identity Recognition ," International Joint Conference on Neural Networks 2022.

  10. Mohammad Wazid, Siddhant Thapliyal, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty, "Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems," IEEE Transactions on Network Science and Engineering, 2022.

  11. 2021
    1. Georges Kamhoua, Eranga Herath, Peter Foytik, Priyanka Aggarwal and Sachin Shetty, "Resilient and Verifiable Federated Learning against Byzantine Colluding Attacks," IEEE TPS 2021

    2. Priyanka Aggarwal, Sayyed Ahamed, Sachin Shetty, Laura Freeman, "Targeted Transfer Learning for Malware Classification," IEEE TPS 2021 2021.

    3. Amanda Davenport and Sachin Shetty, "Comparative Analysis of Elliptic Curve and Lattice Based Cryptography," Annual Modeling and Simulation Conference (ANNSIM), 2021.

    4. Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang, "Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers," International Journal of Information and Computer Security (IJICS), Vol. 16, No. 1/2, 2021.

    5. Eranga Herath, Deepak Tosh, Sachin Shetty, Bheshaj Krishnappa, "CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems," IEEE Blockchain 2021 (Acceptance rate - 14 %).

    6. Eranga Herath, Sachin Shetty, Abdul Rehman, Ravi Mukkamalla, "Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform," IEEE Milcom 2021.

    7. Abel Gomez, Deepak Tosh,Sachin Shetty, "Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures," IEEE SmartGridComm 2021.

    8. Sayyed Farid Ahamed, Priyanka Aggarwal,Sachin Shetty, Erin Lanus, Laura Freeman, "ATTL: An Automated Targeted Transfer Learning with Deep Neural Network," Big Data Track, IEEE Global Communications Conference (IEEE Globecom 2021).

    9. M. A. R. A. Amin, Sachin Shetty, Laurent Njilla, Deepak Tosh and Charles Kamhoua, "Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement," in IEEE Access, vol. 9, pp. 49662-49682, 2021, doi: 10.1109/ACCESS.2021.3069105.

    10. Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty, "Simulation for cybersecurity: state of the art and future directions," in Journal of Cybersecurity, vol. 7, No. 1, 2021.

    11. Eranga Bandara, Sachin Shetty,Deepak K. Tosh, Xueping Liang, "Vind: A Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems," Frontiers in Blockchain, vol. 4, 2021.

    12. Agbotiname Lucky Imoize, Oluwadara Adedeji, Nistha Tandiya, Sachin Shetty, "6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap," Sensors, vol. 21, 2021.

    13. Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Crissie Hall, Daniel Bowden, Nalin Ranasinghe, Kasun De Zoysa, "A blockchain empowered and privacy preserving digital contact tracing platform," Information Processing & Management, Volume 58, Issue 4, 2021, 102572, ISSN 0306-4573,

    14. Luiz A. DaSilva, Jeffrey H. Reed, Sachin Shetty, Jerry Park, Duminda Wijesekera and Haining Wang, "Securing 5G: A NATO’s Role in Collaborative Risk Assessment and Mitigation," Cyber Threats and NATO 2030: Horizon Scanning and Analysis, 2021.

    15. Eranga Herath, Deepak Tosh, Pete Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, "Tikiri:Towards a Lightweight Blockchain for IoT," Future Generation Computer Systems 2021.

    16. Eranga Herath, Xueping Liang, Sachin Shetty,Pete Foytik, "Rahasak - Scalable Blockchain Architecture for Enterprise Applications  ," Journal of Systems Architecture (Accepted) 2021.

    17. Mohammad Wazid, Ashok Das, Sachin Shetty, P. Gope,J. Rodrigues, "Security in 5G-Enabled Internet of Things Communication:Issues, Challenges andFuture Research Roadmap," IEEE Access, vol. 9, pp. 4466-4489, 2021.

    18. Eranga Herath, Xueping Liang, Pete Foytik, Sachin Shetty,"Promize - Blockchain and Self Sovereign Identity Empowered Mobile ATM Platform, " SAI Computing Conference(Accepted) , 2021.

    19. 2020
    20. Eranga Herath, Xueping Liang, Pete Foytik, Sachin Shetty, Crissie Hall, Dan Bowden, Nalin Ranasinghe,Kasun De Zoysa,Wee Keong Ng, "Connect – Blockchain and Self-Sovereign Identity Empowered Contact Tracing Platform, " EAI MobiHealth Conference, 2020.

    21. Eranga Herath, Xueping Liang, Pete Foytik, Sachin Shetty, Nalin Ranasinghe,Kasun De Zoysa,Wee Keong Ng, "SaaS - Microservices-Based Scalable Smart Contract Architecture," SSCC 2020. Communications in Computer and Information Science, vol 1364. Springer, Singapore.

    22. Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty, Raja Datta, "An SDN-IoT-based framework for future smart cities: Addressing perspective," in Internet of Things and Secure Smart Environments: Successes and Pitfalls", Boca Raton, FL, USA: CRC Press, 2020.

    23. S. P. Gochhayat, Sachin Shetty, R. Mukkamala, P. Foytik, G. A. Kamhoua and L. Njilla, "Measuring Decentrality in Blockchain Based Systems," in IEEE Access, vol. 8, pp. 178372-178390, 2020,

    24. Eranga Bandara, Xueping Liang, Sachin Shetty, Wee Keong Ng, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa, Bård Langöy, David Larsson, "Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems," ICBC 2020.

    25. Eranga Bandara, Xueping Liang, Peter Foytik,Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, "Bassa-Scalable Blockchain Architecture for Smart Cities," ISC2 2020.

    26. Xueping Liang, Sachin Shetty, Peter Foytik, Deepak K. Tosh, "Enforcing Security and Privacy in Distributed Ledgers by Intel SGX," SpringSim 2020.

    27. M. Wazid, A. K. Das, Sachin Shetty, and J. J. P. C. Rodrigues, "On the design of secure communication framework for blockchain-based Internet of intelligent battlefield things environment," in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), Jul. 2020, pp. 888–893.

    28. Haque M.A., Gochhayat S.P.,Sachin Shetty, Krishnappa B. "aCloud-Based Simulation Platform for Quantifying Cyber-Physical Systems Resilience ," In: Risco Martín J.L., Mittal S., Ören T. (eds) Simulation for Cyber-Physical Systems Engineering. Simulation Foundations, Methods and Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-51909-4_14

    29. Ariful Haque Sachin Shetty, Charles Kamhoua, Kimberly Gold, "Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems," IEEE Globecom 2020

    30. Ariful Haque, Sachin Shetty, Charles Kamhoua, Kimberly Gold, "Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems," SecureComm, 2020

    31. Kjartan Palsson, Steinn Guðmundsson, Sachin Shetty, "Analysis of the impact of cyber events for cyber insurance," in The Geneva Papers Risk Insurance Issues Practice 45, 564–579 (2020).

    32. M. Wazid, A.K. Das, Sachin Shetty,M. Jo, "A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things," in IEEE Access, Vol. 8, pp. 1-17, 2020

    33. Sharif Ullah, Sachin Shetty,Amin Hassanzadeh, Anup Nayak and Kamrul Hasan, "On the Effectiveness of Intrusion Response Systems against Persistent Threats", IEEE ICNC, Hawaii, 2020

    34. Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles Kamhoua, Sachin Shetty, DaeHun Nyang, and David Mohaisen, "Exploring the Attack Surface of Blockchain: A Comprehensive Survey", IEEE Communications Surveys & Tutorials, 2020


    35. 2019
    36. Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues, Sachin Shetty, , and YoungHo Park, "IoMT Malware Detection Approaches: Analysis and Research Challenges ", IEEE Access, 2019

    37. Sachin Shetty, Indrajit Ray, Nurcin Celik, Michael Mesham, Nathaniel Bastian, Quanyan Zhu, "Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go? ", Wintersim Simulation Conference, 2019

    38. Ariful Haque Sachin Shetty, and Bheshaj Krishnappa, "CPS resilience: Frameworks, metrics, complexities, challenges and future directions”, Complexity Challenges in Cyber Physical Systems: Using Modeling and Simulation (M&S) to Support Intelligence, Adaptation and Autonomy, Eds.: Saurabh Mittal and Andreas Tolk, Wiley, 2019.

    39. Mohammad Wazid, Ashok Kumar Das, Sachin Shetty,Joel J. P. C. Rodrigues, and YoungHo Park, "LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT ", Sensors, 2019

    40. Kamrul Hasan, Sachin Shetty,Amin Hassanzadeh, Sharif Ullah, "Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk ", IEEE Milcom, Norfolk, 2019

    41. Xueping Liang, Sachin Shetty, "A State-aware Proof of Stake Consensus Protocol for Power System Resilience," In Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019, New York, NY, USA

    42. Mohammad Wazid, Ashok Kumar Das, Sachin Shetty,Joel J. P. C. Rodrigues, and YoungHo Park, "AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment", IEEE Internet of Things Journal, 2019

    43. Ariful Haque, Sachin Shetty,Bheshaj Krishnappa, "Modeling Cyber Resilience for Energy Delivery Systems Using Critical System Functionality", Resilience Week, San Antonio, TX, 2019

    44. M. A. Haque, Sachin Shetty, and B. Krishnappa, "ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems," IEEE Intl Conference on Intelligent Data and Security (IDS), Washington, DC, USA, 2019.

    45. Abdulkabir Bello, Biswajit Biswal, Sachin Shetty, Charles Kamhoua, and Kimberly Gold, "Radio frequency classification toolbox for drone detection", Proc. SPIE Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, Baltimore, MD, 2019

    46. Kamrul Hasan, Sachin Shetty; Sharif Ullah, Amin Hassanzadeh, Ethan Hadar, "Towards Optimal Cyber Defense Remediation in Energy Delivery Systems", IEEE Globecom, Hawaii, 2019

    47. Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David Nicol, Laurent Njilla, “Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure", IEEE Globecom, Hawaii, 2019

    48. Sarada Prasad Gochhayat, Eranga Herath, Sachin Shetty, Peter Foytik, "Yugala: Blockchain based Encrypted Cloud Storage for IoT Data", IEEE Blockchain, 2019

    49. Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak Tosh and Charles Kamhoua "Online Cyber Deception System using Partially Observable Monte-Carlo Planning Framework", Securecomm, 2019

    50. Sharif Ullah, Sachin Shetty, Anup Nayak, Amin Hassanzadeh and Kamrul Hasan "Cyber Threat Analysis based on Characterizing Adversarial Behavior for Energy Delivery Systems", Securecomm (short paper), 2019

    51. Marco Gamarra, Sachin Shetty, Oscar Gonzalez, Laurent Njilla,Marcus Pendleton, Charles Kamhoua, "Dual redundant cyber-attack tolerant control systems strategy for cyber-physical systems", IEEE ICC, May 2019

    52. Sachin Shetty, Charles Kamhoua, Laurent Njilla, "Blockchain for Distributed Systems Security", Wiley-IEEE Computer Society Press, 1 edition, March 19, 2019.

    53. Deepak Tosh, Sachin Shetty, Xueping Liang, Charles Kamhoua, Laurent Njilla, "Data Provenance in the Cloud: A Blockchain-Based Approach", IEEE Consumer Electronics Magazine, Volume 8, Issue 3, 2019.

    54. Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles Kamhoua, Kevin Kwiat, "Transfer Learning for Detecting Unknown Network Attacks", EURASIP Journal on Information Security 2019.

    55. Hellen Maziku, Sachin Shetty, David Nicol, "Security risk assessment for SDN-enabled smart grids", Computer Communications, Volume 133, 2019, Pages 1-11, https://doi.org/10.1016/j.comcom.2018.10.007.

    56. Sachin Shetty, Xueping Liang, Daniel Bowden, Juan Zhao, Lingchen Zhang, "Blockchain-Based Decentralized Accountability and Self-Sovereignty in Healthcare Systems", Business Transformation through Blockchain, Palgrave Macmillan, 2019



    57. 2018
    58. Xueping Liang, Sachin Shetty, Deepak Tosh, Peter Foytik, Lingchen Zhang, "A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain," International Journal of Information Security and Privacy (IJISP) 12 (2018): 4, doi:10.4018/IJISP.2018100105

    59. Md Ariful Haque, Gael Kamdem De Teyou, Sachin Shetty, Bheshaj Krishnappa, "Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights”, IEEE Intelligence and Security Informatics (ISI), Miami FL, November 8 - 10, 2018

    60. Sharif Ullah, Sachin Shetty, Amin Hassanzadeh, "Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems”, Resilience Week, Denver August 2018.

    61. Asmah Muallem, Sachin Shetty, Liang Hong, Jan Wei Pan, "TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets”, Milcom, Los Angeles, October 2018.

    62. Deepak Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles Kamhoua, "Blockchain Empowered Secure Internet-of-Battlefield Things (IoBT) Architecture”, Milcom, Los Angeles, October 2018.

    63. Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, Jay Chen, "Self-Healing Cyber Resilient Framework for Software Defined Networking-enabled Energy Delivery System”, IEEE Conference on Control Technology and Applications (CCTA), Copenhagen, Denmark, August 2018 (Invited Paper).

    64. Deepak Tosh, Sachin Shetty, Peter Foytik, Charles Kamhoua, Laurent Njilla, “CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud”, IEEE International Conference on Cloud Computing (Cloud 2018), July 2-7, 2018, San Francisco, CA, USA, August 2018 (Acceptance ratio: 15 %)

    65. Xueping Liang, Sachin Shetty, Deepak Tosh, Yafei Ji, Danyi Li, “Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System using Blockchain”, 14th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), August 2018 (Acceptance ratio: 30.5%=33/108)

    66. Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem and Jay Chen “Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery System,” IEEE Conference on Communications and Network Security (CNS) 30 May-1 June 2018, Beijing China (Acceptance ratio: 28.17%=51/181)

    67. Sachin Shetty, Michael McShane, Linfeng Zhang, Jay Kesan, Charles A. Kamhoua, Kevin Kwiat, Laurent Njilla, “ Reducing Informational Disadvantages to Improve Cyber Risk Management", Geneva Papers on Risk and Insurance, April 2018, Volume 43, Issue 2, pp 224–238.

    68. Marco Gamarra, Sachin Shetty, Oscar Gonzalez, David Nicol, Charles A. Kamhoua, Laurent Njilla, “Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs,” IEEE International Conference on Communications (ICC) 20-24 May 2018, Kansas City, MO (Acceptance ratio: 39.9%=972/2,433)

    69. Hellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin Kwiat, “ Diversity Modeling to Evaluate Security of Multiple SDN Controllers,” 2018 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, Maui, Hawaii, March 5-8, 2018 (Acceptance ratio: 26.9%=115/427



    70. 2017
    71. Xueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li and Jihong Liu, “ Towards Decentralized Accountability and Self-Sovereignty in Healthcare Systems,” The 19th International Conference on Information and Communications Security (ICICS 2017), Beijing, China, Dec 2017

    72. Xueping Liang, Sachin Shetty, Deepak Tosh, Peter Foytik and Lingchen Zhang, “ Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger using Intel Software Guard Extensions,” The 19th International Conference on Information and Communications Security (ICICS 2017), Beijing, China, Dec 2017

    73. Deepak Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent Njilla, “ Consensus Protocols for Blockchain-based Data Provenance: Challenges and Opportunities,” 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (Short Paper), NY, October 19-21, 2017

    74. Deepak Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin Kwiat , “ Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance,” GameSec 2017, 8th Conference on Decision and Game Theory for Security, Vienna, Austria, October 23-25, 2017

    75. Xueping Liang, Juan Zhao, Sachin Shetty, Jihong Liu, Danyi Li, “ Integrating Blockchain for Data Sharing and Collaboration in Mobile Healthcare Applications,” IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 08-13 October 2017, Montreal, QC, Canada

    76. Xueping Liang, Juan Zhao, Sachin Shetty, Danyi Li, “ Towards Data Assurance and Resilience in IoT Using Blockchain,” IEEE Milcom, October 23-25, 2017, Baltimore, MD, USA

    77. Juan Zhao, Sachin Shetty, Jan Wei Pan, “Feature-Based Transfer Learning for Network Security,” IEEE Milcom, October 23-25, 2017, Baltimore, MD, USA

    78. Laila Almutairi and Sachin Shetty, “ Generalized Stochastic Petri Net Model Based Security Risk Assessment of Software Defined Networks,” IEEE Milcom, October 23-25, 2017, Baltimore, MD, USA

    79. Xueping Liang, Sachin Shetty, Lingchen Zhang, Charles Kamhoua, Kevin Kwiat, “ Man in the Cloud (MITC) Defender: SGX-based User Credential Protection for Synchronization applications in Cloud Computing Platform,” IEEE Cloud, June 25 - June 30, 2017, Honolulu, Hawaii, USA

    80. Uttam Ghosh, Pushpita Chatterjee, Deepak Tosh, Sachin Shetty, Kaiqi Xiong, Charles Kamhoua, “ A SDN based Framework for Guaranteeing Security and Performance in Information Centric Cloud Networks", IEEE Cloud (short paper), June 25 - June 30, 2017, Honolulu, Hawaii, USA

    81. Uttam Ghosh , Pushpita Chatterjee and Sachin Shetty, “ A Security Framework for SDN Enabled Power Grid", IEEE International workshop on Communication, Computing, and Networking in Cyber Physical Systems, In association with IEEE the 37th International Conference on Distributed Computing Systems (IEEE ICDCS 2017), June 5 - 8, 2017, Atlanta, GA, USA

    82. C. Dang, L. Jiménez-Rodríguez, N. H. Tran, Sachin Shetty, S. Sastry "" On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel ", IEEE Transactions on Vehicular Technology, vol. 66, no. 5, pp. 3887-3899, May 2017.

    83. L. Elsaid, L. Jiménez-Rodríguez, N. H. Tran, Sachin Shetty, S. Sastry, " Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels" , IEEE Access, vol. 5, no. , pp. 10469-10477, 2017

    84. Xueping Liang, Sachin Shetty,Deepak Tosh, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, “ ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability”, The 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), May 14-17 2017.

    85. Deepak Tosh Sachin Shetty, Xueping Liang, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, “ Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack”, 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), May 14-17 2017.

    86. Deepak Tosh Sachin Shetty, Shamik Sengupta, Jay Kesan and Charles Kamhoua, “ Risk Management using Cyber-Threat Information Sharing and Cyber-Insurance”, 7th EAI International Conference on Game Theory for Networks, May 14-17 2017, Knoxville, TN, USA.

    87. Sachin Shetty, Val Red, David Satterfield, Charles Kamhoua, Kevin Kwiat and Laurent Njilla, “ Data Provenance Assurance in Cloud Using Blockchain”, SPIE Defense + Security Conference, Anhaeim CA, April 9-13, 2017.

    88. Hellen Maziku and Sachin Shetty, “Software Defined Networking enabled Resilience for IEC 61850-based Substation Communication Systems”, Workshop on Computing, Networking and Communications (CNC), January 2017 , Silicon Valley, USA.

    89. Kamrul Hasan, Sachin Shetty, and Taiwo Oyedare, “ Cross Layer Attacks on GSM Mobile Networks Using Software Defined Radios”, 14th Annual IEEE Consumer Communications & Networking Conference (CCNC 2017), January, 2017, Las Vegas, USA..



    90. 2016
    91. Md. Monzurul Alam, Sudeep Bhattarai, Liang Hong and Sachin Shetty, " Robust Cooperative Beamforming against Steering Vector Uncertainty in Cognitive Radio Networks",IEEE CCNC, 2016.

    92. Abdullah Alghamdi and Sachin Shetty, “ Survey: Toward A Smart Campus Using the Internet of Things”, 4th International Conference on Future Internet of Things and Cloud (FiCloud-2016), August 2016, Vienna, Austria.

    93. Ashraf Al Sharah, Taiwo Oyedare, and Sachin Shetty, “ Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game,” Journal of Computer Networks and Communications, 2016,

    94. Sai Kiran Mukkavilli, Sachin Shetty and Liang Hong, " Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers", Journal of Information Security, vol 7, pp. 172-184, 2016.

    95. Robert W. Mudrowsky, Ravi Ramachandran, Umashanger Thayasivam, and Sachin Shetty, “ Robust Speaker Recognition in the Presence of Speech Coding Distortion for Remote Access Application”, 12th International Conference on Data Mining, July 2016, Las Vegas, USA

    96. Esther Amullen, Sachin Shetty, L.H. Keel ,” Secured Formation Control for Multi-agent Systems Under DoS Attacks”,  IEEE International Symposium on Technologies for Homeland Security, May 2016, Waltham. MA

    97. Esther Amullen, Sachin Shetty, L.H. Keel, “ Model-based resilient control for a multi-agent system against Denial of Service attacks”, IEEE World Automation Congress, July 2016, Puerto Rico

    98. Xuebiao Yuchi and Sachin Shetty, “ Towards Network-topology aware Virtual Machine Placement in Cloud Datacenters”, IEEE Cloud, June 2016, San Francisco, CA

    99. Xuebiao Yuchi and Sachin Shetty, “ Hierarchical Random Graph based Network Diversity Modeling for the Cloud”, IEEE Cloud, June 2016, San Francisco, CA

    100. Wei Chen, Liang Hong and Sachin Shetty, "Cross-layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks", 18th Workshop on Advances in Parallel and Distributed Computational Models, May 2016

    101. Paul Mcneil, Sachin Shetty, Divya Guntu and Gauree Barve, "SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices", 7th International Conference on Ambient Systems, Networks and Technologies (ANT-2016)- International Workshop on Mobile Cloud Computing systems, Management, and Security, May 2016.

    102. Taiwo Oyedare, Ashraf Al Sharah and Sachin Shetty, "'A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs", 14th International Conference on Wired & Wireless Internet Communications (WWIC 2016), May 2016.

    103. Sachin Shetty, Xuebiao Yuchi and Min Song, " Moving Target Defense for Distributed Systems," Springer, ISBN 978-3-319-31031-2, April 2016



    104. 2015
    105. A. D. Le, S. P. Herath, N. H. Tran, T. Q. Duong and Sachin Shetty, " Achievable rates and outage probability of cognitive radio with dynamic frequency hopping under imperfect spectrum sensing", IET Communications, vol. 9, no. 17, pp. 2160-2167, 2015

    106. D. B. Rawat, M. Song, and Sachin Shetty, , " Dynamic Spectrum Access for Wireless Networks ," SpringerBriefs of Electrical and Computer Engineering, ISBN 978-3-319-15298-1 Springer Verlag, 2015

    107. L. J. Rodriguez, N. H. Tran, T. Q. Duong, T. Le-Ngoc, M. Elkashlan, and Sachin Shetty, , " Physical Layer Security in Wireless Cooperative Relay Networks: State-Of-The-Art and Beyond," IEEE Communications Magazine, 2015

    108. D. A. Le, N. H. Tran, Sachin Shetty, and Shivakumar Sastry, , " Achievable Rate and Outage Probability of Cognitive Radio with Finite-Alphabet Inputs Under Imperfect Spectrum Sensing," in Proc. IEEE Veh. Tech. Conf. (VTC), Glasgow, Scotland, May 2015.

    109. Cuong Dang, Leonardo Jiimenez Rodriguez, Nghi Tran, Sachin Shetty, and Shivakumar Sastry, , " Secrecy Capacity of the Full-Duplex AF Relay Wire-Tap Channel under Residual Self-Interference," IEEE Wireless Communications and Networking Conference (WCNC), March 2015, New Orleans

    110. Danda Rawat, Swetha Reddy, Nimish Sharma, Bhed Bahadur Bista, and Sachin Shetty , " Cloud-assisted GPS-driven Dynamic Spectrum Access in Cognitive Radio Vehicular Networks for Transportation Cyber-Physical Systems," IEEE Wireless Communications and Networking Conference (WCNC), March 2015, New Orleans

    111. Ashraf Al Sharah and Sachin Shetty, " Accumulative Feedback Adaptation Transmission Rate In Mobile Ad-hoc Network", IEEE International Conference and Workshop on Computing and Communication (IEMCON), October 2015.

    112. Depeng Li and Sachin Shetty " Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use", ACM CCS (Poster), October 2015, Denver, Co.

    113. Xuebiao Yuchi and Sachin Shetty " Enabling Security-Aware Virtual Machine Placement in IaaS Clouds", Milcom, October 2015, Tampa FL.

    114. Kimberly Gold, Sachin Shetty, and Tamara Rogers " A Testbed for modeling and detecting attacks on NFC enabled mobile devices", Milcom, October 2015, Tampa FL.

    115. Vasanth Iyer and Sachin Shetty, " Virtual sensor tracking using byzantine fault tolerance and predictive outlier model for complex tasks recognition", SPIE DSS, April 2015, Baltimore, MD.

    116. Sachin Shetty, Husam Adas and Waled Tayib, “ Scalable Detection of Web Malware on Smart phones,” 2015 International Conference on Information and Communication Technology Research (ICTRC2015), May 2015,Dubai, UAE.



    117. 2014
    118. Sachin Shetty and Danda Rawat, , "" ROAR- Real-time Opportunistic Spectrum Access in Cloud based Cognitive Radio Networks," NSF Cloud Workshop, Dec 2014, Washington D.C.

    119. Danda Rawat, Swetha Reddy, Nimish Sharma, and Sachin Shetty , " Cloud-assisted Dynamic Spectrum Access for VANET in Transportation Cyber-Physical Systems," Proc. of IEEE 33rd International Performance Computing and Communications Conference (IEEE IPCCC 2014), December 5-7, 2014, Austin Texas, USA

    120. Danda Rawat, Sachin Shetty and Chunsheng Xin , " Stackelberg Game based Dynamic Spectrum Access in Heterogeneous Wireless Systems," IEEE Systems Journal, 2014.

    121. Danda Rawat and Sachin Shetty , "Enhancing Connectivity for Spectrum-agile Vehicular Ad hoc Networks in Fading Channels", IEEE Intelligent Vehicles Symposium, June 8-11, 2014, Dearborn, Michigan, USA.

    122. Md. Monzurul Alam, Sudeep Bhattarai, Liang Hong and Sachin Shetty, " Robust Transmit Beamforming against Steering Vector Uncertainty in Cognitive Radio Networks", 2014 IEEE INFOCOM Workshop on Green Cognitive Communications and Computing Networks, April 27, 2014, Toronto, Canada.

    123. Danda Rawat, Sachin Shetty and Khurram Raza " Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio Networks ", IEEE International Workshop on Software Defined Systems (SDS -2014)in conjunction with 2014 IEEE International Conference on Cloud Engineering (IC2E 2014), 11-14 March 2014, Boston, Massachusetts, USA

    124. Pan Gao, Henrique Momm and Sachin Shetty, “ Exploration of optimal parameters of the genetic algorithm applied in feature extraction from remote sensed imagery,” Pecora Memorial Remote Sensing Symosium, Nov 2014, Denver

    125. Laila Almutairi, Sachin Shetty and Henrique Momm, “ Scalable evolutionary computation for efficient information extraction from remote sensed imagery,” Pecora Memorial Remote Sensing Symosium, Nov 2014, Denver

    126. Biswajit Biswal, Sachin Shetty and Tamara Rogers, “Enhanced Learning Classifier to Locate Data in Cloud Datacenters”, IEEE CloudNet, October 2014, Luxembourg

    127. Hellen Maziku and Sachin Shetty, “ Towards a Network Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Center”, IEEE CloudNet, October 2014, Luxembourg

    128. Sachin Shetty, Biswajit Biswal and Hellen Maziku, " Auditing and analysis of network traffic in cloud environment", International Journal of Business Process Integration and Management, 2014 

    129. Lingchen Zhang, Sachin Shetty, Peng Liu and Jiwu Jing " RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment", European Symposium on Research in Computer Security, Wroclaw, Poland, September 2014.

    130. Sachin Shetty, Tayo Adedokun, L.H. Keel, " CyberPhySecLab: A testbed for modeling, detecting and responding to security attacks on Cyber Physical Systems", ASE Cyber Security Conference, Stanford, CA, May 2014.

    131. Biswajit Biswal, Sachin Shetty, Tamara Rogers, " Classication Based IP Geolocation Approach to Locate Data in the Cloud Datacenters", ASE Cyber Security Conference, Stanford, CA, May 2014.

    132. Hellen Maziku and Sachin Shetty, " Network Aware VM Migration in Cloud Data Centers", Global Environment for Network Innovations (GENI) Research and Educational Experiment Workshop, March 19-20, 2014, Atlanta, GA



    133. 2013
    134. Bhed Bahadur Bista, Danda Rawat, Sachin Shetty and Gongjun Yan, "Waiting Probability Analysis for Opportunistic Spectrum Access", International Journal of Adatpive and Innovative Systems, 2013.

    135. Md. Monzurul Alam, Sudeep Bhattarai, Liang Hong and Sachin Shetty, "'Robust Beamforming for Cognitive Radio Based Vehicular Communication", International Conference on Connected Vehicles and Expo, Dec 2013.

    136. Danda Rawat, Sachin Shetty and Khurram Raza, " Geolocation-aware Resource Management in Cloud Computing Based Cognitive Radio Networks", Special Issue on Information Assurance and System Security in Cloud Computing, International Journal of Cloud Computing, 2013

    137. Danda Rawat and Sachin Shetty , " Game Theoretic Approach to Dynamic Spectrum Access with Multi-radio and QoS Requirements ", IEEE GlobalSIP, Dec 3-5, 2013.

    138. Sudeep Bhattarai, Liang Hong, Sachin Shetty, " Optimum Transmit Beamforming Scheme for Underlay Cognitive Radio Networks", International Symposium on Wireless Personal Multimedia Communications, Atlantic City, New Jersey, June 24 - 27, 2013.

    139. Sachin Shetty and Danda Rawat, " Cloud Computing based Cognitive Radio Networking ", Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, Book Chapter, IGI, June 2013

    140. Bhed Bahadur Bista, Danda B. Rawat, Gongjun Yan, Sachin Shetty, " Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks ",  The 7th International Conference on Complex, Intelligent, and Software Intensive Systeme (CISIS 2013) July 3rd - July 5th, 2013, Taichung, Taiwan 

    141. Sachin Shetty, " Auditing and Analysis of Network Traffic in Cloud Environment ", IEEE Workshop on Cloud Security Auditing, June 27, 2013, Santa Clara, CA.

    142. Swetha Reddy Lenkala, Sachin Shetty, and Kaiqi Xiong, "' Security Risk Assessment of Cloud Carrier", IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), May 13-16, 2013, Delft, Netherlands. (Acceptance Rate 22.18 %)

    143. Asmah Muallem, Sachin Shetty, and S. K. Hargrove, " Visualizing Geolocation of Spam Email ", IEEE Computing, Communications and Applications Conference (ComComAp), April 1-5, 2013, Hong Kong.



    144. 2012
    145. Danda Rawat, Sachin Shetty, Khurram Raza, " Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks", 4th International Workshop on Security in Cloud Computing, Pittsburgh, PA, September 2012.

    146. Kalpesh Raval, Ravi P. Ramachandran, Sachin Shetty, and Brett Smolenski,"Feature and Signal Enhancement for Robust Speaker Identification of G.729 Decoded Speech", 19th International Conference on Neural Information Processing (ICONIP2012), Doha, Qatar, November 2012.

    147. Umashanger Thayasivam, Sachin Shetty, Chinthaka Kuruwita, Ravi Ramachandran, " Detection of Anomalies in Network Traffic Using L2E for Accurate Speaker Recognition", 55th Int'l Midwest Symposium on Circuits & Systems, Boise, August 2012.

    148. Hellen Maziku, Sachin Shetty, Keesook Han, Tamara Rogers, " Enhancing the Classification Accuracy of IP Geolocation", Proc. of Military Communications Conference, Orlando, Florida, Nov 2012.

    149. Sachin Shetty, Meena Thanu, Ravi Ramachandran, " Cognitive Radio: Primary User Emulation Attacks and Remedies ", Journal of Recent Patents on Computer Science, Special Issue on Recent Advances in Cognitive Radio Communications, Bentham Science Publishers Ltd., Vol.5, No. 2, May. 2012.

    150. Sachin Shetty, Nicholas Luna, Kaiqi Xiong, "' Assessing Network Path Vulnerabilities for Secure Cloud Computing", IEEE ICC Workshop on Clouds, Networks and Data Centers, June 10-15, 2012, Ottawa, Canada.



    151. 2007-2011
    152. Sachin Shetty, Kodzo Agbedanu, Ravi Ramachandran, “ Opportunistic Spectrum Access in Multi-User Multi-Channel Cognitive Radio Networks,” IEEE EUSIPCO, August 29 - Sep 2, 2011, Barcelona, Spain

    153. Sachin Shetty and Ravi Ramachandran, "Blind Channel Estimation Based Robust Physical Layer Key Generation in MIMO Networks," IEEE Int. Symp. On Circuits and Systems, Paris, France, June 2010.

    154. Chunsheng Xin, Min Song, Liangping Ma, Sachin Shetty, and C.C. Shen, “ Control-Free Dynamic Spectrum Access for Cognitive Radio Networks,” Proc. of IEEE ICC, May 2010.

    155. Gayathri Shivaraj, Min Song and Sachin S. Shetty, " Using Hidden Markov Models to detect Rogue Access Points," Security and Communication Networks, Volume 3, Issue 5,  pages 394–407, October 2010.

    156. Sachin Shetty, Min Song, Chunsheng Xin, " A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary Networks," IEEE INFOCOM April 2009.

    157. Gang Zhou, Sachin Shetty, George Simms, Min Song " PLL Based Time Synchronization in Wireless Sensor Networks ," IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA) (short paper), Beijing, China, August 24-26 2009

    158. Manish Wadhwa, Min Song, Sachin Shetty, "The Impact of Antenna Orientation on Wireless Sensor Network Performance ," IEEE International Conference on Computer Science and Information Technology( ICCST 2009), Beijing, China, August 8-11 2009

    159. Mary Mathews, Min Song, Sachin Shetty, and R. McKenzie, Detecting Compromised Nodes in Wireless Sensor Networks," Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), Qingdao, 2007, pp. 273-278.

    160. Gayathri Shivaraj, Min Song, Sachin Shetty, " A Hidden Markov Model Based Approach to Detect Rogue Access Points," Proc. of Military Communications Conference, San Francisco, California, Nov 2008. (pdf)

    161. Sachin Shetty, Min Song, Youjun Yang, Mary Mathews, " Learning Bayesian Network over Distributed Databases Using Majority-based Method," SEDE 2008: 209-215

    162. Sachin Shetty, Min Song, Liran Ma, " Rogue Access Point Detection by analyzing network traffic characteristics," Proc. of the 2007 Military Communications Conference, October 2007, Orlando, Florida.

    163. Sachin Shetty,Min Song, Robert Ash, Ersin Ancel, Kenneth Bone, "Wireless Sensor Payload Design for Sounding Rocket," Computers and Their Applications 2007: 295-300

    164. Min Song, Sachin Shetty, Deepthi Gopalpet, "Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis," MONET 12(5-6): 450-459 (2007)



    165. 2002-2006
    166. Min Song, Sachin Shetty , Wu Li, " Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput ," ICCNMC 2005: 405-413

    167. Sachin Shetty and Min Song, "Structure learning of Bayesian networks using a semantic genetic algorithm-based approach", ITRE 2005: 454-458

    168. Min Song, Sachin Shetty, Mansoor Alam, HouJun Yang, "A New Multicast Queuing Mechanism for High-Speed Packet Switches," ISCA PDCS 2004: 327-332

    169. Min Song, Sachin Shetty, Guillermo Loaisiga, HouJun Yang, "Efficient Queuing Scheme for Multicast Switches in Overlay Networks," ISCA PDCS 2003: 76-81

    170. Min Song, Sachin Shetty, Weiying Zhu, "Evolutionary Programming in a Distributed Packet Scheduling Architecture.,"CAINE 2003: 230-233

    171. Min Song, Mansoor Alam, Sachin Shetty , Uday Jarajapu, "Evolutionary Scheduling in a Multi-Service Routing Switch," ISCA Conference on Intelligent Systems 2002: 38-43

    Educational Research

    1. Husam Adas, Sachin Shetty, and S. K. Hargrove, "Virtual and Augmented Reality Based Assembly Design System for Personalized Learning", IEEE Science and Information Conference, October 7 - 9, 2013, London, United Kingdom.

    2. R. P. Ramachandran, R. Polikar, K. D. Dahm and Sachin Shetty, "Open-Ended Design and Performance Evaluation of a Biometric Speaker Identification System", IEEE International Symposium on Circuits and Systems, Seoul, South Korea, May 20-23,2012.

    3. Y. Tang, , “Adaptive Virtual Reality Game System for Personalized Problem Based Learning,” 2011 IEEE International Conference on Networking, Sensing and Control, April 11-13, 2011, Delft, Netherlands.

    4. Y. Tang, Sachin Shetty, J. Kauser, S.K. Hargrove, and J. Henry, “Virtual Reality Games in Promoting Metacognition for Science and Engineering Design in Context,” ASEE Annual Conference, June 26-29, 2011, Vancouver, BC, Canada

    5. Tang, Y., Sachin Shetty, and Chen, X. F, “Empowering Students with Engineering Literacy and Problem-solving through Interactive Virtual Reality Games,” 2nd International IEEE Consumer Electronics Society Games Innovation Conference, Hong Kong, Dec. 21-23, 2010.

    Posters and Presentations

    1. Sachin Shetty, "Network Traffic Analysis for Cloud Auditing",  Cyber and Information Challenges 2012 Conference, State University of New York Institute of Technology, Utica, NY, June 2012

    2. Sai Kiran Mukkavilli and Sachin Shetty, "Mining Concept drifting Network traffic in cloud computing environments", CCGRID, Ottawa, Canada, May 13-16 2012

    3. R. P. Ramachandran, R. Polikar, K. D. Dahm, Ying Tang, Sachin Shetty, Robert Nickel, Richard Koziak, "Project Based Design of a Biometric Face Recognition System’’, NSF Grantees Poster Session, ASEE Annual Conference, San Antonio, Texas June 10-13, 2012

    4. “Massive IP/DNS analysis using data mining in Hadoop”, Cloud Assumption Buster Workshop, NIST, Gaithersburg, MD, Oct 21, 2011

    5. “Challenges and Success Stories in Homeland Security Education”, Panel Member, DHS Center of Excellence Annual Meeting, Purdue University, West Lafayette, IN, Sep 13, 2011

    6. “Massive Cloud Auditing using Data Mining in Hadoop”, Assured Cloud Workshop, Information Institute, AFRL, Rome, NY, July 7, 2011

    7. “Opportunistic Networking via Dynamic Spectrum Access”, LANS Informal Seminar, Argonne National Laboratory, Jul 7 2010.

    8. “Opportunistic Access in Cognitive Radio Networks”, Department of Electrical and Computer Engineering, Old Dominion University, Oct 3, 2008.

    9. “Wireless Spacecraft Bus”, Department of Electrical and Computer Engineering, Old Dominion University, Oct 28, 2007.

    10. “Wireless Spacecraft Research”, Salisbury University, May 9, 2007.

    11. “Wireless Spacecraft Communications” 6th Integrated Communications, Navigation, and Surveillance (ICNS), Baltimore, Maryland, May 1-3 2006.

    12. “Weighted Fair Queuing Algorithm”, Gigabit Kits Workshop hosted by Washington University Sponsored by the National Science Foundation, June 2002."

    Student Posters and Presentations

    1. Waled Tayib, "A Scalable Classifier-based System to Detect Smartphone Malware", Second Place Prize, Undergraduate Oral Presentation, Computer Sciences, Information Systems and Computer Engineering Session, Emerging Researchers National Conference, Washington D.C., Feb 2014
    2. Daniel Henke, "Assessing Resiliency of Mobile Cyber-Physical Systems", First Place Prize, Undergraduate Oral Presentation, Technology and Engineering, Emerging Researchers National Conference, Washington D.C., Feb 2014
    3. Nicholas Luna, “'Assessing Network Path Vulnerabilities for Secure Cloud Computing”, First Place Prize, Undergraduate Oral Presentation, Computer Sciences, Information Systems and Computer Engineering Session, Emerging Researchers National Conference, Atlanta, GA, Feb 23-25, 2012, and First Prize, Annual Meeting of the Tennessee Academy of Science, Belmont University, TN, October 2011
    4. Hellen Maziku, “'Enhancing the classification accuracy of IP geolocation”, First Place Prize, Graduate Oral Presentation, Computer Sciences, Information Systems and Computer Engineering Session, Emerging Researchers National Conference, Atlanta, GA, Feb 23-25, 2012
    5. Mostafa Shamsuddin, “Birds of a Feather”, Second Place Prize, UnderGraduate Oral Presentation, Computer Sciences, Information Systems and Computer Engineering Session, Emerging Researchers National Conference, Atlanta, GA, Feb 23-25, 2012
    6. Paul Moore and Ashia Coleman. "Design of a Power Efficient Wireless Body Sensor Network"; First Prize, Undergraduate Oral presentation at the 32nd Research Symposium at Tennessee State University, 2011 and First Prize, Annual Meeting of the Tennessee Academy of Science, Belmont University, TN, April 2011