M. Hossain Heydari, Ph.D. |
|
|||||
Professor, Computer Science Director, Graduate
Information Security Program |
||||||
Recent Publications: M. Hossain Heydari,
Brett Tjaden, and Xunhua
Wang, "A Cyber Defense Boot Camp for High School Technology
Teachers", Seventh Annual Southeastern Cyber Security Summit,
Huntsville, Alabama, June 3-4, 2015. M.
Hossain Heydari, Brett Tjaden, and Xunhua Wang, Recruiting and Training Cyber Defenders – A
Case Study, London International Conference on Education (LICE 2013), London,
England, November 4-6, 2013. S. Bettayeb, M.H., Heydari, L.
Morales, and I.H. Sudborough, Stack and Queue
Layouts for Toruses and Extended Hypercubes, 43rd Hawaiian International Conference on
System Sciences, Jan 2010. M. H. Heydari and F. Damanpour, A System Approach for Defining Data
Center Value Proposition, Review of Business Information Systems Journal,
spring 2008. M. H. Heydari, L. Morales, C. Shields, and I. Sudborough, Computing
Cross Associations for Attack Graphs and Other Applications, proceedings of the 40th Annual Hawaii
International Conference on System Sciences, Jan 2007. M. H. Heydari, Data Center Performance and Its Impact on the
Organization’s Value Proposition,
Journal of Current Research in Global Business, Nov. 2006. M. H. Heydari, L. Morales, and I. Sudborough, Efficient
Algorithms for Batch Re-Keying Operations in Secure Multicast, Hawaii International
Conference on System Sciences, Jan. 2006. M. H. Heydari, Impact of Telecom Deregulation on US Service Provider Business and
Technology Parameters, 17th annual Association for Global
Business International Conference, Miami, Nov. 2005. M. Eltoweissy, M.H.
Heydari, L. Morales, I. Sudborough, Combinatorial
Optimization of Group Key Management, Journal of Network and
Systems Management, Volume:
12, Issue: 1, May 2004. S. J. Greenwald and M. H. Heydari, Pumped TFTP for UDP Covert Channel Identification, Analysis, and Mitigation, work in progress talks, IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.
L.
Morales, I. Sudborough, M. Eltoweissy,
and M. H. Heydari, Communication
Complexity of Tree-Based Multicast Re-keying, Proceedings of the Fourth International Network Conference
(INC2004), July 2004. M. H. Heydari, Security Issues in
the Protection of Digital Property,
Proceedings of the Annual association for Global Business, Cancun, Mexico,
Nov. 2004. M.
Eltoweissy, M. H. Heydari, L. Morales, and I. Sudborough, Towards Trusted Online Dissemination of Consumer
Information, Proceedings of 37th Hawaiian International
Conference on System Science, Kona, Jan. 2004. M. H. Heydari and F. Damanpour, Globalization and Technology: E-Business
E-Commerce and Security Issues,
Proceedings of the International Applied Business Research
Conference, San Juan, Puerto Rico, March 2004. X. Wang, M. H. Heydari, and H.
Lin. “An Intrusion-Tolerant Password Authentication System”.
Proceedings of the 19th Annual Computer Security Applications Conference
(ACSAC). Pages 110-118. Dec., 2003. M.
McDaniel and, Content-Based File Type
Detection Algorithms, Proceedings of 36th Hawaiian
International Conference on System Science, Kona, Jan. 2003. L.
Morales, I. Sudborough, M. Eltoweissy,
and M. H. Heydari, Combinatorial
Optimization of Multicast Key Exchange Management, Proceedings of 36th
Hawaiian International Conference on System Science, Kona, Jan. 2003. M. H. Heydari and F. Damanpour,
Financial Analysis of Information
Security Breaches, International
Business and Economics Research
Journal, Vol. 2, No. 6, June 2003. M.
H. Heydari and I. H. Sudborough, On the Diameter of Pancake NetworksJournal
of Algorithms, Oct. 1997. Gardner,
Shah, Sudborough, Tollis,
Heydari, and Xia, Survivable Telephone
Networks and the Computation of Ring Covers, Proceedings of IEEE Globcom'94, Dec. 1994. M.
H. Heydari, I. Tollis, and C. Xia, Algorithms and Bounds for Layer
Assignment of MCM Routing, IEEE
Transactions on VLSI Systems, Vol. 2, No. 2, June 1994. M.
H. Heydari, F. Damanpour, and J. Damanpour, Developmental
Stages Of Internet Technology Application and
Security Concerns, The European Applied Business Research Conference,
Venice, Italy, June 2003. M.
Eltoweissy, A. Eskandarian,
M. H. Heydari, and J. McDermott, Issues
in the Design of a Mobile Collaborative System on Fine-grained Document
Sharing, Proceeding of the International Symposium on Telecommunications
(IST2001), Sept 2001. M. Eltoweissy, A. Eskandarian, and M. H. Heydari, ON SECURE
ACCESS TO CLINICAL SYSTEMS VIA PUBLIC NETWORKS: COMPLYING WITH HIPAA, Journal of Current Research in Global Business, Nov.
2000. M.
H. Heydari, Cost Opportunities of
Implementing Information Security, Proceedings
of the 14th International Conference on Global Business, Las
Vegas, Nov. 1999. M. Eltoweissy, A. Eskandarian, C. Fox, M. H. Heydari, R.
Mata-Toledo, and J. McDermott, Enabling
Global E-Commerce: A Technology Perspective, Proceedings of the 11th
International Conference on Global Business, Nov. 1999. M.
Eltoweissy, M. H. Heydari, R. Mata-Toledo, A. Wadaa, and M. Willis, Vendor-based Information Technology Certificates and Computer Science
Education: Toward Integrated Skills Computer Science Programs, Proceedings
of the Fifteenth Annual Eastern Small College Computer Conference, Oct. 1999. M.
H. Heydari, I. Tollis and C. Xia, Improved Techniques for MCM Layout
Assignment, Proceedings of IEEE
International Conference on Computer Design, Oct. 1994. C.
Chen, M. H. Heydari, I. Tollis, and C. Xia, Improved Layer Assignment for Packaging
Multichip Modules, Proceedings of 1992 IEEE International Workshop on Defect and Fault Tolerance in VLSI
Systems, Dallas, Nov. 1992. |