:: Publications ::

  1. A. Abuhussein and S. Shiva
          A Framework for Cloud Security Assessment: A Scenario-based, Stakeholder-Oriented Approach
          Ist Annual Research Workshop on Advances & Innovations in Cyber Security, The University of Memphis, Memphis, TN, USA, June 9, 2016.
  2. A. Abuhussein, S. Shiva, F. Sheldon
          CSSR: Cloud Services Security Recommender
          IEEE 11th World Congress on Services (SERVICES) - Emerging Technology Track: Dependable and Secure Services (DSS 2016), San Francisco, California, June 26- July 3, 2016.
  3. A. Abuhussein, F. Alsubaei, S. Shiva, F. Sheldon
          Evaluating Security and Privacy in Cloud Services
          In the 2016 IEEE NATA-COMPSAC Symposium on Novel Applications and Technology Advances in Computing, the 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, Georgia, June 10-14, 2016
  4. E. Aldhahri, A. Abuhussein, S. Shiva
          Leveraging Crowdsourcing In Cloud Application Development
         Proceedings of the 2015 IASTED International Software Engineering and Applications, October 26 - 27, 2015 Marina del Rey,      USA (SEA 2015)
  5. F. Polash, and S. Shiva
          Building Trust in Cloud: Service Certification Challenges and Approaches
          In IEEE Ninth International Complex, Intelligent, and Software Intensive Systems Conference(CISIS), pp. 187-191.      Blumenau, Brazil, July 2015.
  6. E. Aldhahri, V. Shandilya, S. Shiva
          Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art
          ISSC 2015 : IEEE International Symposium on Software Crowdsourcing, , Redwood City, USA, Mar 30 - Apr 3, 2015
  7. V. Shandilya, S. Shiva
          A Network Security Game Model
          ACM-CODASPY 2015 , San antonio Texas, March 2-4, 2015
  8. F. Polash, A. Abuhussein, S. Shiva
          A Survey of Cloud Computing Taxonomies: Rationale and Overview
          In Internet Technology And Secured Transactions Internet Technology And Secured Transactions, 2014 International Conference,   ICITST 2014. - London, UK 2014.
  9. H. Bedi, S. Roy, S. Shiva
          Mitigating congestion based DoS attacks with an enhanced AQM technique
          in Elsevier Journal of Computer Communications., February 2015. Vol. 56, p60 - 73.
  10. Vivek Shandilya, Chris B. Simmons, S. Shiva.
          Use of Attack Graphs in Security Systems.
          in Journal of Computer Networks and Communications 2014.
  11. Vivek Shandilya, Fahad. Polash, S. Shiva
          A Multi-Layer Architecture for Spam Detection.
          International Journal of Computer Science & Information Technology;2014, Vol. 6 Issue 4, p193-200.
  12. A. Abuhussein, H. Bedi, S. Shiva
          Exploring Security and Privacy Risks of SoA Solutions Deployed on the Cloud
          GCA 2014, Las Vegas, Nevada, USA - July 2014 2013
  13. C. Simmons, S. Shiva, L. Simmons
          ADAPT: A Qualitative Analysis of An Ontology Based Issue Resolution System for Cyber Attack Management
          In Cyber Technology in Automation, Control and Intelligent Systems (CYBER), 2014 IEEE 4rd Annual International Conference ,       Hong Kong, China, June 2014.
  14. R. Dharam,S. Shiva
          Runtime Monitoring Framework for SQL Injection Attacks
    International Journal of Engineering and Technology, vol. 6, no. 5, pp. 392-401, 2014.
  15. R. Dharam,S. Shiva
          Testing Web Applications for Tautology based SQL Injection Attacks using Runtime Monitors
          International Research Workshop on Advances and Innovations in Software Testing, Memphis, TN, USA, October 2013
  16. V. Shandilya, S. Shiva
          Security in the Cloud Based Systems: Structure and Breaches
          Internet Technology And Secured Transactions, 2013 International Conference For IEEE., ICITST 2013. - London, UK 2013.
  17. S. Shiva, S. Ramesh, R. Dharam
          A Survey of Testing Methodologies for Cloud-based Applications
          System Testing Excellence Program (STEP) Conference, Memphis, TN, USA, Oct 2013.
  18. C. Simmons, S. Shiva, H. Bedi , V. Shandilya
          ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy
          In Security and Privacy Protection in Information Processing Systems, pp. 344-365. Springer Berlin Heidelberg, 2013.
  19. H. Bedi, S. Shiva
          Mitigating Congestion-Based Denial of Service Attacks with Active Queue Management
          GLOBECOM 2013, Atlanta, GA, USA- Dec 2013 .
  20. R. Dharam,S. Shiva
          Essential Cloud Security Features in Windows Azure
          GCA 2013, Las Vegas, Nevada, USA - July 2013 .
  21. A. Abuhussein, H. Bedi, S. Shiva
          Towards a Taxonomical Approach for Secure Cloud Computing
          IEEE 6th International Conference on Cloud Computing, Santa Clara, CA, USA - July 2013 .
  22. R. Dharam, S. Shiva
          Runtime Monitors to Detect and Prevent Union Query based SQL Injection Attacks
          ITNG 2013, Las Vegas, Nevada, USA. April 2013
  23. R. Dharam, S. Shiva
          Runtime Monitoring Technique to handle Tautology based SQL Injection Attack.
          International Journal of Cyber-Security and Digital Forensics, Vol. 1, No. 3, Nov 2012
  24. A. Abuhussein, H. Bedi, S. Shiva
          Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
          Internet Technology And Secured Transactions, 2012 International Conference For IEEE., ICITST 2012. - London,UK 2012.
  25. R. Dharam, S. Shiva
          Runtime Monitoring - A Post-deployment Security Testing Technique
          International Research Workshop on Advances and Innovations in Software Testing, Memphis, TN, USA, July 2012.
  26. R. Dharam, S. Shiva
          Runtime Monitors for Tautology based SQL Injection Attacks
          International Conference on Cyber Security, Cyber Warfare and Digital Forensics, Kaula Lumpur, Malaysia, June 2012.
  27. R. Dharam, S. Shiva
          A Framework for Development of Runtime Monitors
          International Conference on Computer and Information Sciences, Kaula Lumpur, Malaysia, June 2012.
  28. R. Dharam, S. Shiva
          Analysis of Monitoring Tools for Java Applications
          International Conference on Software and Computer Applications, Singapore, June 2012.
  29. H. Bedi, S. Shiva
          Securing Cloud Infrastructure Against Co-Resident DoS Attacks Using Game Theoretic Defense Mechanisms
          Intl. Workshop on Service-Oriented Architecture and Cloud Computing (SOAC), part of ICACCI 2012, Chennai, India. August 2012.
  30. C. Simmons, S. Shiva, V. Phan, V. Shandilya, L. Simmons
          IRS: An Issue Resolution system for Cyber Attack Classification and Management
          International Conference on Security and Management (SAM), Las Vegas. July 2012.
  31. V. Shandilya, S. Shiva
         Security in the Cloud: A stake holder's perspective
          International Conference on Security and Management (SAM), Las Vegas. July 2012.
  32. S. Shiva
         Security Testing : Status Report
          Sixth International Research Workshop on Advances and Innovations in Software Testing, July 2012, Memphis, TN.
  33. S. Shiva
         Security Testing : Are We There Yet?
          Fifth International Research Workshop on Advances and Innovations in Software Testing, May 2011, Memphis, TN.
  34. C. Simmons, D. Jones, L. Simmons
         A Framework and Demo for Preventing Anti-Computer Forensics
          51st Annual IACIS Conference, Mobile,AL, Oct. 2011.
  35. S. Shiva, R. Dharam and V. Shandilya
         Runtime Monitors as Sensors of Security Systems
          23rd IASTED conference on Parallel and Distributed Computing and Systems, Dallas, December 2011.
  36. H. Bedi, S. Roy, S. Shiva.
         Game Theory-based Defense Mechanisms against DDoS Attacks on TCP/TCP-friendly Flows
         IEEE Symposium on Computational Intelligence in Cyber Security (CICS), part of (SSCI). Paris, France. April 2011.
  37. S. Shiva, H. Bedi, C. Simmons, M. Fisher, R. Dharam.
         Holistic Game Inspired Defense Architecture
         International Conference on Data Engineering and Internet Technology, March, 2011.
         In Recent Progress in Data Engineering and Internet Technology, pp. 471-476. Springer Berlin Heidelberg, 2012.
  38. R. Dharam, S. Roy, S. Shiva.
         On Self Checking Software Components
         Myrtle Beach Computer Security Conference, Myrtle Beach, S.C., April 2010.
  39. S. Shiva, S. Roy, and D. Dasgupta
         Game Theory for Cyber Security
         In Sixth Cyber Security and Information Intelligence Research Workshop. Oak Ridge , April, 2010.
  40. S. Shiva, S. Roy, C. Ellis, V. Datla, and Q. Wu.
         On Modeling & Simulation of Game Theory-based Defense Mechanisms against DoS & DDoS Attacks
         Spring Simulation Multi-Conference (SpringSim), 2010.
          Awards : 43rd Annual Simulation Symposium (ANSS) - Best Paper
                         University of Memphis - Student Research Forum - 1st Place
  41. S. Shiva, S. Roy, H. Bedi, D. Dasgupta, and Q. Wu.
         A Stochastic Game with Imperfect Information for Cyber Security
         5th International Conference on i-Warfare & Security (ICIW), 2010.
  42. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu.
         A survey of game theory as applied to network security.
         The 43rd Hawaii International Conference on System Sciences, 2010.
  43. S. Shiva, D. Dasgupta, Q. Wu and S. Roy
         Game Theoretic Approaches to protect Cyber Space.
         Final technical report, Office Of Naval Research Grant N00014-09-1-0752, CS Tech Report CS-10-001, April 30, 2010.
  44. S. Shiva, C. Simmons, C. Ellis, D. Dasgupta, and Q. Wu.
         AVOIDIT: A cyber attack taxonomy.
         Technical Report: CS-09-003, University of Memphis, August 2009.