Publications

Research Publications and Presentations

Department: Computer and Information Technology

Eric Matson
  1. Pablo Noriega, Javier Vazquez-Salceda, Guido Boella, Olivier Boissier, Virginia Dignum, Nicoletta Fo, (2006) COIN II, Coordination, Organizations, Institutions and Norms in Multi-Agent Systems. Proceedings AAMAS '06/ECAI '06. Lecture Notes in Artificial Intelligence(LNAI) Berlin, Germany: Springer-Verlag.
  2. Olivier Boissier, Julian Padget, Virginia Dignum, Gabriela Lindemann, Eric Matson, Sascha Ossowski,, (2006) COIN I, Coordination, Organization, Institutions and Norms in Agent Systems I, Proceedings ANIREM ''05/OOOP ''05. Lecture Notes in Artificial Intelligence(LNAI) Berlin, Germany: Springer-Verlag.
  3. Eric Matson, Raj Bhatnagar (2008). Knowledge Sharing Between Agents in a Transitioning Organization. Sichman, J.S., Padget, J., Ossowski, S., Noriega, P., editor, Coordination, Organization, Institutions and Norms in Agent Systems (COIN) III Berlin, Germany: Springer-Verlag.
  4. Eric Matson (2008). Evaluation of Properties in the Transition of Capability-based Agent Organizations. Web Intelligence and Agent Systems Journal IOS Press.
  5. Scott A. DeLoach, Walamitien Oyenan and Eric Matson (February 2008). A Capabilities-Based Model for Artificial Organizations. Journal of Autonomous Agents and Multiagent Systems, 16, 13-56.
  6. Eric Matson, Raj Bhatnagar (April 2008). From Sensor Networks to Sensor Organizations. Intelligent Computing: Theory and Applications V Conference, SPIE Symposium on Defense \& Security 2008 Orlando, FL: SPIE.
  7. Eric Matson, Raj Bhatnagar (April 2007). Organization Capable Intelligent Sensors. Intelligent Computing: Theory and Applications V Conference, SPIE Symposium on Defense & Security 2007 Orlando, FL: SPIE.
  8. Eric Matson, Raj Bhatnagar (December 2006). Properties of Capability Based Agent Organization Transition. 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT-2006) Hong Kong, China.
  9. Eric Matson (September 2005). Abstraction of Transition Properties in Multiagent Organizations. Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2005) Compiegne, France.
  10. Eric Matson (June 2005). Reasoning on Temporal Effects of Agent Organization Transition. Proceedings of the 2005 International Conference on Artificial Intelligence (IC-AI '05) Las Vegas, NV.
  11. Eric Matson, Scott DeLoach (April 2005). Formal Transition in Agent Organizations. IEEE International Conference on Knowledge Intensive Multiagent Systems (KIMAS '05) Waltham, MA.
  12. Eric Matson, Scott DeLoach (April 2005). Autonomous Organization-Based Adaptive Information Systems. IEEE International Conference on Knowledge Intensive Multiagent Systems (KIMAS '05 Waltham, MA.
  13. Eric Matson, Scott DeLoach, Robyn Pauly. (July - December 2004). Building Interest in Math and Science for Rural and Underserved Elementary School Children Using Robots. Journal of STEM Education: Innovations and Research Special Issue on Resources for Pre-college EducationUSA.
  14. Scott A. DeLoach, Eric T. Matson, Yonghua Li (August 2003). Exploiting Agent Oriented Software Engineering in the Design of a Cooperative Robotics Search and Rescue System.. The International Journal of Pattern Recognition and Artificial Intelligence,, 17 (5), pp. 817-835.
Fatma Mili

Articles

  1. J. Meyer, F. Mili, S. Ghanekar “Algorithmic Design and Evaluation of Self-Organizing Systems - with Application to 2-Dimensional Event Tracking”, to appear 2013 Journal Of Autonomous Agents And Multi-agent Systems, Springer Verlag.
  2. Sumeet Mahalda, F. Mili “Self-organizing self-adaptive network through differential elasticity”, 2013 ITERA Conference, Cinicinatti, Ohio, April 2013.
  3. J. Meyer, F. Mili, S. Ghanekar “Incentive-Based Self-Organization for 2 Dimensional Event Tracking”,  Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2011),  October 3-7, 2011, Ann Arbor, Michigan, USA.
  4. L. Pittiglio, M. Harris, F. Mili “Development and Evaluation of a Three-Dimensional Virtual Hospital Unit: VI-MED,” Computers, Informatics, Nursing, May 2011, Lippincott Williams & Wilkins, pp. 267-271.
  5. Distributed Algorithms for Event Tracking through Self-assembly and Self-organization,
  6. F. Mili, S. Ghanekar, J. Meyer, Special Session on Biomedical and Bio-Inspired Engineering Systems II held at the 53rd IEEE International Midwest Symposium on Circuits and Systems (MWSCAS 2010),  August 1st-4th, 2010, Seattle, Washington, USA
  7. S. Ghanekar, N. Alrajei, F. Mili “Economy-Based Intruder Detection in Sensor Networks”, Book chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010.
  8. F. Mili, N. Alrajei “Differential Elasticity for Network Resilience”, IEEE NAECON Bioinspired Systems and Biomedical Applications, Dayton Ohio, July 2010. IEEE Press. 
  9. F. Mili, J. Meyer, “Self-regulating Sensor Network”, 53rd IEEE International Midwest Symposium on Circuits & Systems, Seattle, Washington from August 1-4, 2010. IEEE Press.
  10. Fatma Mili, Swapna Ghankear, John Meyer “Distributed Algorithms for Event Tracking through Self-assembly and Self-organization”, 53rd IEEE Int'l Midwest Symposium on Circuits & Systems Seattle, Washington from August 1-4, 2010. IEEE Press.
  11. S. Ghanekar, N. Alrajei, F. Mili “Economy-Based Intruder Detection in Sensor Networks”, Book chapter in Security of Self-Organizing Networks: MANET, WSN, WMN, VANET Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010.
  12. F. Mili, N. Alrajei “Adaptive Immunity Through Differential Elasticity”, ADAPTIVE 2010, 2nd International Conference on Adaptive and Self-Adaptive Systems and Applications, Lisbon, Portugal, November 21st-26th, 2010.
  13. J. Meyer, F. Mili, “Self Adaptive Selective Sensor Network Querying”, Environment-Mediated Coordination in Self-Organizing and Self-Adaptive Systems Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO),  October 20-24, 2008, Venice, Italy.
  14. F. Mili, J. Meyer "Adaptive Optimization in Sensor Networks" Intelligent Systems and Agents ISA 2008, July 20-24, Amsterdam, Netherlands.
  15. F. Mili, S. Ghanekar, N. Alrajei, "Economic Based vs. Nature-Inspired Intruder Detection in Sensor Networks",  IEEE International Conference on Risks and Security of Internet and Systems CRISIS, October 25-28, 2008.
  16. W. Herbert, F. Mili "Consistency in Real-Time Route Guidance", 15th World Congress on Intelligent Transport Systems November 16-20, 2008, New York.
  17. J. Barr, F. Mili, L. Pittiglio, M. Harris, "VI-MED: Fish-tank Approach to Nurse Practical Training.", IEEE Computer Based Medical Systems Conference, Finland, June 17-19, 2008.
  18. W. Herbert, F. Mili "Route Guidance : State of the Art vs. State of the Practice", IEEE Intelligent Vehicle 2008 Symposium, Netherlands, June 4-6 2008.
  19. F. Mili, J. Barr, M. Harris, L. Pittiglio, "Nurse Training: 3-D Game with Learning Objectives", International Conference Advances in Comp. Hum. Interaction. Ste Luce, Feb. 2008.
  20. J. Meyer, F. Mili, Elhajj “Selective Querying in Sensor Networks: Parameters and Strategies”, IEEE 21st International Conference on Advanced Information Networking and Applications,  May 21-23, 2007, Niagara Falls, Canada.
  21. J. Meyer, G. Saxena, F. Mili,  “Adaptive Surveillance in Sensor Network Querying”,  The 2007 IEEE International Conference on Electro-Information Technology,  May 17-20, 2007, Chicago, IL.
  22. A. Youssuf, N. Alrajei, F. Mili "Information-Theory based Intruder Detection in Sensor Networks", IICAI, December 17-19, Pune, India 2007.
  23. F. Mili, J. Meyer, "Information-Theory based Query Optimization in Sensor Networks," IEEE Wireles and Optical Communications Conference, 11-14 Oct. 2006, Hangzhou, China.
  24. A. Youssuf U. Ahmad, Ch. Staff "Design of a Personalized Cognitive Trainer" ACM Southeast 2007 Conference, ACMSE 2007, March 23-24, 2007, Winston-Salem, N. Carolina, USA.
  25. F. Mili, I. Sethi, "Mentoring Undergraduate Students in Computing Research: Experience and Lessons Learned", NCUR® 21st National Conference on Undergraduate Research at Dominican University of California April 12 - 14, 2007.
  26. F. Mili, S. Ghanekar, S. Dungrani "Building and Using an Ontology of Tasks", OWL-Experience and Directions 2005, November 11-13 Galway Ireland 2005 Lecture Notes in Computer Science, Springer Verlag.
  27. F. Mili, S. Ghanekar "Task Performance Analysis: Early Insight from Augmented OWL-S Ontologies", Chapter in The Semantic Web for Knowlege and Data Management: Technologies and Experiences,  2007.
  28. S. Ghanekar, F. Mili, I. Elhajj "Agile Sensor Networks Adaptive Coverage via Mobile Nodes", AAAI FLAIRS Conference, May 2006.
  29. A. Macklem, F. Mili "Formal Verification of Cognitive Models" AAAI FLAIRS Conference, May 2006.
  30. F. Mili A. Macklem "Heuristic-based Validation of Cognitive Models" ACS/IEEE AICCSA Conference, April 2006.
  31. A. Mili, F. Sheldon, F. Mili, J. Desharnais "Recoverability preservation: a measure of last resort" Innovations System Software Engineering 1: 54-62, 2005.
  32. F. Mili, W. Li "Algebraic Approach to Specifying Part-Whole Associations", AAAI FLAIRS Conference, May 2005.
  33. A. Macklem, F. Mili "Patterns and Conflicts for the Specification of Cognitive Models" International Conference on Applications of AI, Portugal, February 2005.
  34. A. Mili, F. Sheldon, F. Mili, M. Shereshevsky, J. Desharnais "Perspectives on Redundancy: Applications to Software Certification", IEEE HICCS 38, Hawaii, January 2005.
  35. A. Mili, F. Sheldon, F. Mili, J. Desharnais "Recoverability Preservation: A Measure of Last Resort" Proceedings of the PRInciples of Software Engineering (PRISE) 04, Buonos Aires, Argentina, November 22-27, 2004, Springer Verlag.
  36. A. Macklem, F. Mili "Patterns and Conflicts for the Specification and Verification of Cognitive Models" 24th Soar Workshop, June 7-11, 2004.
  37. F. Mili, K. Narayanan, L. Blackwell “Theoretical Framework for defining validity and quality in modeling”, International Conference on Information Quality, November 7-9, MIT.
  38. Z. Ma and F. Mili, “Knowledge Comparison in Design Repositories”, Engineering Applications of Artificial Intelligence, 2003.
  39. F. Mili and Z. Ma, “Modeling Engineering Information with Database Models: Needs and Solutions”, IEEE Conference on Systems, Man, and Cybernetics, October 6-9, Hammamet, 2002.
  40. Z.M. Ma and F. Mili “Handling Fuzzy Information in extended Possibility-Based Fuzzy Relational Databases”, International Journal of Intelligent Systems, Vol. 17, No 10, 2002.
  41. F. Mili and M. Polis “Model Assessment for quality decisions”, Proceedings Management Information Systems, 2002, WIT Press, pp.247-257.
  42. F. Mili and Z. Ma “Eliciting and Formalizing Flexibility in Engineering Design Repositories”, Proceedings of the 2002 International Conference on Fuzzy Systems and Knowledge Discovery, November 18-22, 2002, Singapore.
  43. P. McDonald, F. Mili “Monte Carlo estimation of maintenance contracts”, Proceedings of the 17th International Forum on COCOMO and Software Cost Modeling, October 22-25, 2002, Los Angeles, CA.
  44. F. Mili, et al.  “Knowledge Modeling for Design Decisions”, Artificial Intelligence in Engineering 15 (2001) 153-164.  
  45. F. Mili, L. Blackwell, A. Gokani, “Multi-disciplinary perspective on Knowledge Quality”, Proceedings of the 14th International FLAIRS Conference, AAAI Press, Key West, Florida, pp. 315-319.
  46. F. Mili, A. Gokani, K. Fry, M. Ram, E.  Zouras, “Knowledge Modeling for Design Decisions”, Proceedings of the Workshop on Advances in Conceptual Modeling; AI in Design Conference, Worcester, MA, June 2000.
  47. F. Mili “Knowledge representation and management for engineering design”, Proceedings of the AAAI Spring Symposium Series 2000, Stanford University, March 2000.
  48. F. Mili, K. Narayanan, D. VandenBossche, “Domain Knowledge in Engineering Design: Nature, Representation and Use” in Industrial Knowledge Management - A Micro Level Approach, R. Roy (Ed.), Springer Verlag, London, 2000, pages 55-72.  
  49. F. Mili “Managing Engineering Knowledge Federations”, in Industrial Knowledge Management - A Micro Level Approach, R. Roy (Ed.), Springer Verlag, London, 2000, pages 513-524.  
  50. F. Mili, L. Blackwell, M. Ram, K. Fry, “Multi-disciplinary Perspective on Knowledge Quality Dimensions of Knowledge Quality”, Proceedings of the FLAIRS Conference, Key West, FL, May 2001.
  51. F. Mili, K. Naryanan, V. Atluri “Modelling Framework for Collaborative Design” Proceedings of the Collaborative Technologies Workshop, Information Institute Air Force Research laboratory and Oakland University. 10-11 November 1999, pp.16-19.
  52. A. Mili, J. Deharnais, M. Frappier, F. Mili, “Verifying Objects Against Axiomatic Specifications: A Fixpoint Approach” Proceedings of the Conference on Software Engineering and Artificial Intelligence, December 1998, ACM Press.
  53. F. Mili, K. Narayanan  “Domain Centered Design Support”, Proceedings of Prolamat 98, 10th International Conference of IFIP TC5, WG 5.2, 5.3. September 1998,Trento, Italy.
  54. F. Mili and K. Narayanan  “Managing and Using Domain Knowledge in Design Environments. ” Artificial Intelligence in Design, Lisbon, Portugal, July 1998. 
  55. F. Mili  “On the Formalization of Business Rules: Generic Rules for Composition, and Containment”, Second ECOOP Workshop on Precise Semantics, Eds. H. Kilov & B. Rumpe, Brussels, Belgium, pp.122-129, 1998.
  56. F. Mili, A. Mili “A Relational Logic of Algorithmic Design”, in Relational Methods in Computer Science, Lecture Notes in Computer Science, 1998.
  57. F. Mili “Problem Solving Reuse”, in the Proceedings of the Workshop on Software Reuse, IEEE CS Press, March 23-26, 1997, Columbus, OHIO.
  58. F. Mili  “Transformational Based Problem Solving Reuse”,  Proceedings of the International Conference on Software Engineering and Knowledge Engineering, June 17-20, 1997, Knowledge Systems Institute. 
  59. F. Mili, “User-Oriented Library Documentation” 1st International Workshop on Knowledge-Based Use and reuse of Program Libraries, Sophia Antipolis, November 1995.
  60. F. Mili, Y. L. Wong “Knowledge Level Assessment of Problem Solving Methods”.  Hawaii International Conference on Systems Sciences, IEEE Computer Society, January 1996.
  61. H. Mili, F. Mili, A. Mili  “Software Reuse: Research Issues and Challenges”,  IEEE Transactions on Software Engineering, June 1995, pp:528-62.
  62. F. Mili “Data Analysis in Scientific Databases”, IEEE Conference on Tools for Artificial Intelligence, November 1993.
  63. A. Mili, J. Desharnais, F. Mili. “On The Mathematics of Sequential Decompositions”, Science of Computer Programming 20(1993) 253-289. Elsevier.
  64. J. Desharnais, A. Mili, F. Mili “A Relational Division Operator: The Conjugate Kernel”, Theoretical Computer Science, 114(1993) 247-272.
  65. F. Mili, A. Mili, “Heuristics for Constructing While Loops” Science of Computer Programming, No 18, pp67-106. 1992 Elsevier North Holland. 
  66. N. Boudrigua, A. Mili, R. Zalila, F. Mili, “A Relational Model for the Specification of Data Types' Computer Languages Vol. 17, No 2, 1992, pp101-113. Pergammon Press.
  67. F. Mili, I. Szoke, “AMSEC: Assisted Model Selection, Evaluation, and Choice”, Proceedings of the Hawaii International Conference on Systems Sciences, IEEE Computer Society Press, January 1992.
  68. F. Mili, F. Cioch “End-User Oriented Integration of Decision Models”, Proceedings of DSS, North Holland Press, 1990.
  69. F. Cioch, F. Mili “Information Sharing during software development and maintenance” Eighth Annual Pacific Northwest Software Quality Conference, Portland, Oregon, 1990.
  70. J. Desharnais, A. Jaoua, F. Mili, A. Mili “The conjugate kernel: An operator for program construction”, Workshop on constructive algorithms: the role of relations in program development, Hollum-Ameland, Netherlands, Sept 1990.
Byung-Cheol Min

Journals

  1. Byung-Cheol Min, Eric T. Matson, and Jin-Woo Jung, “Finding the Optimal Location and Allocation of Relay Robots for Building a Rapid End-to-end Wireless Communication”, Ad Hoc Networks. (Under review)
  2. Daniel K. Schrader, Byung-Cheol Min, and Eric T. Matson, “Real-time averaging of position data from multiple GPS receivers”, Measurement. (Under review)
  3. Byung-Cheol Min, Eric T. Matson, and Jin-Woo Jung, “Active Antenna Tracking System with Directional Antennas for Enhancing Wireless Communication Capabilities of a Networked Robotic System”, Journal of Field Robotics, 2015.
  4. Byung-Cheol Min, Eric T. Matson, Jinung An, and Donghan Kim, “Improvement of Violinist Robot using a Passive Damper Device”, Journal of Intelligent and Robotic Systems, Vol. 72, Issue 3-4, pp. 343-355, Dec. 2013.
  5. Byung-Cheol Min, John Lewis, Eric T. Matson, and Anthony H. Smith, “Heuristic Optimization Techniques for Self-orientation of Antennas in Long-distance Pointto-point Broadband Networks”, Ad Hoc Networks, Vol. 11, Issue 8, pp. 2252-2263, Nov. 2013.
  6. John Lewis, Eric T. Matson, Sherry Wei, and Byung-Cheol Min, “Implementing HARMS-based Indistinguishability in Ubiquitous Robot Organizations”, Robotics and Autonomous Systems, Vol. 61, No. 11, pp. 1186-1192, Nov. 2013. 
  7. Dong-Hoe Kim, Byung-Cheol Min, and Donghan Kim, “A Dust Detection Sensor System for Improvement of a Robot Vacuum Cleaner”, Journal of Institute of Control, Robotics and Systems, Oct. 2013.
  8. Cory Q. Nguyen, Byung-Cheol Min, Eric T. Matson, Anthony H. Smith, J. Eric Dietz, and Donghan Kim, “Using Mobile Robots to Establish Mobile Wireless Mesh Networks and Increase Network Throughput”, International Journal of Distributed Sensor Networks, Vol. 2012, Article ID 614532, 2012. 
  9. Byung-Cheol Min, Moon-Su Kim, and Donghan Kim, “Fuzzy Logic Path Planner and Motion Controller by Evolutionary Programming for Mobile Robots”, International Journal of Fuzzy Systems, Vol. 11, No. 3, pp. 154-163, Sep. 2009.
  10. Byung-Cheol Min, Donghan Kim, Yoon Hyuk Kim, Ki Yeoul Kim, and Chongkug Park, “Development of Violin Self-Training Algorithm Using Fuzzy Logic”, Journal of Korean Institute of Intelligent Systems, Vol. 19, No. 4, Aug. 2009. 

Book Chapters

  1. Soo Hyeok Kang, Yong Ho Kim, Byung-Cheol Min, Soon-Geul Lee, Jinung An, Donghan Kim, “Smart Floor with Learning Capability for Mobile Robot System”, Recent Advances in Robotics and Automation (Series: Studies in Computational Intelligence), Vol. 480, pp. 205-215, Springer Berlin Heidelberg, 2013.

Conferences

  1. Byung-Cheol Min, Suryansh Saxena, Aaron Steinfeld, and M. Bernardine Dias, “Incorporating Information from Trusted Sources to Enhance Urban Navigation for Blind Travelers”, IEEE International Conference on Robotics and Automation (ICRA), Seattle, Washington, May 26-30, 2015.
  2. Byung-Cheol Min, Eric T. Matson, Anthony H. Smith, and J. Eric Dietz, “Using Directional Antennas as Sensors to Assist Fire-fighting Robots in Large Scale Fires”, 2014 IEEE Sensors Applications Symposium (SAS 2014), Queenstown, New Zealand, Feb. 18-20, 2014. 
  3.  Byung-Cheol Min and Eric T. Matson, “Robotic Follower System using Bearing-only Tracking with Directional Antennas”, in Proc. International Conference on Robot Intelligence Technology and Applications (RiTA), pp. 37-58, 2014.
  4. Esther Rolf, Matt Whitlock, Byung-Cheol Min, and Eric T. Matson, “Enhancing Wi-Fi Signal Strength of a Dynamic Heterogeneous System Using a Mobile Robot Provider”, in Proc. International Conference on Robot Intelligence Technology and Applications (RiTA), pp. 927-937, 2014.
  5. Jae-Seok Yoon, Byung-Cheol Min, Seong-Og Shin, and Donghan Kim, “GA-based Optimal Waypoint Design for Improved Path Following of Mobile Robot”, in Proc. International Conference on Robot Intelligence Technology and Applications (RiTA), pp. 127-136, 2014.
  6. Byung-Cheol Min, Eric T. Matson, and Bakytgul Khaday, “Design of a Networked Robotic System Capable of Enhancing Wireless Communication Capabilities”, 11th IEEE International Symposium on Safety, Security, and Rescue Robotics (SSRR 2013), Sweden, Oct. 21-26, 2013.
  7. Sangyup Lee, Byung-Cheol Min, Dong-Hoe Kim, Jae-Seok Yoon, and Donghan Kim, “Passive RFID Positioning System Using RF Power Control”, in Proc. International Conference on Robot Intelligence Technology and Applications (RiTA), Gwangju, Korea, Dec. 2012. 
  8. Ji Hyeon Hong, Byung-Cheol Min, Julia M. Taylor, Victor Raskin, and Eric T. Matson, “NL-Based Communication with Firefighting Robots”, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1461-1466, Seoul, Korea, Oct. 14-17, 2012. 
  9. Soo Hyeok Kang, Byung-Cheol Min, Ji Hyeon Hong, Eric T. Matson, Soon-Geul Lee, and Donghan Kim, “Novel Positioning System for Mobile Robot Using RFID Power Control”, Joint Proceedings of the 13th Annual TAROS Conference and the 15th Annual FIRA RoboWorld Congress, Bristol, UK, August 20-23, 2012. 
  10. Daniel K. Schrader, Byung-Cheol Min, Eric T. Matson, and J. Eric Dietz, “Combining Multiple, Inexpensive Receivers to Improve Accuracy and Reliability”, 2012 IEEE Sensors Applications Symposium (SAS 2012), University of Brescia, Italy, Feb. 7-9, 2012.
  11. Byung-Cheol Min, John Lewis, Daniel K. Schrader, Eric T. Matson, and Anthony H. Smith, “Self-orientation of Antennas, Assisted by Mobile Robots, for Receiving the Best Wireless Signal”, 2012 IEEE Sensors Applications Symposium (SAS 2012), University of Brescia, Italy, Feb. 7-9, 2012. 
  12. Eric T. Matson, Julia M. Taylor, Victor Raskin, Byung-Cheol Min, and E. Cho Wilson, “A Natural Language Exchange Model for Enabling Human, Agent, Robot and Machine Interaction”, 5th International Conference on Automation, Robotics and Applications (ICARA 2011), Wellington, New Zealand, Dec. 6-8, 2011. 
  13. Soo Hyeok Kang, Yong Ho Kim, Eun Jin Lee, Soon-Geul Lee, Byung-Cheol Min, Jinung An, and Donghan Kim, “Implementation of Smart Floor for Multi-Robot System”, 5th International Conference on Automation, Robotics and Applications (ICARA 2011), Wellington, New Zealand, Dec. 6-8, 2011.
  14. Byung-Cheol Min, Ji Hyeon Hong, and Eric T. Matson, “Adaptive Robust Control (ARC) for an Altitude Control of a Quadrotor Type UAV Carrying an Unknown Payloads”, 2011 11th International Conference on Control, Automation and Systems (ICCAS 2011), KINTEX, Gyeonggi-do, Korea, Oct. 26-29, 2011.
  15. Eric T. Matson and Byung-Cheol Min, “M2M infrastructure to integrate humans, agents and robots into collectives”, Instrumentation and Measurement Technology Conference (I2MTC), 2011 IEEE, Hangzhou, China, May 10-12, 2011.
  16. Byung-Cheol Min, Hina Chaudhry, Eric T. Matson, Anthony H. Smith, and J. Eric Dietz, “Rural Energy Security using Autonomous Micro-turbine Smart Grids”, 2011 IEEE Rural Power Conference (IEEE REPC), Chattanooga, Tennessee, USA, April 10-13, 2011. 
  17. Jeong Wan Kim, Yong Ho Kim, Byung-Cheol Min, and Donghan Kim, “Tacit Navigation Method for Multi-Agent System”, in Proc. FIRA Robot World Congress, Bangalore, India, Sep. 15-17, 2010.
  18. Byung-Cheol Min, Hee Yeul Kwon, and Donghan Kim, “Path Planning Algorithm for VTOL Type UAVs Based on the Methods of Ray Tracing and Limit Cycle”, IEEE International Symposium on Computational Intelligence in Robotics and Automation (CIRA 2009), Dajeon, Korea, Dec. 2009.
  19.  Byung-Cheol Min, Chan Ho Cho, Kyung Min Choi, and Donghan Kim, “Development of a Micro Quad-Rotor UAV for Monitoring an Indoor Environment”, in Proc. FIRA Robot World Congress, Incheon, Korea, Aug. 16-20, 2009.
  20. Chan Ho Cho, Byung-Cheol Min, and Donghan Kim, “A Gait Generation for an Unlocked Joint Failure of the Quadruped Robot with Balance Weight”, in Proc. FIRA Robot World Congress, Incheon, Korea, Aug. 16-20, 2009. 
  21. Byung-Cheol Min, Eun Jin Lee, Soo Hyeok Kang, and Donghan Kim, “Limit-cycle Navigation Method for a Quad-rotor Type UAV”, Industrial Electronics, 2009. ISIE 2009, IEEE International Symposium on, pp. 1352-1357, Seoul, Korea, July 2009.

Reports & Extended Abstracts

  1. Byung-Cheol Min, Aaron Steinfeld, and M. Bernardine Dias, “Towards Effective Human-Robot Interaction for Visually Imparied Adults”, ICRA 2015, Late-Breaking Reports, Seattle, May 26-30, 2015. 
  2. Byung-Cheol Min, Aaron Steinfeld, and M. Bernardine Dias, “How Would You Describe Assistive Robots to People Who are Blind or Low Vision?”, ACM/IEEE HRI 2015, Late-Breaking Reports, Portland, Mar. 2-5, 2015.
  3. Alekhya Jonnalagedda, Lucy Pei, Suryansh Saxena, Ming Wu, Byung-Cheol Min, Ermine A. Teves, Aaron Steinfeld, and M. Bernardine Dias, “Enhancing the Safety of Visually Impaired Travelers in and around Transit Stations”, tech. report CMURI-TR-14-28, Robotics Institute, Carnegie Mellon University, December, 2014. 

Invited Talks

  1. Gacheon University, Seongnam, Korea, April, 2015.
  2. Dongguk University, Seoul, Korea, April, 2015.
  3. Korea Institute of Science and Technology (KIST), Seoul, Korea, April, 2015.
  4. Transportation Research Board 94th Annual Meeting, Washington D.C., January, 2015.

Patents

  1. Byung-Cheol Min et al., “Method for providing guidance information based on user information”, Patent No. 1011983850000, October 2012. (Korean Patent) 
  2. Byung-Cheol Min et al., “Apparatus for Cleaning Exterior Wall of Building”, Patent No. 1011815400000, September 2012. (Korean Patent) 
  3. Byung-Cheol Min et al., “Walking guide Robot for blind person”, Patent No. 101146- 8550000, May 2012. (Korean Patent) 
  4. Byung-Cheol Min et al., “LED Lighting Apparatus with Air Levitation System”, Patent No. 1010905640000, November 2011. (Korean Patent) 
  5. Byung-Cheol Min et al., “Embedding Device for RFID Tag”, Patent No. 101056 8640000, August 2011. (Korean Patent) 

 

 

Ioannis Papapan...

Journals

  1. F. Zafari, I. Papapanagiotou, K. Christidis, "Micro-location for Internet of Things equipped Smart Buildings", IEEE Internet of Things Journal 2015
  2. I. S. Bayram, I. Papapanagiotou, "A Survey on Communication Technologies for Internet of Electric Vehicles", EURASIP Journal on Wireless Communications and Networking, Springer Online, 2015
  3. I. Papapanagiotou, M. Falkner, M. Devetsikiotis, “Optimal Functionality Placement for Multiplay Service Provider Architectures”, IEEE Transactions on Network and Service Management, Vol 9, no. 3, Sep 2012
  4. I. Papapanagiotou, F. Granelli, D. Kliazovich, M. Devetsikiotis, "A Metamodeling Approach for Cross-Layer Optimization: A Framework and Application to Voice over WiFi”, Elsevier Simulation Modeling Practice and Theory, Volume 19, pp. 2117-2129, 2011.
  5. I. Papapanagiotou, D. Toumpakaris, J. Lee, M. Devetsikiotis, “A Survey on Mobile WiMAX Networks: Objectives, projected features and technical challenges” IEEE Communications Tutorials & Surveys, pp. 3-18, Vo.11, Issue 4, Dec. 2009 (Top 10 IEEE Comsoc for Dec09-Jan10-Feb10-Mar10-Apr10)
  6. I. Papapanagiotou, G.S. Paschos, M. Devetisikiotis, “A Comparison Performance Analysis of QoS WLANs: Approaches with Enhanced Features", Special Issue on Multimedia Transmission over Emerging Wireless Technologies, Advances in Multimedia Journal, Hindawi Publications. Vol. 2007, Article ID 23817.
  7. G. S. Paschos, I. Papapanagiotou, S. A. Kotsopoulos, G. Karagiannidis, “A new MAC protocol with pseudo-TDMA behavior for supporting Quality of Service in 802.11 Wireless LANs”, EURASIP Journal on Wireless Communications and Networking, Hindawi Publications, Vol. 2006, Article ID 65836.

Conferences

  1. A. Singla, A. Mudgerikar, I. Papapanagiotou, A. A. Yavuz, "HAA: Hardware-Accelerated Authentication for Internet of Things in Mission Critical Vehicular Networks", IEEE MILCOM 2015, Tampa FL.

  2. F. Zafari, I. Papapanagiotou, "Enhancing iBeacon based Micro-Location with Particle Filtering", IEEE GLOBECOM 2015, San Diego CA.

  3. C. Abshire, D. Gusev, I. Papapanagiotou, S. Stafeyev, "A mathematical method for visualizing Ptolemy's India in modern GIS tools"10th Jubilee ICA Conference+Workshop Digital Approaches to Cartographic Heritage "Digital Approaches to Cartographic Heritage" 2015, Corfu, Greece
  4. Z. Yao, I. Papapanagiotou, R.D. Callaway, "Multi-Dimensional Scheduling in Cloud Storage Systems" IEEE ICC 2015, London, UK.
  5. Z. Yao, I. Papapanagiotou, R.D. Callaway, "SLA-aware Resource Scheduling for Cloud Storage" IEEE CLOUDNET 2014, Luxembourg City, Luxembourg.   
  6. I. S. Bayram, G. Michailidis, I. Papapanagiotou, M. Devetsikiotis, “Decentralized Control of Electric Vehicles in a Network of Fast Charging Stations”, IEEE GLOBECOM 2013, Atlanta GA.
  7. I. Papapanagiotou, E. Nahum, V. Pappas, “Configuring DHCP Leases in the Smartphone Era”, ACM IMC 2012, Boston MA.
  8. I. Papapanagiotou, E. Nahum, V. Pappas, “Smartphones vs. Laptops: Comparing Web Browsing Behavior and the Implications for Caching”, ACM SIGMETRICS 2012, London, UK (short paper).
  9. I. Papapanagiotou, R.D. Callaway, M. Devetsikiotis, “Chunk and Object Level Deduplication for Web Optimization: A Hybrid Approach”, IEEE ICC 2012, Ottawa, Canada.
  10. U.K. Chaudhary, I. Papapanagiotou, M. Devetsikioitis, “Flow Classification Using Clustering and Association Rule Mining”, IEEE CAMAD 2010, Miami FL, USA. (Best Paper Award)
  11. A.M. Gossett, I. Papapanagiotou, M. Devetsikiotis, “An Apparatus for P2P Classification in Netflow Traces”, IEEE GLOBECOM 2010 Workshop on Enabling the Future Service-Oriented Internet (EFSOI 2010) (NSF Travel Grant Award - source code)
  12.  I. Papapanagiotou, M. Devetsikiotis, “Aggregation Network Design Methodologies for Triple Play Services”, IEEE CCNC 2010, pp.1-5, Las Vegas, USA
  13.  I. Papapanagiotou, G.S. Paschos, S.A. Kotsopoulos, M. Devetsikiotis, “Extensions and Comparison of QoS-Enabled WiFi Models in the Presence of Errors” IEEE GLOBECOM 2007, 26-30 November 2007, Washington DC, USA. (Best Paper Award / NSF Travel Grant Award)
  14. I. Papapanagiotou, J.S. Vardakas, G.S. Paschos, M.D. Logothetis, S.A. Kotsopoulos,“Performance Evaluation of IEEE 802.11e based on ON-OFF Traffic Model” ACM MOBIMEDIA 2007, Nafpaktos, Greece.
  15. J. S. Vardakas, I. Papapanagiotou, M. D. Logothetis, S.A. Kotsopoulos, “On the End-to-End Delay Analysis of the IEEE 802.11 Distributed Coordination Function” IEEE Computer Society, Second International Conference on Internet Monitoring and Protection (ICIMP 2007), Silicon Valley, USA.
  16. G. S. Paschos, I. Papapanagiotou, E. D. Vagenas, S. A. Kotsopoulos, “Performance analysis of a new Admission Control for 802.11 WLAN Networks in ad hoc mode”, CSNDSP 2006, pp. 215-219, Patras, Greece.
  17. G. S. Paschos, I. Papapanagiotou, C. G Argyropoulos, S. A. Kotsopoulos, “A Heuristic Strategy for 802.16 WiMAX scheduler for Quality of Service”, 45th Congress FITCE 2006, pp. 169-175, Athens, Greece.

Book Chapters

  1. R. Ghosh, I. Papapanagiotou, K. Boloor, "A Survey on Research Initiatives for Healthcare Clouds" In Cloud Computing Applications for Quality Health Care Delivery, 1-18 (2014), accessed August 10, 2014. doi:10.4018/978-1-4666-6118-9.ch001
  2. I. Papapanagiotou, J. Hui, M. Devetsikiotis, “On the Pricing of WiMAX networks”, in the Book “WiMAX Evolution: Emerging Technologies and Applications”, John Wiley & Sons Publications, March 2009, ISBN: 978-0470696804 (link)
  3. G.S. Paschos, I. Papapanagiotou, T.M. Bohnert, “Power Saving Mechanisms in IEEE 802.16e Wireless Networks”, in the Book “WiMAX Networks Planning and Optimization”, Auerbach Publications, CRC Press, Taylor & Francis Group, April 2009, ISBN: 978-1420066623
  4. I. Papapanagiotou, G.S. Paschos, “A case study on the Energy Consumption and Mobility of the WLANs and WMANs”, in the Book “Heterogeneous Next Generation Networks, Innovations and platforms”, IDEA Group Publishing, October 2008, ISBN: 978-1605661087 (link)

Patents

  1. E. Nahum, I. Papapanagiotou, V. Pappas, "Differential dynamic host configuration protocol lease allocation", US 20140122386 A1 (App.)
  2. E. Nahum, I. Papapanagiotou, V. Pappas, "Differential dynamic host configuration protocol lease allocation that classifies the client/operating system", US 8832007 B2 (Grant)
  3. R.D. Callaway, I. Papapanagiotou, "Dynamic caching module selection for optimized data deduplication ", US 20140281262 A1 (App.)
  4. R.D. Callaway, I. Papapanagiotou, "Dynamic caching module selection for optimized data deduplication" US 20140281258 A1 (App.)

Education Papers

  1.  I. Papapanagiotou and N.Duval-Couetil, "Demystifying the Patent Process: Intellectual Property Labs in Engineering and Technology", 2015 American Society of Engineering Education (ASEE) Annual Conference and Exposition, Seattle, WA, 2015
  2. I. Papapanagiotou, J. V. Devide, M. Devetsikiotis, M. Montoya-Weiss, “Networked 3D Virtual Computing for Collaborative Environments in Science and Education: Towards VCL 3.0”, 2nd International Conference on the Virtual Computing Initiative (ICVCI 2), 15-16 May 2008, Research Triangle Park NC, USA

Technical Articles

  1.     I. Papapanagiotou, M. Behnen, JP Parkin, "DB2 NoSQL for JSON Capabilities, Part 4: Using the IBM NoSQL Wire Listener for DB2, IBM developerWorks article, June 2013.
Guity Ravai
  1. Purdue TLT (1999-2006). Teaching Workshops. I have attended many teaching workshops during the past few years at Purdue University., West Lafayette, IN..
  2. Craig A. Jensen (1999, 10). Appdev, Application Development Training Company. Worksop Training in Visual Basic 6.0, Chicago, IL.
  3. Behrouz Forouzan & Richard Gilberg, Entire book. (2006) A Structured approach using C++ McGraw Hill. (The authors were writing the 2nd edition to the text book. I reviewed the entire book, and submitted comments on each chapter.)
  4. Kyle Lutes, Alka Harriger, and Jack Purdum, Chapters 1 to 12. (2005) Introduction to Object-Oriented Programming with C#: An Information Systems Approach Boston, MA: Course Technology. (ISBN: 0-619-21735-9)
  5. Guity Ravai and Ibrahim Baggili, (2010) Step Into Programming with Visual Basic .NET, Third Edition Kendall Hunt. (An appendix on Integrating Excel into VB.NET was added plus more examples accorss the book. )
  6. Guity Ravai and Ibrahim Baggili, (2008) Step Into Programming with Visual Basic .NET, Second Edition Kendall Hunt.
  7. Guity Ravai & Ibrahim Baggili, (2007) Step into Programming with Visual Basic .NET Kendall / Hunt.
Phillip Rawles
  1. Goldman, J.E., & Rawles*, P. T., (2004) Applied data communications: A business oriented approach (4ed) New York, NY: John Wiley & Sons, Inc..
  2. Rawles, P. T., (2001) Applied data communications: A business oriented approach (3ed): Instructor manual with test questions New York, NY: John Wiley & Sons, Inc.
  3. Goldman*, J.E., & Rawles*, P. T., (2001) Applied data communications: A business oriented approach (3ed) New York, NY: John Wiley & Sons, Inc.
  4. Rawles, P. T., (2000) Local area networks: A client/server approach (2ed): Instructor manual with test questions New York, NY: John Wiley & Sons, Inc.
  5. Goldman*, J.E., & Rawles*, P. T. , (2000) Local area networks: A client/server approach (2ed) New York, NY: John Wiley & Sons, Inc.
  6. Goldman*, J.E., Rawles, P. T., & Mariga, J. R., (1999) Client/server information systems: A business oriented approach New York, NY: John Wiley & Sons, Inc.
  7. Rawles, P. T.* & Baker, K. A. (2003). Developing a public key infrastructure for use in a teaching laboratory. Proceeding of the 4th conference on information technology curriculum on Information technology education New York, : ACM Press.
  8. Rawles, P. T.* & Lei, K. (2003). Technology to enable learning: Strategic decisions on technology selections for facilitating a network/systems laboratory using real options & total cost of ownership theories.. Proceeding of the 4th conference on information technology curriculum on Information technology education. New York, : ACM Press.
  9. Herrick, R.J. (2001). Applied Electrical Engineering Handbook. New York, NY: IEEE Press. (Upon invitation Professor Rawles contributed a 90 page chapter on local area networking to this comprehensive reference targeted toward electrical and electronic engineers..)
  10. Rawles, P. T. (1999). Developing and supporting a laboratory based local area network course. 1999 IACIS Refereed Proceedings (pp.223-229). Harrisonburg, VA: International Association for Computer Information Systems.
  11. Rawles, P. T. (1998). Developing and supporting a laboratory based local area network course. 1998 IACIS Refereed Proceedings (pp.369-376). Harrisonburg, VA: International Association for Computer Information Systems.
  12. Sportak, M., et al. (1997). High performance networking unleashed. SAMS Indianapolis, IN. (Professor Rawles contributed a 29-page chapter on network administration to this handbook targeted toward the professional trade marketplace..)
  13. Harriger*, A. R., and Rawles, P. T. (October 1997). An introduction to Visual BASIC.
Marcus Rogers
  1. Gupta, S., & Rogers, M. (2014). Exploring forensic implications of the fusion drive. The Journal of Digital Forensics, Security, and Law , 9 (2), 145-154.
  2. Rogers, M. & Seigfried-Spellar, K. (2014). Using internet artifacts to profile a child pornography suspect. Journal of Digital Forensics Security and Law, 9 (1), 57-66.
  3. Rogers, M. &. Seigfried, K. (2014).The future of digital forensics: Merging behavioral science & digital evidence. Young Forensic Scientist Forum: American Academy of Forensic Sciences Annual Meeting (Feb, Seattle, WA) – no proceedings.
  4. Rogers, M. (accepted). Cybercriminal taxonomies. In K. Seigfried-Spellar & M. Lanier (Eds), Essential Readings in Cybercrime Theory and Practice. San Diego, CA.
  5. Seigfried-Spellar, K. & Rogers, M. (2013). Does deviant pornography use follow a Guttman-Like progression? Computers and Human Behavior, 29 (2013), 1997-2003.
  6. Rogers, M., (in Press) Psychological Digital Crime Scene Analysis New York, NY: Praeger.
  7. Herold, R. & Rogers, M, (2011) Encyclopedia of Information Assurance Auerbach.
  8. Editorial Board, (2011) Encyclopedia of Forensic Sciences .
  9. Rogers, M., (2010) Cybersafety Series New York, New York: Chelsea House.
  10. Rogers, M. & Seigfried-Spellar, K., Crime On-line: Correlates, Causes, and Context.. (2010) T. Holt. Child pornography, pedophilia and the Internet. Carolina Academic Press.
  11. Seigfried, K., Lovely, R. &. Rogers, M, Cyber Criminology: Exploring Internet Crimes and Criminal behavior. (2010) Jaishankar, K.. Self-Reported Internet child pornography consumers: A personality assessment using Bandura’s theory of reciprocal determinism. Boca Raton, FL: CRC Press, Taylor and Francis Group.
  12. Rogers, M., (2008) Frequently Asked Questions on Cyber Crime Milano, Italy: Polimetrica.
  13. Rogers, M., (2008) Advisory Board Member • University of Winnipeg, Department of Continuing Education, Information Security Program • Purdue Employees Federal Credit Union (PEFCU) Technology Advisory Board • Champlain College, Masters in Computer Forensics (Dept. of Business Administration). • University of Central Florida, Masters of Science in Computer Forensics (Dept. of Engineering). • Defiance College Cyber Forensics Program .
  14. Former Editor-in-Chief, (2007) Journal of Digital Practice Taylor & Francis.
  15. Co-Editor, (2007) Journal of Small Scale Digital Device Forensics .
  16. Associate Editor, (2007) ISC2 Journal .
  17. Former Member Editorial Board, (2006) Computers & Security .
  18. Editorial Board, (2006) International Journal of Cyber Crimes and Criminal Justice .
  19. Associate Editor, (2005) Journal of Digital Forensics Law & Security .
  20. Editorial Board, (2005) SC Magazine .
  21. Editorial Board, (2005) International Journal of Digital Evidence .
  22. Rogers, M. & Winkworth, R. (Feb 2012). Disposable cell phone analysis: TracHac. American Academy of Forensic Sciences Annual Meeting Atlanta, GA.
  23. Craiger, P. & Rogers, M. (Feb 2012). Scientific validation of digital forensic tools: A case study. American Academy of Forensic Sciences Annual Meeting Atlanta, GA.
  24. Rogers, M. & Seigfried-Spellar, K. (Feb 2012). Applied predictive modeling: The role of behavioral sciences in digital forensics.. Atlanta, GA.
  25. Seigfried-Spellar, K. & Rogers, M. (2012). Discriminating Self-Reported Internet Child Pornography Users by Individual Differences and Sex. Submitted for publication
  26. Rogers, M. (May 2012). Digital Forensic Sciences: The Path Forward. Zagreb School of Law - Invited Lecture Rule of Law in Eastern Europe Series Zagreb, Croatia: US Embassy.
  27. Rogers, M. (May 2012). Digital Forensic Sciences: The Path Forward. Zagreb National Police Academy Zagreb, Croatia: Government of Croatia- Invited Lecture Rule of Law in Eastern Europe Series.
  28. Rogers, M. (April 2012). The Future of Digital Forensics. HTCIA Minnesota 2012 Annual Conference St. Paul, MN.
  29. Rogers, M. (August 2012). The Future of Digital Forensics: The Rise of the Machines. ISSA/Infragard Conference Chicago, IL.
  30. Pfleeger, S., Rogers, M., Bashir, M., Caine, K., Caputo, D., Losavio, M. & Stolfo, S. (2012). Does profiling make us more secure?. Privacy & Security: IEEE, 10 (4), 10-15.
  31. Rogers, M. (Sept 2012). The Role of Digital Forensics in the Justice System. 10th Annual Crown Defence Conference Winnipeg, MB.
  32. Rogers, M. (Sept 2011). Digital Investigations: The Impact on the Work Environment. 2011 Louisville Metro Infosec Conference Louisville, KY.
  33. Rogers, M. (Oct 2011). Keynote Address: Digital Forensics: The Coming Convergence. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  34. Seigfried-Spellar, K., Rogers, M., & Bertoline, G. (Oct 2011). Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Provider. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  35. Katz, E., Mislan, R. & Rogers, M. (Oct 2011). Results of Field Testing Mobile Phone Shielding Device. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  36. Datar, T., Levendoski, M. & Rogers, M. (Oct 2011). Yahoo! Messenger Forensics on Windows Vista and Windows 7.. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  37. Cho, G. & Rogers, M. (Oct 2011). Finding Forensic Information on Creating a Folder in $LogFile of NTFS. Third ICST International Conference on Digital Forensics and Cyber Crime Dublin, Ireland: ICST.
  38. Rogers, M. & Seigfried, K. (Feb 2011). Development of an Offender Classification Based Investigative Protocol for Use with Online Consumers of Child Pornography Cases: An Information Technology and Behavioral Sciences Approach. American Academy of Forensic Sciences Annual Meeting Chicago, IL.
  39. Seigfried-Spellar, K. & Rogers, M. (Feb 2011). Exploring the Progression of Non-deviant and Deviant Pornography Use by Age of Onset and Sex. American Academy of Forensic Sciences Annual Meeting Chicago, IL.
  40. Seigfried-Spellar, K. & Rogers, M. (May 11 2010). Low neuroticism and high hedonistic traits for female child pornography consumers. Advance online publication. Doi: 10.1089/cyber.2009.0212., Cyber Psychology, Behavior and Social Networking
  41. Rogers, M. (2010 2010). The Behavioral Sciences and Digital Forensics. American Academy of Psychiatry and the Law 41st Annual Meeting Tucson, AZ. (Invited Panelist.)
  42. Bagilli, I., Mohan, A. & Rogers, M. (2010). SMIRK: SMS management and information retrieval kit. Goel, Digital Forensics and Cyber Crime (pp.33-42). Heidelberg, Germany: Springer-Verlag Computer Science.
  43. Rogers, M. (May 2010). Digital evidence. Association of Inspectors General Spring Conference Indianapolis, IN.
  44. Rogers, M. & Smith, J. (June 2010). Computer forensics for the forensic audio professional. AES 39 International Conference Copenhagen, Denmark.
  45. Gao, Y., Cao, T., & Rogers, M. (2010). Reconstructing executable files: A robust address translation approach.. IET Information Security (Submitted.)
  46. Strzempka, K., Katz, E., Rogers, M., & Huff, P. (Feb 2010). Forensic analysis of a VISTA 64 hard drive. American Academy of Forensic Sciences Annual Meeting Seattle, WA: AAFS.
  47. Rogers, M. (2010). The psyche of cyber criminals: A psycho-social perspective. Ghosh & Turrini, Cybercrimes: A Multidisciplinary Perspective Heidelberg, Germany: Springer-Verlag Law Division.
  48. M. Rogers (Jan 2010). Legal, regulations, investigations and compliance. Tipton, Official (ISC)2 Guide to the CISSP CBK, 2nd edition (pp.503-538). Danvers, MA: CRC Press.
  49. Baggili, A. & Rogers, M. (Feb 2010). Effects of anonymity and pre-employment integrity on self-reported cyber crime engagement: An exploratory study. Human Factors in Information Security London, England.
  50. Seigfried-Spellar, K. & Rogers, M. (Feb 2010). Psychological assessments and attitudes toward deviant computer behavior. American Academy of Forensic Sciences Annual Meeting Seattle, WA: AAFS.
  51. Rogers, M. (Oct 2010). Integrating Psychology into Digital Evidence Investigations and Cyber Security. Workshops on Interdisciplinary Studies in Security and Privacy (WISSP) Abu Dhabi, UAE.
  52. Liles, S., Hoebich, M, & Rogers, M. (Feb 2009). Legal issues in cyber forensics: Issues confronting the discipline.. IFIP Working Group on Digital Forensics 11.9 Orlando, FL.
  53. Seigfried-Spellar, K., Lovely, R., & Rogers, M. (2009). Personality Assessment of Self-Reported Internet Child Pornography Consumers Using Bandura’s Theory of Reciprocal Determinism. K. Jaishankar, Crimes Dot-Com: Exploring Criminal Behavior in Cyberspace Hershey, PA.
  54. Roger, M. & Seigfried-Spellar , K. (August 2009). The Future of Digital Forensics: Merging Behavioral Sciences and Digital Evidence. (Position Paper). Indo-US Conference on Cybersecurity, Cybercrime and Cyberforensics, Kochi, India.
  55. Rogers, M. & Leshney, S. (2009). Virtualization and digital investigations. Tipton & Krause, Information Security Management Handbook 6th Edition. Boca Raton, FL: Auerbach., 3, 347-363.
  56. Liles, S., Hoebich, M, & Rogers, M. (2009). Legal issues in cyber forensics: Issues confronting the discipline. Peterson & Shenoi, Advances in digital forensics V Boston, USA: Springer., 5, 267-276.
  57. Rogers, M. (2009). Cyber forensics and home land security. Voeller, Wiley Handbook of Science and Technology for Homeland Security New Jersey, : Wiley & Sons.
  58. Rogers, M. (Sept. 2009). Data Analytics: The importance of context and meaning of digital evidence.. International Symposium on Cyber Crime Response Seoul, Korea. (Keynote Address.)
  59. Rogers, M. & Hacker, T. (Sept. 2009). Digital Evidence and Cloud Computing – Position Paper. ARO Workshop on Digital Forensics Washington, DC.
  60. Baggili, A., Mohan, A., & Rogers, M (Oct 2009). SMIRK - SMS Management and Information Retrieval Kit: A Forensics Tool. International Conference on Digital Forensics & Cyber Crime Albany, NY.
  61. Baggili, A., Mohan, A., & Rogers, M (May 2009). SMIRK - SMS Management and Information Retrieval Kit.. Mobile Forensics World 09 Chicago, IL.
  62. Roger, M. & Seigfried-Spellar , K. (August 2009). The Future of Digital Forensics: Merging Behavioral Sciences and Digital Evidence. Indo-US Conference on Cybersecurity, Cybercrime and Cyberforensics Kochi, India.
  63. Rogers, M. (May 2009). The Evolution of Social Engineering. Chicago Con - Ethical hacker Conference Chicago, IL.
  64. Rogers, M. (May 2009). The Evolution of Social Engineering.. Chicago, IL: Chicago Con. (Keynote Address.)
  65. Rigby, S. & Rogers, M. (April 2008). The general digital forensics model. ADFSL 2008 Conference on Digital Forensics, Security and Law Oklahoma City, OK.
  66. Kiley, M., Dankner, S. & Rogers, M. (2008). Forensics significance of instant messaging artifacts.. Craiger & Shenoi, Advances in digital forensics IV (pp.129-138). Boston, MA: IFIP.
  67. Seigfried, K. & Rogers, M. (July 2008). Self-reported female consumers of Internet child pornography: A psychological analysis. International Association of Forensic Science’s 18th Triennial Meeting (July, New Orleans). Washington, DC.
  68. Choudhury, A., Rogers, M., Gillam, W. & Watson, K. (May 2008). A novel skin tone detection algorithm for contraband image analysis. ACM Berkley, CA: Proceedings of the Third International workshop on Systematic Approaches to Digital Evidence Engineering.
  69. Seigfried, K., Lovely, R., & Rogers, M. (2008). Self-Reported online child pornography Behavior: A psychological analysis.. Journal of Cyber Criminology
  70. Rogers, M. (May 2008). Keynote Address- Developing Meaningful Cyber Forensics/Digital Evidence Curriculum . Joint Workshop on Cyber Security 2008 Buffalo, NY: SUNY Buffalo.
  71. Rogers, M. (2008). Enterprise incident response and digital evidence. Tipton & Krause, Information Security Management Handbook New York, NY: Auerbach., 6(2), 391-403.
  72. Rogers, M. (Sept 2008). It’s all about the technology; isn’t it?. (ISC)2 e-Symposium (ISC)2.
  73. Rogers, M. (2007). Cyber forensics and home land security. Voeller, Wiley Handbook of Science and Technology for Homeland Security New Jersey, NY: Wiley & Sons.
  74. Rogers, M. (2007). The role of computer crime investigators in counter terrorism and intelligence gathering . NW3C Informant, 3(1), 28,42.
  75. Rogers, M., Scarborough, K., Frakes, K., & San Martin (2007). National, state & local law enforcement digital evidence survey: Perceptions of prosecutors and judges knowledge and willingness to deal with digital evidence. Shenoi & Craiger, Advances in Digital Forensics New York, NY: Springer.
  76. Rogers, M., Goldman, J., Mislan, R., & Wedge, T. (Feb 2007). Digital Evidence practitioner standards: Issues and possible solutions.. AAFS Conferencs San Antonio, TX.
  77. Baggili, I., Mislan, R., & Rogers, M. (2007). Mobile phone forensics tool testing: A database driven approach.. International Journal of Digital Evidence
  78. Kiley, M., Shinbara, T., & Rogers, M. (Winter 2007). iPOD forensics update.. International Journal of Digital Evidence
  79. Rogers, M. (March 2007). Keynote Speaker: The Evolution of Digital Evidence as a Forensic Science. ACM: SAC 2007 Seoul, S. Korea.
  80. Scarborough, K. & Rogers, M. (2006). Information security. Encyclopedia of Police Science 3rd Edition
  81. Carrier, B., Casey, E., Garfinkel, S., Kornblum, J., Hosmer, C., Rogers, M., & Turner., P. (2006). Standardizing digital evidence storage. Communications of the ACM
  82. Losavio, M., Adams, J., & Rogers, M. (2006). Gap analysis: Judicial experience and perception of electronic evidence . Journal of Digital Forensic Practice, 1, 13-17.
  83. Scarborough, K. & Rogers, M. (2006). Computer technology. Encyclopedia of Police Science 3rd Edition
  84. Rogers, M. (2006). The development of a meaningful hacker taxonomy: A two dimensional approach. Digital Investigations, 3, 97-102.
  85. Rogers, M., Smoak, N., Lui, J. (2006). Self-reported criminal computer behavior: A big-5, moral choice and manipulative exploitive behavior analysis. Journal of Deviant Behavior, 27(3), 245-268.
  86. Rogers, M. (2006). Chapter: Law Investigation & Compliance. Henry & Krause, Official (ISC)2 Guide to the CISSP CBK New York, NY: Auerbach.
  87. Rogers, M. & Scarborough, K. (2006). The Role of Cyber Forensics in the War on Terrorism. . First Nordic-American Symposium on Public Safety Copenhagen, Denmark.
  88. Brinson, A., Robinson, A., & Rogers, M. (Aug 2006). A cyber forensics ontology: Creating a new Approach to studying cyber forensic. . Proceedings of the Digital Forensics Research Workshop 2006, August 14-16th, Lafayette IN New York, NY: Elsevier.
  89. Rogers, M. (2006). DCSA: Applied digital crime scene analysis. Tipton & Krause, Handbook of Information Security New York, NY: Auerbach., 7, 601-614.
  90. Rogers, M. & Scarborough, K. (2006). Cyber crime. Encyclopedia of Police Science 3rd Edition.
  91. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2006). Fast cyber forensics triage process model. Proceedings of the Conference on Digital Forensics Society & Law, April 21st (pp.27-40). Las Vegas, NV.
  92. Gupta, M., Hoeschele, M., & Rogers, M. (Fall 2006). Hidden disk areas: HPA and DCO. International Journal of Digital Evidence
  93. Rogers, M. (2005). Cyber forensics program partnership. NW3C Informant, 1(2), 26/40.
  94. Rogers, M. (2005). The information technology insider risk. Bigdoli, Information Security Handbook New York, NY: Wiley & Sons., 3, 3-17.
  95. Hoeschele. M. & Rogers, M (Feb 2005). Detecting social engineering. Proceedings of the International Conference on Digital Forensics Orlando, FL.
  96. Rogers, M. (2005). The information technology insider risk. H. Bigdoli, Information Security Handbook New York, NY: Wiley & Sons.
  97. Rogers, M. (March 2005). Psychological Profiling and Computer Forensics: Locard's Principle in the Digital World. Conference Proceedings Monaco, : eCrime and Computer Evidence.
  98. Marsico, C. & Rogers, M. (Feb 2005). iPod forensics. Proceedings of the International Conference on Digital Forensics Orlando, FL.
  99. Rogers, M. (March 2004). Cyber Profiling. NW3C Economic Crimes Summit Indianapolis, IN.
  100. Rogers, M. (Jan 2004). Current State of Computer Forensics. Computer Forensic Educators Working Group Orlando, FL.
  101. Meyers, M. & Rogers, M. (Winter 2004). Computer forensics: the need for standardization and certification within the U.S. court systems. International Journal of Digital Evidence
  102. Carney, M. & Rogers, M. (Spring 2004). The trojan made me do it: A first step in statistical based event reconstruction. International Journal of Digital Evidence
  103. Rogers, M. & Seigfried, K. (2004). The future of computer forensics: A needs analysis survey. Computers and Security, 23(1), 12-16.
  104. Rogers, M. & Ogloff, J. (2004). A comparative analysis of canadian computer and general criminals. Canadian Journal of Police & Security Services, 1, 366-376.
  105. Rogers, M. (2003). Computer forensics: Science or fad. Security Wire Digest
  106. Rogers, M. (2003). The psychology of cyber-terrorism. Silke & Merari, Terrorists, Victims and Society: Psychological. Perspectives on Terrorism and Its Consequences (pp.75-92). London, England: Wiley and Sons.
  107. Rogers, M. & Katz, E. (2012, June). Advanced Macintosh Forensics. LE Training Series, Albany, NY.
  108. Rogers, M. (2012, July). Intro to Cyber Forensics. NJROTC summer camp at Purdue, West Lafayette, IN.
  109. Rogers, M. (2011, Nov). Evidence Analytics. Hillsboro, OR.
  110. Rogers, M. (2011, July). Digital Evidence and Cyber Warfare. Sandia National Labs, NM.
  111. Rogers, M. (2011, June). Digital Forensics and Cyber Adversaries. Sandia National Labs, CA.
  112. Rogers, M. (2011, July). Digital Evidence Triage. Norwich, VT.
  113. Rogers, M. & Katz, E. (2011, Sept). Digital Evidence Triage. St. Louis, MO.
  114. Rogers, M. (2011, July). The Psychology of Cyber Adversaries: Panel Member. Sandia National Labs, NM.
  115. Rogers, M. (2010, Sept). Psychology of Cyber Terrorism. INTEL WRT Continuing Education Series, Webinar,
  116. Rogers, M. (2010, June). Digital Evidence Management and Handling. Minneapolis, MN.
  117. Rogers, M. & Goldman, J. (2010, June). Digital Evidence for Auditors - ISACA 2010 International Conference. Cancun, Mexico.
  118. Rogers, M. (2010, April). Basic Mac Forensics. Albany, NY.
  119. Bagilli, I. & Rogers, M. (2010, June). The effects of anonymity and pre-employment integrity on self-reported cyber crime.. The Ninth Workshop on the Economics of Information Security (WEIS 2010),, Harvard, MA.
  120. Rogers, M. (2010, Mar). Digital Evidence Triage - Financial Training. West Lafayette, IN.
  121. Rogers, M. (2010, Jan). Digital Evidence Triage - LE Training. West Lafayette, IN.
  122. Rogers, M. (2009, May). Digital Evidence Management. ISC2 cyber security series, Chicago, IL.
  123. Rogers, M. (2009, December). Digital Evidence Triage and the Rogers-Seigfried-Spellar Investigative Typology. Windsor, Canada.
  124. Rogers, M., Goldman, J. & Mislan, R (2009, November). Digital Evidence Triage for Financial Services. West Lafayette, IN.
  125. Rogers, M (2009, Oct). Enterprise Incident Response: Digital Evidence Management & Handling. Marina Del Rey, CA.
  126. Rogers, M. (2009, April). Digital Evidence Management. ISC2 Series, San Antonio, TX.
  127. Seigfried-Spellar, K. & Rogers, M (2009, July). Investigating Online Consumers of Child Pornography. 1st Annual ACM Northeast Digital Forensics Exchange, New York, NY.
  128. Seigfried-Spellar, K. & Rogers, M. (2009, August). The Role of Profiling in Cyber Crimes Investigations. Kochi, India.
  129. Rogers, M. (2009, July). Digital Evidence Triage. LE Training, Worcester, MA.
  130. Rogers, M. (2009, May). Digital Evidence Management. Chicago, IL.
  131. Rogers, M. (2009, May). Digital Evidence Triage. LE Training, West Lafayette, IN.
  132. Rogers, M. (2009, July). Mac OS X Forensics Basics. LE training series, Burlington, VT.
  133. Rogers, M. & Leshney, S. (2009, May). Digital Evidence Triage: Law Enforcement Training.. West Lafayette, IN.
  134. Rogers, M., Leshney, S., & Peelman, N. (2008, June). Introduction to Mac Forensics. West Lafayette, IN.
  135. Rogers, M. & Leshney, S. (2008, Nov). Fast Cyber Forensics Triage. Los Angeles, CA.
  136. Rogers, M., Goldman, J., Mislan, R., & Wedge, T. (2007). Emerging Trends: Law Enforcement Training. West Lafayette, IN.
  137. Rogers, M. (2007, April). Digital evidence management & handling. Chicago, IL.
  138. Rogers, M. & Leshney, S (2007). Basic Computer Forensics for LE.
  139. Rogers, M. (2006, Oct). Digital Evidence Management & Handling. Boston, MA.
  140. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2006). Fast Cyber Forensics Triage: Law Enforcement Training. West Lafayette, IN.
  141. Rogers, M. & Ksander, S. (2005). Digital Evidence Management & Handling. Raleigh, NC.
  142. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2005). Law Enforcement: Cyber Forensics First Responder. West Lafayette, IN.
  143. Rogers, M., Goldman, J., Mislan, R., Wedge, T. & Debrota, S. (2005). eMail Forensics: Law Enforcement Educational Workshops. Indianapolis, IN.
  144. Rogers, M. (2004, Dec). ISC2/Reid - Information Security Seminar - Social Engineering. New York, NY.
  145. Rogers, M. (2004, Oct). ISC2 - Information Security Seminar - Risk Management. San Diego, CA.
  146. Rogers, M. (2004, Nov). ISC2 - Information Security Seminar - Risk Management. Vancouver, BC.
  147. Rogers, M. (2004, Oct). ISC2 - Information Security Seminar - Risk Management. Dallas, TX.
  148. Rogers, M. (2004, Sept). ISC2 - Information Security Seminar - Social Engineering. Indianapolis, IN.
  149. Rogers, M. (2004, March). ISC2 - Information Security Seminar - Social Engineering. Chicago, IL.
  150. Rogers, M. (2004, Feb). ISC2 - Information Security Seminar - Social Engineering. Toronto, Canada.
  151. Rogers, M. & Ksander, S. (2004). Digital Evidence Management & Handling. Austin, TX.
  152. Rogers, M. (2003, Dec). ISC2 Information Security Seminar Series - Social Engineering. Washington, DC.
  153. Bebe, N., Kessler, G., & Rogers, M., Journal of Digital Forensic Practice, 1. Journal of Digital Forensic Practice, 1.. (2006) Book review: Computer evidence: Collection & preservation .
  154. Ksander, S., Gillam, B ,.& Rogers, M. (2006). Product review: Ultrablock forensic card reader.. Journal of Digital Forensic Practice, 1
Kathryn Seigfri...

  *Student
**Equal contribution
 

JOURNAL

 

Seigfried-Spellar, K.C., *O’Quinn, C., & *Treadway, K. (2015). Assessing the relationship between autistic traits and cyberdeviancy in a sample of college students. Behaviour & Information Technology. 34(5), 533-542.

 

Seigfried-Spellar, K.C. (2014).  Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary Findings. Digital Investigation, 11(4), 252-260.

 

**Rogers, M.K. & Seigfried-Spellar, K.C. (2014). Using internet artifacts to profile a child pornography suspect. Journal of Digital Forensics, Security and Law, 9(1), 57-66.

 

*Crimmins, D.M. & **Seigfried-Spellar, K.C. (2014). Peer attachment, sexual experiences, & risky online behaviors as predictors of sexting behaviors among undergraduate students. Computers in Human Behavior, 32, 268-275.

 

Seigfried-Spellar, K.C. & *Treadway, K.N. (2014). Differentiating hackers, identity thieves, cyberbullies, and virus writers by college major and individual differences. Deviant Behavior, 35(10), 782-803.

 

Seigfried-Spellar, K.C. (2013). Individual differences of internet child pornography users: Peculiar findings in a community-based study. International Journal of Cyber Criminology, 7(2), 141-154.

 

Seigfried-Spellar, K.C. & Rogers, M.K. (2013). Does deviant pornography use follow a guttman-like progression? Computers in Human Behavior, 29, 1997-2003.

 

Seigfried-Spellar, K. & Rogers, M. (2010).  Low neuroticism and high hedonistic traits for female internet child pornography consumers. Cyberpsychology, Behavior, and Social Networking, 13(6), 629-635.

 

Seigfried, K., Lovely, R., & Rogers, M. (2008). Self-reported Internet child pornography users: A psychological analysis. International Journal of Cyber Criminology, 2(1), 286-297.

 

Rogers, M., Seigfried, K., & Tidke, K. (2006). Self-reported computer criminal behavior: A psychological analysis. Digital Investigation, 3, 116-120.

 

Rogers, M. & Seigfried, K. (2004). The future of computer forensics: A needs analysis survey. Computers & Security, 23, 12-16.

 

 

BOOK / BOOK CHAPTERS 

 

Holt, T., Bossler, A., & Seigfried-Spellar, K. (2015). Cybercrime and digital forensics: An introduction. Abingdon, UK: Routledge.

 

Dolliver, D.S. & Seigfried-Spellar, K.C. (2014). Legal, forensic, and criminological aspects of cyberterrorism. In E. Plywaczewski (Ed.), Current Problems of the Penal Law and Criminology: Wolters Kluwer Publishing House.

 

Seigfried-Spellar, K.C. & Lanier, M. (Eds.). (2014). Essential Readings in Cybercrime Theory and Policy. San Diego, CA: Cognella.

 

**Rogers, M.K. & Seigfried-Spellar, K.C. (Series Eds.). (2013). Digital forensics and computer crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 114. New York: Springer.

 

Seigfried-Spellar, K.C. (2013). Measuring the preference of image content for self-reported consumers of child pornography. In M. Rogers & K. Seigfried-Spellar (Series Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Digital Forensics and Computer Crime. New York: Springer.

 

Seigfried-Spellar, K.C., Bertoline, G.R., & Rogers, M.K. (2012). Internet child pornography, U.S. sentencing guidelines, and the role of internet service providers. In P. Gladyshev & M. Rogers (Series Eds.), Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering: Vol. 88. Digital forensics and cyber crime (pp. 17-32). 

 

**Rogers, M.K., & Seigfried-Spellar, K.C. (2011). Internet child pornography: Legal issues and investigative tactics. In T. Holt (Ed.), Crime On-Line: Correlates, Causes, and Context. Durham, NC: Carolina Academic Press.

 

Seigfried-Spellar, K.C., Lovely, R.W., & Rogers, M.K. (2011). Self-reported internet child pornography consumers: A personality assessment using Bandura’s theory of reciprocal determinism. In K. Jaishankar (Ed.), Cyber Criminology: Exploring Internet Crimes and Criminal Behavior (pp. 65-77). Boca Raton, FL: Taylor and Francis.

 

 

WORKSHOPS 

 

Sloan, J.J. & Seigfried-Spellar, K.C. (2015, May). Professional Ethics in Digital Forensics. NSF STS funded workshop held at the National Science Foundation, Washington D.C, May 13-14, 3015.

 

Seigfried-Spellar, K. (2009, August). Investigating computer crime with behavioral science. Symposium conducted at the Indo-US Conference and Workshop on Cybersecurity, Cybercrime, and Cyberforensics, Kochi, India.

 

Rogers, M. & Seigfried-Spellar, K. (2009, July). Investigating online consumers of child pornography. In 1st Annual ACM Northeast Digital Forensics Exchange. John Jay College of Criminal Justice, City University of New York, New York.

 

 

ACADEMIC PRESENTATIONS

 

Seigfried-Spellar, K.C., *Flores, B.M., & Griffin, D.J. (2015, October). Explanatory case study of the Authur Pendragon cyber threat: Socio-psychological & communication perspectives. Paper presented at the 7th International ICST Conference on Digital Forensics and Cyber Crime, Seoul, South Korea.

 

*Zezulka, L. & Seigfried-Spellar, K. (2015, March). Differentiating cyberbullies and internet trolls by personality characteristics and self-esteem. Poster presentation at the Academy of Criminal Justice Sciences 52nd Annual Meeting, Orlando, FL. 

 

Treadway, K.* & Seigfried-Spellar, K. (2015, March). Influencing sensitivity levels toward victims of cyberbullying behaviors by manipulating sex of the victim & instigator. Poster presentation at the Academy of Criminal Justice Sciences 52nd Annual Meeting, Orlando, FL. 

 

Seigfried-Spellar, K.C. (2015, February). Assessing the relationship between individual differences and child pornography image preferences in an internet sample of child pornography consumers. Presentation at the American Academy of Forensic Sciences 67th Annual Scientific Meeting, Orlando, FL. 

 

*Crimmins, D.M. & Seigfried-Spellar, K.C. (2014, October). Peer attachment, sexual experiences, & risky online behaviors as predictors of sexting behaviors among undergraduate students. Presentation at the International Organization of Social Sciences and Behavioral Research Fall 2014 Conference, Las Vegas, Nevada.

 

Seigfried-Spellar, K.C. & Rogers, M.K. (2014, May). Using internet artifacts to profile a child pornography user. Presentation at the JDFSL Conference on Digital Forensics, Security, and Law, Richmond, VA.

 

Seigfried-Spellar, K.C., *O’Quinn, C., & *Treadway, K. (2014, February). Assessing the relationship between Asperger syndrome, hacking, identity theft, virus-writing and cyberbullying. Presentation at the American Academy of Forensic Sciences 66th Annual Scientific Meeting, Seattle, WA.

 

**Seigfried-Spellar, K.C. & Rogers, M.K. (2014, February). The future of digital forensics: Merging behavioral science and digital evidence. Presentation at the Young Forensic Scientists’ Special Session at the American Academy of Forensic Sciences 66th Annual Scientific Meeting, Seattle, WA.

 

Seigfried-Spellar, K.C. (2013, September). Distinguishing the viewers, downloaders, and exchangers of internet child pornography by individual differences: Preliminary findings. Paper presented at the 5th International ICST Conference on Digital Forensics and Cyber Crime, Moscow, Russia.

 

*McBrayer, J. & Seigfried-Spellar, K. (2013, March). Exploiting the digital frontier: Hacker typology and motivation. Presentation at the Southwest Decision Sciences Institute (SWDSI) 44th Annual Conference, Albuquerque, New Mexico.

 

Seigfried-Spellar, K.C. (2013, February). Replicating the Seigfried-Spellar and Rogers (2011) study on deviant pornography use by age of onset and sex. Presentation at the American Academy of Forensic Sciences 65th Annual Scientific Meeting, Washington, D.C.

 

Seigfried-Spellar, K.C. (2012, October). Measuring the preference of image content for self-reported consumers of child pornography. Paper presented at the 4th International ICST Conference on Digital Forensics and Cyber Crime, Purdue University, West Lafayette, Indiana.

 

**Rogers, M.K. & Seigfried-Spellar, K.C. (2012, February). Applied predictive behavioral modeling: The role of behavioral sciences in digital forensics. Presentation at the American Academy of Forensic Sciences 64th Annual Scientific Meeting, Atlanta, GA.

 

Seigfried-Spellar, K., Bertoline, G.R., & Rogers, M.K. (2011, October). Internet child pornography, U.S. sentencing guidelines, and roles of Internet service providers. Paper presented at the 3rd International ICST Conference on Digital Forensics and Cyber Crime, Dublin, Ireland.

 

Seigfried-Spellar, K. & Rogers, M. (2011, February). Exploring the Progression of Nondeviant and Deviant Pornography Use By Age of Onset and Sex. American Academy of Forensic Sciences 63rd Annual Scientific Meeting, Chicago, IL.

 

Rogers, M. & Seigfried-Spellar, K. (2011, February). Development of an Offender Classification Based Investigative Protocol for Use with Online Consumers of Child Pornography Cases: An Information, Technology, and Behavioral Sciences Approach. Paper presented at the American Academy of Forensic Sciences 63rd Annual Scientific Meeting, Chicago, IL.

 

Seigfried-Spellar, K., Rogers, M., & Lynam, D. (2010, February). Psychological Analysis of Computer Criminal Behavior: Preliminary Findings. American Academy of Forensic Sciences 62nd Annual Scientific Meeting, Seattle, WA. 

 

**Rogers, M., & Seigfried-Spellar, K. (2009, August). The future of digital forensics: Merging behavioral science and digital evidence. Position paper presented at the Indo-US Conference and Workshop on Cybersecurity, Cybercrime, and Cyberforensics, Kochi, India.

 

Anthony Smith
  1. Smith, A.H., & Hansen, R.A., A model for wireless networking curriculum for network engineering. (2009) L. Tomei. Information Communication Technologies for Enhanced Education and Learning. IGI Global.
  2. Smith, A.H., & Hansen, R. A., Wireless Wide Area Networks. (2007) H. Bidgoli. Handbook of Computer Networks John Wiley & Sons.
  3. Matson*, E.T., & Smith, A.H. (2010). Modeling sensor capabilities in agent-based robotic organizations. 8th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2010)
  4. Eric T. Matson, Cory Q. Nguyen, Benny Leong, Anthony Smith (2010). Integration of Agent Organization and Autonomous Robots to Enable Self-organizing Broadband Networks. International Conference on Control, Automation an Systems 2010 (ICCAS 2010), Gyeonggi-do, South Korea, October 27-30 2010.
  5. Cory Q. Nguyen, Benny Leong, Eric T. Matson, Anthony Smith, Juan P. Wachs (2010). AWARE:Autonomous Wireless Agent Robotic Exchange. International Conference on Intelligent Robotics and Applications (ICIRA 2010), Shanghai, China, November 10-12, 2010.
  6. Dark, M., Goldman, J., Hacker, T., Marshall, B., & Smith, A. (2009). Dark web patterns. Web Science Conference 2009
  7. Rawles*, P., Hansen, R., Sprankle, J., & Smith, A. (2009). Revising a network engineering curriculum to reflect current industry and student trends. ASEE Annual Conference and Exposition
  8. Smith*, A., Hansen, R., Rawles, P., & Falls*, C. (2009). Wireless local area network controller-based and autonomous access point performance considerations.
  9. Smith*, A.H., Hansen*, R.A., & Mariga, J.R. (2009). Comparative Analysis of 802.11 networks using variant channel allocations. 2010 American Society for Engineering Education (ASEE) Annual Conference and Exposition
  10. McDonald*, R., & Smith*, A. (2009). Impact of wired vs. wireless distribution systems on 802.11-based real time location system timing. World Congress on Computer Science and Information Engineering (CSIE 2009)
  11. Smith*, A.H., Hansen*, R.A., & Mariga, J.R. (2009). An updated wireless network curriculum based on current industry trends.. International Journal of Information and Communication Technology Education
  12. See, N. E., Smith, A.H., Hansen, R.A., & Rawles., P.T. (2009). An analysis of evil twin attacks.. ACM Transactions on Information and System Security (TISSEC)
  13. Geethakumar*, S., Smith, A.H., & Rawles, P.T. (2009). Geethakumar*, S., Smith, A.H., & Rawles, P.T. Wireless security: EAP protocol flaws facilitating dictionary attacks.. International Journal of Information Security and Privacy.
  14. Eric T. Matson, Anthony Smith and J. Eric Deitz (2009). Application of Adaptive Wireless Sensor Organizations to Secure Spatial Domains. Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security (IEEE HST 2009), Waltham, MA, May 11 - 12, 2009.
  15. Anthony Smith and Eric T. Matson (2009). Use of Antennas as Sensors to Discover Signals to Form Mobile Broadband Networks. Proceeding of the 2009 IEEE Sensors Conference, Christchurch, New Zealand, October 25-28, 2009.

Pages