M. Hossain Heydari, Ph.D.

 

Home

Teaching

Research

Grants

Contact

http://www.jmu.edu/_images/cs/faculty-staff-images/heydari.jpg

 

Professor, Computer Science

Director, Graduate Information Security Program

 

Recent Publications:

M. Hossain Heydari, Brett Tjaden, and Xunhua Wang, "A Cyber Defense Boot Camp for High School Technology Teachers", Seventh Annual Southeastern Cyber Security Summit, Huntsville, Alabama, June 3-4, 2015.

M. Hossain Heydari, Brett Tjaden, and Xunhua Wang, Recruiting and Training Cyber Defenders – A Case Study, London International Conference on Education (LICE 2013), London, England, November 4-6, 2013.

S. Bettayeb, M.H., Heydari, L. Morales, and I.H. Sudborough, Stack and Queue Layouts for Toruses and Extended Hypercubes, 43rd Hawaiian International Conference on System Sciences, Jan 2010.

M. H. Heydari and F. Damanpour, A System Approach for Defining Data Center Value Proposition, Review of Business Information Systems Journal, spring 2008.

M. H. Heydari, L. Morales, C. Shields, and I. Sudborough,    Computing Cross Associations for Attack Graphs and Other Applications, proceedings of the 40th Annual Hawaii International Conference on System Sciences, Jan 2007.

M. H. Heydari, Data Center Performance and Its Impact on the Organization’s Value Proposition, Journal of Current Research in Global Business, Nov. 2006.

M. H. Heydari, L. Morales, and I. Sudborough, Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast, Hawaii International Conference on System Sciences, Jan. 2006.

M. H. Heydari, Impact of Telecom Deregulation on US Service Provider Business and Technology Parameters, 17th annual Association for Global Business International Conference, Miami, Nov. 2005.

M. Eltoweissy, M.H. Heydari, L. Morales, I. Sudborough, Combinatorial Optimization of Group Key Management, Journal of Network and Systems Management, Volume: 12, Issue: 1, May 2004.

S. J. Greenwald and M. H. Heydari, Pumped TFTP for UDP Covert Channel Identification, Analysis, and Mitigation, work in progress talks, IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.

L. Morales, I. Sudborough, M. Eltoweissy, and M. H. Heydari, Communication Complexity of Tree-Based Multicast Re-keying, Proceedings of the Fourth International Network Conference (INC2004), July 2004.

M. H. Heydari, Security Issues in the Protection of Digital Property, Proceedings of the Annual association for Global Business, Cancun, Mexico, Nov. 2004.

M. Eltoweissy, M. H. Heydari, L. Morales, and I. Sudborough, Towards Trusted Online Dissemination of Consumer Information, Proceedings of 37th Hawaiian International Conference on System Science, Kona, Jan. 2004.

M. H. Heydari and F. Damanpour,  Globalization and Technology: E-Business E-Commerce and Security Issues,   Proceedings of the International Applied Business Research Conference, San Juan, Puerto Rico, March 2004.

X. Wang, M. H. Heydari, and H. Lin. “An Intrusion-Tolerant Password Authentication System”. Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC). Pages 110-118. Dec., 2003.

M. McDaniel and, Content-Based File Type Detection Algorithms, Proceedings of 36th Hawaiian International Conference on System Science, Kona, Jan. 2003.

L. Morales, I. Sudborough, M. Eltoweissy, and M. H. Heydari, Combinatorial Optimization of Multicast Key Exchange Management, Proceedings of 36th Hawaiian International Conference on System Science, Kona, Jan. 2003.

M. H. Heydari and F. Damanpour, Financial Analysis of Information Security Breaches, International Business and Economics Research Journal, Vol. 2, No. 6, June 2003.

M. H. Heydari and I. H. Sudborough, On the Diameter of Pancake NetworksJournal of Algorithms, Oct. 1997.

Gardner, Shah, Sudborough, Tollis, Heydari, and Xia, Survivable Telephone Networks and the Computation of Ring Covers, Proceedings of IEEE Globcom'94, Dec. 1994.

M. H. Heydari, I. Tollis, and C. Xia, Algorithms and Bounds for Layer Assignment of MCM Routing, IEEE Transactions on VLSI Systems, Vol. 2, No. 2, June 1994.

M. H. Heydari, F. Damanpour, and J. Damanpour, Developmental Stages Of Internet Technology Application and Security Concerns, The European Applied Business Research Conference, Venice, Italy, June 2003.

M. Eltoweissy, A. Eskandarian, M. H. Heydari, and J. McDermott, Issues in the Design of a Mobile Collaborative System on Fine-grained Document Sharing, Proceeding of the International Symposium on Telecommunications (IST2001), Sept 2001.

M. Eltoweissy, A. Eskandarian, and M. H. Heydari, ON SECURE ACCESS TO CLINICAL SYSTEMS VIA PUBLIC NETWORKS: COMPLYING WITH  HIPAA, Journal of  Current Research in Global Business, Nov. 2000.

M. H. Heydari, Cost Opportunities of Implementing Information Security, Proceedings of the 14th International Conference on Global Business, Las Vegas, Nov. 1999.

M. Eltoweissy, A. Eskandarian, C. Fox, M. H. Heydari, R. Mata-Toledo, and J. McDermott, Enabling Global E-Commerce: A Technology Perspective, Proceedings of the 11th International Conference on Global Business, Nov. 1999.

M. Eltoweissy, M. H. Heydari, R. Mata-Toledo, A. Wadaa, and M. Willis, Vendor-based Information Technology Certificates and Computer Science Education: Toward Integrated Skills Computer Science Programs, Proceedings of the Fifteenth Annual Eastern Small College Computer Conference, Oct. 1999.

M. H. Heydari, I. Tollis and C. Xia, Improved Techniques for MCM Layout Assignment, Proceedings of IEEE International Conference on Computer Design, Oct. 1994.

C. Chen, M. H. Heydari, I. Tollis, and C. Xia, Improved Layer Assignment for Packaging Multichip Modules, Proceedings of 1992 IEEE International Workshop on Defect and Fault Tolerance in VLSI Systems, Dallas, Nov. 1992.